OPSEC - Protecting Your Privacy (Workshop Outline)

Title: OPSEC: Who Owns Your Data? (Privacy Fundamentals)
Date: Friday, September 19, 2025 10a - 12pm

Location: Building 10C
Summary:

Personal data is constantly being collected, shared, and monetized—often without our knowledge. This workshop aims to explain what data is gathered, how it’s used, and what risks it poses. We’ll explore real-world examples of data misuse, from invasive targeted ads to government surveillance, and examine how individuals can take meaningful steps to protect their privacy. Attendees will learn how to opt out of data collection, secure their devices, and limit their digital footprint. Whether you're new to digital privacy or looking to sharpen your defenses, this session offers practical tools and resources to take back control.

Open to ALL!

Short summary for promotion: A Jacobs makerspace workshop that explores how our data is collected, sold, what risks this poses, and what one can do to prevent this.

Slides: OPSEC - Presentation Slides

Previous Dates: Friday, April 25, 2025, 10a - 11:30am

QR Code:

Flyers

Opsec-Flyer_0416.jpg|140 Opsec-IG-Story_0416b.jpg|130
OPSEC-LobbyMonitor_0416.jpg|200

Privacy Random Facts for advertisement

0. Intro

Largest Data brokers as of 2025

Company Headquarters Revenue Data Coverage Specialties Notable Facts
Experian Dublin, Ireland $7.1B 300M U.S. consumers, 25M businesses Credit reporting, marketing data, identity verification Offers Mosaic consumer profiles; major credit bureau
Equifax Atlanta, GA, USA $5.1B 220M consumers, 33M businesses Credit scoring, employment data, fraud detection Over 800 audience segments; suffered a major breach in 2017
Epsilon Irving, TX, USA $2.9B 250M U.S. consumers Consumer behavior, purchase intent modeling, personalized advertising Owned by Publicis Groupe; works with major brands like McDonald’s
Acxiom Conway, AR, USA $2.7B 260M individuals, 190M households Demographic profiling, identity resolution, data onboarding Division of Interpublic Group; known for deep consumer behavioral analytics
CoreLogic Irvine, CA, USA $1.0B 134M U.S. property addresses Property records, location intelligence, mortgage analytics Leading provider of real estate and insurance risk data
TransUnion Chicago, IL, USA $3.7B 200M U.S. consumers Credit reporting, identity protection, audience targeting Part of the "Big Three" credit bureaus; integrates with digital marketing platforms

I. Your data trail

Public data

Searching the Internet

Without logging into anything, without submitting any form, your has already shared

Your smartphone

Your phone is in your pocket, screen off.

All of this happened without unlocking your phone.
All of this builds a fuller picture of who you are and what you value.

IRL

All this data builds a fuller picture of who you are, where you go and when, and what you value.

The Data

Personal Identifiers

Demographic Information

Behavioral Data

Location Data

Psychographic Data

Social Media Engagement

Technical Information

Interaction Data

II. How your data are collected

A. Online Activity

B. Mobile Devices

C. Offline Sources

D. Devices and IoT

🎯 III. Examples

A. Advertising and Marketing

B. Risk Scoring and Profiling

C. Political Influence

D. Surveillance and Law Enforcement

IV. Consequences

V. What You Can Do About It

Data Privacy Strategy

No one is perfect. Just do what you feel is appropriate for you.

Five main identifiers used to define you

By changing some of these, you start to break data brokers' ability to tie your activity to you.

  1. Your email address

    • Create a burner email address (and USE it for any unimportant stuff). This is an email you won't really check much (More at Email Privacy)
    • Create email aliases. Some email providers (like Proton Mail) come with this feature. There are also aliasing services that allow you to create aliases forward to your existing email.
    • Use a temporary email address for unimportant things.
  2. Phone number

  3. Your debit card

  4. Your browser

  5. Your device (laptop, smartphone)

    • Think about sensors rather than apps. Limit Permissions access to your microphone, camera, location, bluetooth
    • Install Adblocking in your browser or, even better, for you entire network
    • Lock down your social media accounts
    • Apps are potential liabilitites. Don't install apps you don't trust. If you do, don't give them permission to use your location, camera, microphone, etc.
    • Minimize your Digital Footprint and obfuscate: Use burner emails, avoid posting sensitive info, use fake information, pseudonyms,
    • Enable two-factor authentication (2FA), especially for anything email or money related.
    • Choose "dumb" devices over "smart" ones. No one needs a refrigerator that connects to the Internet.

Protect the $

Opt out from Data Brokers

  • Register for Preference Services (see the Privacy Spreadsheet)
  • As of 2026, California residents can now register at one website, DROP to automatically send opt-out/delete requests to all registered data brokers!
  • Opt Out from Data Brokers: Opt Out from as many data brokers as you have patience for (see Data Broker tab of the Privacy Spreadsheet). By opting out, you're unlisting yourself from the biggest websites people find your info.
    • Benefits of Opting Out: Less spam email, less spam calls, less risk of identity theft.

Make Informed Decisions

Conclusion

We're sold a world of convenience and connection, but the real cost is our autonomy. These systems are designed to erode your autonomy by limiting choices and strip away your agency by obscuring how they operate.

“Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say.”
Edward Snowden, NSA whistleblower

“If we don’t act to protect privacy, we risk living in a world where our lives are governed not by laws, but by corporate terms of service.” — Shoshana Zuboff, author of The Age of Surveillance Capitalism

"Seize the means of computation" — Cory Doctorow

"Data rights are human rights" — Carole Cadwalladr, the journalist who exposed Cambridge Analytica and Facebook

"Politics is technology now" - Carole Cadwalladr

My Resources

Other Resources

References on Data Privacy, Misuse, and Surveillance

General Data Collection & Use

Data Broker Practices & Civil Liberties

Identity & Personal Risk

Health & Genetic Data

Government & Law Enforcement Use

Targeted Ads, Voice Monitoring & “Active Listening”

Political Influence & Cambridge Analytica

Additional Cases

Books