References
- Acar, G., C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz. 2014. The Web never forgets: Persistent tracking mechanisms in the wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 674–89. New York: ACM. https://securehomes.esat.kuleuven.be/∼gacar/persistent/index.html (last accessed 5 June 2016).
- Althusser, L. 1971. Ideology and ideological state apparatuses. In Lenin and philosophy and other essays. New York: Monthly Review Press. https://www.marxists.org/reference/archive/althusser/1970/ideology.htm (last accessed 5 June 2016).
- Amoore, L. 2011. On the emergence of a security risk calculus for our times. Culture & Society 28 (6): 24–43.
- Apple. 2014. Location and maps programming guide. https://developer.apple.com/library/ios/documentation/UserExperience/Conceptual/LocationAwarenessPG/CoreLocation/CoreLocation.html (last accessed 5 June 2016).
- Ardagna, C. A., M. Cremonini, and G. Gianini. 2009. Landscape-aware location-privacy protection in location-based services. Journal of Systems Architecture 55 (4): 243–54.
- Atwood, C. P. 2015. Activity-based intelligence: Revolutionizing military intelligence analysis. Joint Force Quarterly 77:24–33.
- Barnes, R., J. Winterbottom, and M. Dawson. 2011. Internet geolocation and location-based services. IEEE Communications Magazine 49 (4): 102–08.
- BBC. 2012. Social apps “harvest smartphone contacts.” http://www.bbc.com/news/technology-17051910 (last accessed 5 June 2016).
- Bojinov, H., D. Boneh, Y. Michalevsky, and G. Nakibly. 2014. Mobile device identification via sensor fingerprinting. arXIV. http://arxiv.org/abs/1408.1416 (last accessed 5 June 2016).
- Butler, J. 1997. The psychic life of power: Theories in subjection. Palo Alto, CA: Stanford University Press.
- Companies use apps to harvest users' personal information. 2012. The Telegraph. http://www.telegraph.co.uk/technology/9107042/Companies-use-apps-to-harvest-users-personal-information.html (last accessed 5 June 2016).
- Crampton, J. 1995. The ethics of GIS. Cartography and Geographic Information Science 22 (1): 84–89.
- ———. 2014. Collect it all: National security, big data and governance. GeoJournal 80 (4): 519–31. http://link.springer.com/10.1007/s10708-014-9598-y (last accessed 5 June 2016).
- ———. 2015. Assemblage of the vertical: Commercial drones and algorithmic life. SSRN: 1–25. http://dx.doi.org/10.2139/ssrn.2693625
- Cristea, M., and B. Groza. 2013. Fingerprinting smartphones remotely via ICMP timestamps. IEEE Communications Letters 17 (6): 1081–83.
- Curry, M. R. 1997. The digital individual and the private realm. Annals of the Association of American Geographers 87 (4): 681–99.
- ———. 1998. Digital places: Living with geographic information technologies. London and New York: Routledge.
- Dobson, J. E., and P. F. Fisher. 2007. The panopticon's changing geography. The Geographical Review 97 (3): 307–23.
- Dodge, M., and M. Zook. 2009. Internet-based measurement. In International encyclopedia of human geography, ed. R. Kitchin and N. Thrift, 569–79. Oxford, UK: Elsevier Science.
- Eckersley, P. 2010a. How unique is your web browser? In 10th International conference on privacy enhancing technologies, ed. M. J. Atallah and N. J. Hopper, 1–18. Berlin and Heidelberg: Springer-Verlag.
- ———. 2010b. A primer on information theory and privacy. https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy (last accessed 5 June 2016).
- Eisenhaur, G., M. N. Gagnon, T. Demir, and N. Daswani. 2011. Mobile malware madness, and how to cap the mad hatters. https://media.blackhat.com/bh-us-11/Daswani/BH_US_11_Daswani_Mobile_Malware_WP.pdf (last accessed 5 June 2016).
- Elgin, B., M. Riley, and D. Lawrence. 2014. Home Depot hacked after months of security warnings. Bloomberg. http://www.bloomberg.com/bw/articles/2014-09-18/home-depot-hacked-wide-open (last accessed 5 June 2016).
- Elwood, S., and A. Leszczynski. 2011. Privacy, reconsidered: New representations, data practices, and the Geoweb. Geoforum 42 (1): 6–15.
- Felt, A. P., E. Chin, S. Hanna, D. Song, and D. Wagner. 2011. Android permissions demystified. In The 18th ACM conference on computer and communications security—CCS'11, 627–38. New York: ACM.
- Felt, A. P., E. Ha, S. Egelman, and A. Haney. 2012. Android permissions: User attention, comprehension, and behavior. In The eighth symposium on usable privacy and security, 1–16. New York: ACM.
- FinFisher. 2015. FinFisher—Excellence in IT innovation. https://www.finfisher.com/FinFisher/index.html (last accessed 5 June 2016).
- Foucault, M. 1977. Discipline and punish. New York: Pantheon.
- GCHQ and CSEC. n.d. Mobile apps doubleheader: BADASS Angry Birds. http://www.spiegel.de/media/media-35670.pdf (last accessed 5 June 2016).
- Gellman, B., and A. Soltani. 2013. NSA tracking cellphone locations worldwide, Snowden documents show. The Washington Post 4 December. https://www.washingtonpost.com/world/national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html (last accessed 5 June 2016).
- Gillmor, D. 2014. As we sweat government surveillance, companies like Google collect our data. The Guardian 18 April. http://www.theguardian.com/commentisfree/2014/apr/18/corporations-google-should-not-sell-customer-data (last accessed 5 June 2016).
- Google. n.d.-a. Location strategies. https://developer.android.com/guide/topics/location/strategies.html#Permission (last accessed 5 June 2016).
- ———. n.d.-b. Share your location on Chrome. https://support.google.com/chrome/answer/142065?hl=en (last accessed 5 June 2016).
- Goss, J. 1995. “We know who you are and we know where you live”: The instrumental rationality of geodemographic systems. Economic Geography 71 (2): 171–98.
- Graves, J. 2013. The developer's guide to unique identifiers. Possible Mobile. https://possiblemobile.com/2013/04/unique-identifiers/ (last accessed 5 June 2016).
- Greenwald, G., and S. Ackerman. 2013. How the NSA is still harvesting your online data. The Guardian 27 June. http://www.theguardian.com/world/2013/jun/27/nsa-online-metadata-collection (last accessed 5 June 2016).
- Gruteser, M., and D. Grunwald. 2005. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. Mobile Networks and Applications 10 (3): 315–25.
- Haraway, D. 1991. Simian, cyborgs and women: The reinvention of nature. London and New York: Routledge.
- Hashem, T., and L. Kulik. 2011. “Don't trust anyone”: Privacy protection for location-based services. Pervasive and Mobile Computing 7 (1): 44–59.
- Hu, Z., J. Heidemann, and Y. Pradkin. 2012. Towards geolocation of millions of IP addresses. In Proceedings of the 2012 ACM Internet measurement conference—IMC ’12, 123. New York: ACM.
- Hughes, E. 1993. A cypherpunk's manifesto. https://w2.eff.org/Privacy/Crypto/Crypto_misc/cypherpunk.manifesto (last accessed 5 June 2016).
- Internet Society Chapters Webcasting. 2013. Snowden, the NSA, and free software—Bruce Schneier + Eben Moglen. https://www.youtube.com/watch?v=N8Sc6pUR1mA (last accessed 5 June 2016).
- Introna, L. D. 2016. Algorithms, governance, and governmentality: On governing academic writing. Science, Technology & Human Values 41 (1): 17–49.
- Jalabi, R. 2015. OPM hack: 21 million people's personal information stolen, federal agency says. The Guardian 9 July. http://www.theguardian.com/technology/2015/jul/09/opm-hack-21-million-personal-information-stolen (last accessed 5 June 2016).
- Jia, Y., X. Dong, Z. Liang, and P. Saxena. 2015. I know where you've been: Geo-inference attacks via the browser cache. IEEE Internet Computing 19 (1): 44–53.
- Johnston, C. 2015. DuckDuckGo traffic soars in wake of Snowden revelations. The Guardian 17 June. http://www.theguardian.com/technology/2015/jun/17/duckduckgo-traffic-snowden-revelations (last accessed 5 June 2016).
- Kitchin, R. 2015a. Continuous geosurveillance in the “smart city.” DIS Magazine. http://dismagazine.com/dystopia/73066/rob-kitchin-spatial-big-data-and-geosurveillance/ (last accessed 5 June 2016).
- ———. 2015b. No longer lost in the crowd? How people's location and movement is being tracked. The Programmable City. http://www.maynoothuniversity.ie/progcity/2015/12/no-longer-lost-in-the-crowd-seven-ways-peoples-location-and-movement-is-being-tracked/ (last accessed 5 June 2016).
- Kohno, T., A. Broido, and K. C. Claffy. 2005. Remote physical device fingerprinting. IEEE Transactions on Dependable and Secure Computing 2 (2): 93–108.
- Kounadi, O., and M. Leitner. 2014. Why does geoprivacy matter? The scientific publication of confidential data presented on maps. Journal of Empirical Research on Human Research Ethics 9 (4): 34–45.
- Krebs, B. 2015. Online cheating site AshleyMadison hacked. Krebs on Security. http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/ (last accessed 5 June 2016).
- Kwan, M.-P., I. Casas, and B. Schmitz. 2004. Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks? Cartographica: The International Journal for Geographic Information and Geovisualization 39 (2): 15–28.
- Lacan, J. 2007. Ecrits: A selection, ed. B. Fink. New York: Norton.
- Lee, M. 2015. Secret “BADASS” intelligence program spied on smartphones. The Intercept. https://theintercept.com/2015/01/26/secret-badass-spy-program/ (last accessed 5 June 2016).
- Leszczynski, A. 2015a. Geoprivacy. In Understanding spatial media, ed. R. Kitchin, M. Wilson, and T. Lauriualt, 1–16. Thousand Oaks, CA: Sage.
- ———. 2015b. Spatial big data and anxieties of control. Environment and Planning D: Society and Space 33 (6): 965–84.
- Lyon, D. 2003. Surveillance as social sorting: Computer codes and mobile bodies. In Surveillance as social sorting: Privacy, risk, and digital discrimination, ed. D. Lyon, 13–30. London and New York: Routledge.
- Marquis-Boire, M. 2012. From Bahrain with love: FinFisher's spy kit exposed?Toronto: Citizen Lab. https://citizenlab.org/wp-content/uploads/2015/03/From-Bahrain-With-Love-FinFishers-Spy-Kit-Exposed.pdf (last accessed 5 June 2016).
- Marquis-Boire, M., B. Marzcak, and C. Guarnieri. 2012. The smartphone who loved me: FinFisher goes mobile. Toronto: Citizen Lab. https://citizenlab.org/wp-content/uploads/2015/03/The-SmartPhone-Who-Loved-Me-FinFisher-Goes-Mobile.pdf (last accessed 5 June 2016).
- Marquis-Boire, M., B. Marzcak, C. Guarnieri, and J. Scott-Railton. 2013. You only click twice: FinFisher's global proliferation. Toronto: Citizen Lab. https://citizenlab.org/wp-content/uploads/2009/10/You-Only-Click-Twice-FinFisher%E2%80%99s-Global-Proliferation.pdf (last accessed 5 June 2016).
- Marwick, A. E., and D. Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society 16 (7): 1051–67.
- Masoumzadeh, A., and J. Joshi. 2011. An alternative approach to k-anonymity for location-based services. Procedia Computer Science 5:522–30.
- McNeff, J. G. 2002. The Global Positioning System. IEEE Transactions on Microwave Theory and Techniques 50 (3): 645–52.
- Michalevsky, Y., D. Boneh, A. Schulman, and G. Nakibly. 2015. PowerSpy: Location tracking using mobile device power analysis. CoRR abs/1502.0.
- Microsoft. n.d. Internet Control Message Protocol (ICMP) basics. https://support.microsoft.com/en-us/kb/170292 (last accessed 5 June 2016).
- Mowery, K., and H. Shacham. 2012. Pixel perfect: Fingerprinting canvas in HTML5. Proceedings of W2SP:1–12.
- Mozilla. 2015. WebAPI. https://developer.mozilla.org/en-US/docs/WebAPI (last accessed 5 June 2016).
- ———. n.d.-a. Disable third-party cookies in Firefox to stop some types of tracking by advertisers. https://support.mozilla.org/en-US/kb/disable-third-party-cookies (last accessed 5 June 2016).
- ———. n.d.-b. Location-aware browsing. https://www.mozilla.org/en-US/firefox/geolocation/ (last accessed 5 June 2016).
- Naoroji, D. 1871. The benefits of British rule, ed. J. S. Arkenberg. New York: Modern History Sourcebook. https://legacy.fordham.edu/halsall/mod/1871britishrule.asp (last accessed 5 June 2016).
- National Security Agency (NSA). 2012. Tor stinks. https://www.eff.org/document/2013-10-04-guard-tor-stinks (last accessed 5 June 2016).
- Pasquale, F. 2015. The black box society: The secret algorithms that control money and information. London: Harvard University Press.
- Perez, S. 2013. iOS 7 eliminates MAC address as tracking option, signaling final push towards Apple's own ad identifier technology. TechCrunch. http://techcrunch.com/2013/06/14/ios-7-eliminates-mac-address-as-tracking-option-signaling-final-push-towards-apples-own-ad-identifier-technology/ (last accessed 5 June 2016).
- Pew Research Center. 2015. App permissions in the Google Play store. http://www.pewinternet.org/2015/11/10/apps-permissions-in-the-google-play-store/ (last accessed 5 June 2016).
- Ricker, B., N. Schuurman, and F. Kessler. 2015. Implications of smartphone usage on privacy and spatial cognition: Academic literature and public perceptions. GeoJournal 80 (5): 637–52.
- Riley, M., B. Elgin, D. Lawrence, and C. Matlack. 2014. Missed alarms and 40 million stolen credit card numbers: How Target blew it. Bloomberg. http://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of-credit-card-data (last accessed 5 June 2016).
- Riley, M., and J. Robertson. 2015. Chinese state-sponsored hackers suspected in Anthem attack. Bloomberg. http://www.bloomberg.com/news/articles/2015-02-05/signs-of-china-sponsored-hackers-seen-in-anthem-attack (last accessed 5 June 2016).
- Samsung. 2011. How to retrieve the device unique ID from Android device. http://developer.samsung.com/technical-doc/view.do?v=T000000103 (last accessed 5 June 2016).
- Scassa, T. 2013. Legal issues with volunteered geographic information. Canadian Geographer 57 (1): 1–10.
- Schneier, B. 2013. Attacking Tor: How the NSA targets users' online anonymity. The Guardian 4 October. http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity (last accessed 5 June 2016).
- ———. 2015. Cyberweapons have no allegiance. Motherboard. http://motherboard.vice.com/read/cyberweapons-have-no-allegiance (last accessed 5 June 2016).
- Schuurman, N. 2006. Formalization matters: Critical GIS and ontology research. Annals of the Association of American Geographers 96 (4): 726–39.
- ———. Forthcoming. Critical GIScience. In International encyclopedia of geography, ed. D. Richardson. Hoboken, NJ: Wiley.
- Seward, Z. 2013. Dating app Tinder briefly exposed the physical location of its users. Quartz. http://qz.com/106731/tinder-exposed-users-locations/ (last accessed 5 June 2016).
- Sheridan, M. n.d. The developer's guide to HTML5 canvas. Microsoft Developer Network. https://msdn.microsoft.com/en-ca/hh534406.aspx (last accessed 5 June 2016).
- Silver, V. 2012. Gamma says no spyware sold to Bahrain; may be stolen copy. Bloomberg. http://www.bloomberg.com/news/articles/2012-07-27/gamma-says-no-spyware-sold-to-bahrain-may-be-stolen-copy (last accessed 5 June 2016).
- Simonite, T. 2013. A popular ad blocker also helps the ad industry. MIT Technology Review. http://www.technologyreview.com/news/516156/a-popular-ad-blocker-also-helps-the-ad-industry/ (last accessed 5 June 2016).
- Soltani, A., and M. DeLong. 2013. FASCIA: The NSA's huge trove of location records. The Washington Post 4 December. http://apps.washingtonpost.com/g/page/world/what-is-fascia/637/#document/p1/a135288 (last accessed 5 June 2016).
- Taylor, D. R. F. 1974. The Canadian cartographer and the computer: Present trends and future challenges. Cartographica: The International Journal for Geographic Information and Geovisualization 11 (1): 35–44.
- Timberg, C. 2013a. Google encrypts data amid backlash against NSA spying. The Washington Post 6 September. https://www.washingtonpost.com/business/technology/google-encrypts-data-amid-backlash-against-nsa-spying/2013/09/06/9acc3c20-1722-11e3-a2ec-b47e45e6f8ef_story.html (last accessed 5 June 2016).
- ———. 2013b. NSA slide shows surveillance of undersea cables. The Washington Post 10 July. https://www.washingtonpost.com/business/economy/the-nsa-slide-you-havent-seen/2013/07/10/32801426-e8e6-11e2-aa9f-c03a72e2d342_story.html (last accessed 5 June 2016).
- Tor Project. 2015. Tor: Sponsors. https://www.torproject.org/about/sponsors.html.en (last accessed 5 June 2016).
- Torrens, P. M. 2008. Wi-Fi geographies. Annals of the Association of American Geographers 98 (1): 59–84.
- USENIX Enigma Conference. 2016. USENIX Enigma 2016—Protecting high risk users. https://www.youtube.com/watch?v=shSbWtB012k (last accessed 5 June 2016).
- Veytsman, M. 2014. How I was able to track the location of any Tinder user. Include Security. http://blog.includesecurity.com/2014/02/how-i-was-able-to-track-location-of-any.html (last accessed 5 June 2016).
- W3C. n.d. JavaScript Web APIs. http://www.w3.org/standards/webdesign/script.html (last accessed 5 June 2016).
- Weston, G., G. Greenwald, and R. Gallagher. 2014. CSEC sused airport WiFi to track Canadian travellers: Edward Snowden documents. CBC News. http://www.cbc.ca/news/politics/csec-used-airport-wi-fi-to-track-canadian-travellers-edward-snowden-documents-1.2517881 (last accessed 5 June 2016).
- Zuberi, R., S. Ahmad, and B. Lall. 2012. Privacy protection through k-anonymity in location-based services. IETE Technical Review 29 (3): 196.