ABSTRACT

This chapter, as a special topic, looks at countersurveillance in the worlds of social media, interconnected mass data and surveillance networks. It reviews the motivation behind stalking, commercial data collection and intrusion by corporations or organizations into an individual’s life. The means of how surveillance may take place are given and how this can be avoided, with particular strategies. With the deletion of profiles and private information not an option in a world where data can be trawled and retained within the cloud, techniques are given in response, including obfuscation. Hiding tracks through networks is also looked at and the disconnection of identity from activities which are network based. Automated mechanisms of stealth are pointed at and detailed.