Will Google Make You a Peeping Tom?
Ever heard of Google Street View? The new service is raising eyebrows within the online community and elsewhere, as it threatens worldwide privacy.
For example, while searching for her home, Ms. Kalin-Casey was able to see her cat in the living-room window of her second-floor apartment building. Kalin-Casey ultimately wants to know "where you draw the line between taking public photos and zooming in on people's lives." (Source: net-security.org)
Discussion about the confidentiality issues of Street View has been all over the web since Kalin-Casey recently voiced her concerns in an email to the blog Boing Boing. Google defended itself by saying, "Street View only features imagery taken on public property. This imagery is no different from what any person can readily capture or see walking down the street." (Source: nytimes.com)
Google claims to have consulted with public service organizations before developing Street View. As a result, users have the privilege of asking for photos to be removed for privacy reasons, although few of these requests have been received.
One Boing Boing reader refutes Kalin-Casey's concerns by saying, "You don't have a right to 'privacy' over what can be seen while driving the speed limit past your house." (Source: nytimes.com)
While the majority of people do not mind finding pictures of themselves and their homes on the Internet, some pictures threaten government secrecy. For example, images turned up of the inside of the Brooklyn Battery Tunnel. This area is under high-security so unauthorized photography is not permitted.
Clearly, the issues put forth by Ms. Kalin-Casey have caused much controversy over Street View. Google could have avoided privacy concerns by merely blurring people's faces in the images.
The question is: How did Google's service manage to take pictures of this guarded zone? The Answer: Vehicles equipped with special cameras. Google also purchased images from an external data provider.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.