You are in the middle of a heated political debate between your party and your opposition in a real-time online conference. Your team has been doing well and has gotten the opposing party irate. Suddenly, one of your opponents steps up and having no other points to make, tells you to ‘shut up and sit down, or else you’ll regret it’. Feeling victorious and bold, you chuckle and reply ‘Please, what would I regret?’ A few days later, you wake up to an odd phone call from one of your colleagues, who ominously warns you to ‘be careful, you are being watched.’ A day or two after that phone call, you return home from work only to find your house empty and in bad condition, blood stains all over the place, and a lone table upon which lies a note for you that says ‘Too bad, your daughter was charming. I told you you’d regret it.’
From reading this completely exaggerated, fictitious (and ridiculous) story composed by me, you might wonder how the protagonist’s daughter got involved in this. It was an online conference after all. How could the opposition know of the address of residence of the protagonist, the politician? How could someone from the other end of the province know that the protagonist actually had a daughter? From my italicized hints, you can clearly see where I am heading with this. In the story above, the only intentional relevance it has to my train of thought is how the opposition could have possibly found out enough information about the protagonist to be able to commit murder right at his house. With the advancement in computer technology over the past few years, more doors for crime have been opened. One such exploit that criminals, hackers, and even police organizations have used and abused is the fairly careless compromising of online privacy.
Continue reading →