{"id":1676,"date":"2020-05-21T17:33:00","date_gmt":"2020-05-21T17:33:00","guid":{"rendered":"https:\/\/cisobyte.com\/?p=1676"},"modified":"2020-05-21T22:34:30","modified_gmt":"2020-05-21T22:34:30","slug":"public-networks-public-traffic-public-behavior-internet-privacy-and-the-4th-amendment","status":"publish","type":"post","link":"https:\/\/cisobyte.com\/index.php\/2020\/05\/21\/public-networks-public-traffic-public-behavior-internet-privacy-and-the-4th-amendment\/","title":{"rendered":"Public Networks, Public Traffic, Public Behavior: Internet Privacy and the 4th Amendment."},"content":{"rendered":"<h4 style=\"text-align: left;\"><strong>CISObyte&nbsp; &nbsp; 05-21-2020<\/strong><\/h4>\n<p><\/p>\n<h4>A bill to protect your right to privacy online was narrowly defeated this week in the Senate. You shouldn&#8217;t wait for the bureaucrats to protect your rights to modify your online behaviors.<\/h4>\n<h2>&#8220;Search and browser history can reveal people\u2019s personal thoughts like perhaps nowhere else, serving as a kind of electronic confession booth as people put down their guards and stare into phones and computer screens.&#8221;<\/h2>\n<p>The Fourth Amendment to the United States Constitution states, &#8220;[The] right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.&#8221;<\/p>\n<p>You have already forfeited this right if you&#8217;re browsing on an employer-owned device or on their networks. Your browsing behavior can and is tracked by every site that you are visiting, even if they specify that it is &#8220;only for site-improvement.&#8221; While I don&#8217;t want the world prying into my search history, It would be remiss to call it private behavior. I send a search request to a 3rd party (Hi Google!), they return a vast amount of results, and then I send and receive information from those additional parties. I&#8217;m not your lawyer, and I don&#8217;t know how this will play out, but as your security advisor, I&#8217;m telling you that you are already willingly sharing information with 3rd parties outside of your house, person, papers and effects.<\/p>\n<p>If it concerns you, use a VPN service to obfuscate your identity, and don&#8217;t click that sketchy link. Ask me how I can help.<\/p>\n<ul>\n<li>Privacy<\/li>\n<li>Cybersecurity<\/li>\n<li>Patriot Act<\/li>\n<li>Surveillance<\/li>\n<\/ul>\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/www.nbcnews.com\/tech\/security\/can-government-look-your-web-habits-without-warrant-senators-hope-n1207936\" class=\"vlp-link\" title=\"Can the government look at your web habits without a warrant? Senators hope to clarify that.\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/media2.s-nbcnews.com\/j\/newscms\/2020_20\/3351961\/200515-personal-data-al-1501_cdc0050849f7ddea4de951a95dd846d0.nbcnews-fp-1200-630.jpg\" style=\"max-width: 600px; max-height: 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tCan the government look at your web habits without a warrant? Senators hope to clarify that.\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\tA debate in the Senate this week provided a stark reminder that the country is still wrestling with how much authority to give federal prosecutors to spy on people\u2019s everyday internet activity.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>05-21-2020 | A bill to protect your right to privacy online was narrowly defeated this week in the Senate. You shouldn&#8217;t wait for the bureaucrats to protect your rights to modify your online behaviors.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[51,50,33],"tags":[8,53,52,54],"class_list":["post-1676","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-privacy","category-risk-management","tag-cybersecurity","tag-patriotact","tag-privacy","tag-surveillance"],"_links":{"self":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/comments?post=1676"}],"version-history":[{"count":3,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1676\/revisions"}],"predecessor-version":[{"id":1709,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1676\/revisions\/1709"}],"wp:attachment":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/media?parent=1676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/categories?post=1676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/tags?post=1676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}