beanz Magazine

Your Digital Footprint

John Brooks on Flickr

Surveillance cameras, satellites, RFID tags, and social media activities all create unique digital footprints.

Put on a pair of boots and walk through soft snow. No snow around? Mud works too. Or get your shoes wet and walk along a paved sidewalk. If you want a more permanent imprint, wet cement might be a better choice. But if you really want to leave a mark, well you may already have one: your digital footprint.

Surveillance Cameras

Most Americans have cell phones, and most cell phones have cameras. So it is no surprise that a lot of pictures are being taken, and that many of us are photographed just about every day (both intentionally and unintentionally). What might come as more of a surprise is that we don’t just get recorded with cell phone cameras, but also with surveillance cameras found throughout both suburbs and cities. In some cases the goal is to help identify terrorists, while in others cities hope to prevent more common crimes including vandalism and car theft.  

Perhaps the hardest place to remain off of camera is the car. Police cars, road signs, traffic signals, and bridges all frequently have cameras recording license plate numbers, and the date, time, and location of each scan. In some cities we might be recorded while taking the bus or the subway. In others, while we swing on a play structure or rest under a tree. Even when cities themselves do not heavily invest in surveillance technology, private businesses do. Some record what happens between their own walls, while others place cameras just outside and monitor those passing by.

Does anyone actually have time to watch all this video? Probably not, but fortunately (or unfortunately if you don’t want to be found) they don’t have to. If a car was broken into on 5th and Broadway between 2:00-4:00 PM, and a witness describes the suspect as a white male wearing a green hat heading toward 6th street, there is software to search the video efficiently.


Become a subscriber and get access to the rest of this article. Plus all our magazine articles.

Stories also include numerous links to help parents, kids, and teachers learn more. Get access today at just $15 per year!

Subscribe Today!

Also In The February 2017 Issue

This cryptography method is based on the fact some tasks are relatively easy to do, but extremely difficult to undo.

There's a way to find out if your online passwords have been stolen, and how to prevent it.

Racket is a fun and easy programming language to learn because it's all about creating colors and shapes as you learn.

Networks are a mostly hidden but critical part of the internet.

Surveillance cameras, satellites, RFID tags, and social media activities all create unique digital footprints.

Developers deal with common problems in their work. Here’s are a few problems and how to overcome them.

Programmers use libraries but instead of books they create and share code, often for free, to help solve common problems.

These cards are a fun way to learn Scratch, look up how to do things, and make applications.

Another mysterious four-letter acronym that helps secure information online.

Dorothy Vaughn, Mary Jackson, and Katherine Johnson not only helped make history, they are part of a long line of women in computing

It's almost time to think about summer tech camps if your kids are interested. Here are a few questions to ask.

Your web browser knows (and tells) a lot more about you than you might realize.

When you pick a programming language to learn first, it helps to figure out what software you want to create.

This odd acronym offers security protection beyond your password. Here are a few examples of how 2FA works.

Links from the bottom of all the February 2017 articles, collected in one place for you to print, share, or bookmark.

Interesting stories about computer science, software programming, and technology for February 2017.