Frank M. Ahearn

Last updated

Frank M. Ahearn is a privacy expert [1] [2] [3] and The New York Times best-selling author. [4]

He is the author of:

Related Research Articles

<span class="mw-page-title-main">Leave No Trace</span> Set of outdoor ethics

Leave No Trace, sometimes written as LNT, is a set of ethics promoting conservation of the outdoors. Originating in the mid-20th century, the concept started as a movement in the United States in response to ecological damage caused by wilderness recreation. In 1994, the non-profit Leave No Trace Center for Outdoor Ethics was formed to create educational resources around LNT, and organized the framework of LNT into seven principles.

  1. Plan ahead and prepare
  2. Travel and camp on durable surfaces
  3. Dispose of waste properly
  4. Leave what you find
  5. Minimize campfire impacts
  6. Respect wildlife
  7. Be considerate of other visitors
<span class="mw-page-title-main">Joseph Force Crater</span> New York judge who disappeared in 1930

Joseph Force Crater was an American lawyer who served as a New York State Supreme Court Justice and mysteriously vanished shortly after the state began an investigation into corruption in New York City. Despite massive publicity, the missing persons case was never solved and was officially closed forty years after Crater was declared dead.

<span class="mw-page-title-main">European Digital Rights</span> Advocacy group

European Digital Rights is an international advocacy group headquartered in Brussels, Belgium. EDRi is a network collective of non-profit organizations (NGO), experts, advocates and academics working to defend and advance digital rights across the continent. As of October 2022, EDRi is made of more than 40 NGOs, as well as experts, advocates and academics from all across Europe.

Anti-computer forensics or counter-forensics are techniques used to obstruct forensic analysis.

<span class="mw-page-title-main">Daniel J. Solove</span> American professor of law

Daniel J. Solove is the Eugene L. and Barbara A. Bernard Professor of Intellectual Property and Technology Law at the George Washington University Law School. He is well known for his academic work on privacy and for popular books on how privacy relates with information technology.

<span class="mw-page-title-main">Digital footprint</span> Ones unique set of traceable digital activities

Digital footprint or digital shadow refers to one's unique set of traceable digital activities, actions, contributions, and communications manifested on the Internet or digital devices. Digital footprints can be classified as either passive or active. The former is composed of a user's web-browsing activity and information stored as cookies. The latter is often released deliberately by a user to share information on websites or social media. While the term usually applies to a person, a digital footprint can also refer to a business, organization or corporation.

<span class="mw-page-title-main">Private browsing</span> Privacy feature in some web browsers

Private browsing, also known as incognito mode or private mode, is a feature available in web browsers that allows users to browse the internet without leaving any traces of their online activity on their device. In this mode, the browser initiates a temporary session separate from its main session and user data. The browsing history is not recorded, and local data related to the session, like Cookies and Web cache, are deleted once the session ends. The primary purpose of these modes is to ensure that data and history from a specific browsing session do not remain on the device or get accessed by another user of the same device.

Michael Kramer is an American audiobook narrator. Kramer has recorded over a hundred audiobooks for trade publishers and has participated in the Library of Congress's Talking Books program.

<span class="mw-page-title-main">Digital privacy</span>

Digital privacy is often used in contexts that promote advocacy on behalf of individual and consumer privacy rights in e-services and is typically used in opposition to the business practices of many e-marketers, businesses, and companies to collect and use such information and data. Digital privacy, a crucial aspect of modern online interactions and services, can be defined under three sub-related categories: information privacy, communication privacy, and individual privacy.

Since the arrival of early social networking sites in the early 2000s, online social networking platforms have expanded exponentially, with the biggest names in social media in the mid-2010s being Facebook, Instagram, Twitter and Snapchat. The massive influx of personal information that has become available online and stored in the cloud has put user privacy at the forefront of discussion regarding the database's ability to safely store such personal information. The extent to which users and social media platform administrators can access user profiles has become a new topic of ethical consideration, and the legality, awareness, and boundaries of subsequent privacy violations are critical concerns in advance of the technological age.

<span class="mw-page-title-main">Howard Cannon (author)</span> American author, motivational speaker

Howard Cannon is an American author, consultant, motivational speaker, and expert witness in restaurant and bar matters. Cannon is the author of Restaurant OSHA Safety and Security: The Book of Restaurant Industry Standards and Best Practices (2016) and The Complete Idiot's Guide to Starting Your Own Restaurant (2011), among others. Cannon writes and speaks about restaurant safety, as well as the management and starting of restaurants and bars.

A cryptocurrency tumbler or cryptocurrency mixing service is a service that mixes potentially identifiable or "tainted" cryptocurrency funds with others, so as to obscure the trail back to the fund's original source. This is usually done by pooling together source funds from multiple inputs for a large and random period of time, and then spitting them back out to destination addresses. As all the funds are lumped together and then distributed at random times, it is very difficult to trace exact coins. Tumblers have arisen to improve the anonymity of cryptocurrencies, usually bitcoin, since the digital currencies provide a public ledger of all transactions. Due to its goal of anonymity, tumblers have been used to money launder cryptocurrency.

The Cyber Civil Rights Initiative (CCRI) is a non-profit organization. Founded in 2012 by Holly Jacobs, the organization offers services to victims of cybercrimes. The majority of which goes through its crisis helpline.

Paul Donald Kemp Jr. was an American advertising executive from New York City who disappeared in mysterious circumstances in a remote part of Wyoming in November 1982. He remained missing until his remains were discovered in 1985, a short distance from where his car was found abandoned four years previously.

<span class="mw-page-title-main">COVID-19 apps</span> Mobile apps designed to aid contact tracing

COVID-19 apps include mobile-software applications for digital contact-tracing - i.e. the process of identifying persons ("contacts") who may have been in contact with an infected individual - deployed during the COVID-19 pandemic.

<span class="mw-page-title-main">COVIDSafe</span> Contact tracing app by the Australian Department of Health

COVIDSafe was a digital contact tracing app released by the Australian Government on 26 April 2020 to help combat the ongoing COVID-19 pandemic. The app was intended to augment traditional contact tracing by automatically tracking encounters between users and later allowing a state or territory health authority to warn a user they have come within 1.5 metres with an infected person for 15 minutes or more. To achieve this, it used the BlueTrace and Herald protocol, originally developed by the Singaporean Government and VMWare respectively, to passively collect an anonymised registry of near contacts. The efficacy of the app was questioned over its lifetime, ultimately identifying just 2 confirmed cases by the time it was decommissioned on 16 August 2022.

<span class="mw-page-title-main">TCN Protocol</span> Proximity contact tracing protocol

The Temporary Contact Numbers Protocol, or TCN Protocol, is an open source, decentralized, anonymous exposure alert protocol developed by Covid Watch in response to the COVID-19 pandemic. The Covid Watch team, started as an independent research collaboration between Stanford University and the University of Waterloo was the first in the world to publish a white paper, develop, and open source fully anonymous Bluetooth exposure alert technology in collaboration with CoEpi after writing a blog post on the topic in early March.

<span class="mw-page-title-main">Digital contact tracing</span> Method of contact tracing using mobile devices

Digital contact tracing is a method of contact tracing relying on tracking systems, most often based on mobile devices, to determine contact between an infected patient and a user. It came to public prominence in the form of COVID-19 apps during the COVID-19 pandemic. Since the initial outbreak, many groups have developed nonstandard protocols designed to allow for wide-scale digital contact tracing, most notably BlueTrace and Exposure Notification.

<span class="mw-page-title-main">Covid Watch</span> Open source nonprofit founded in February 2020

Covid Watch was an open source nonprofit founded in February 2020 with the mission of building mobile technology to fight the COVID-19 pandemic while defending digital privacy. The Covid Watch founders became concerned about emerging, mass surveillance-enabling digital contact tracing technology and started the project to help preserve civil liberties during the pandemic.

References

  1. Ahearn, Frank M. "Privacy Expert | Blackmail Consultant". Privacy Expert | Blackmail Consultant. Retrieved 2024-05-02.
  2. "Interview with Frank M. Ahearn". Meer. 2014-03-14. Retrieved 2024-05-02.
  3. "Eccentric's Corner: The Master of Hide & Seek | Psychology Today". www.psychologytoday.com. Retrieved 2024-05-02.
  4. "Best Sellers". Nytimes.com. Retrieved 22 November 2014.
  5. Ahearn, Frank M.; Horan, Eileen C. (2010). How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish Without a Trace. ISBN   978-1599219776.
  6. [ dead link ]
  7. [ dead link ]