Cyber-Snooping: Origins Unknown?

25

description

A brief look at Cyber-Snooping and the infringement of adolescent and adult online privacy. Despite recent publicity, our cyber-security might just be at risk from sources we least expect, and trust the most.

Transcript of Cyber-Snooping: Origins Unknown?

Page 1: Cyber-Snooping: Origins Unknown?
Page 2: Cyber-Snooping: Origins Unknown?
Page 3: Cyber-Snooping: Origins Unknown?
Page 4: Cyber-Snooping: Origins Unknown?
Page 5: Cyber-Snooping: Origins Unknown?
Page 6: Cyber-Snooping: Origins Unknown?
Page 7: Cyber-Snooping: Origins Unknown?
Page 8: Cyber-Snooping: Origins Unknown?
Page 9: Cyber-Snooping: Origins Unknown?
Page 10: Cyber-Snooping: Origins Unknown?
Page 11: Cyber-Snooping: Origins Unknown?
Page 12: Cyber-Snooping: Origins Unknown?
Page 13: Cyber-Snooping: Origins Unknown?
Page 14: Cyber-Snooping: Origins Unknown?
Page 15: Cyber-Snooping: Origins Unknown?
Page 16: Cyber-Snooping: Origins Unknown?
Page 17: Cyber-Snooping: Origins Unknown?
Page 18: Cyber-Snooping: Origins Unknown?
Page 19: Cyber-Snooping: Origins Unknown?
Page 20: Cyber-Snooping: Origins Unknown?

The hacker was someone she knew

Page 21: Cyber-Snooping: Origins Unknown?
Page 22: Cyber-Snooping: Origins Unknown?
Page 23: Cyber-Snooping: Origins Unknown?
Page 24: Cyber-Snooping: Origins Unknown?
Page 25: Cyber-Snooping: Origins Unknown?