WatchOut! How Even Innocent Data Can Be Used for Harmful Purposes
- Miriam Soesan

- Nov 27, 2019
- 3 min read
Updated: Oct 1, 2024
This blog is based on collaborative work conducted with Arjen van de Werfhorst, Jop Brandenburg, Lirry Pinter, and Gokie Wiegers as part of a project for the University of Amsterdam.
Introduction:
In the previous blogs, I’ve explored the dangers of oversharing and the ethical responsibilities of online platforms. Now, let’s dive into a conceptual system designed to stimulate thought about how easily available online information can be used for unethical purposes. WatchOut!, a hypothetical mobile system aimed at burglars, shows how even seemingly innocent data—like location information—can be manipulated for harmful purposes. This post will examine the potential risks posed by such a system and what it can teach us about the importance of data protection.
The WatchOut! System:
WatchOut! is a theoretical mobile application designed for burglars to assist in planning and executing burglaries. The system utilizes common tools, such as smartphones and smartwatches, to aid communication between a burglar and their lookout, or "watcher," while providing an escape route and navigation system. What makes this system alarming is how it demonstrates that technologies typically used for good can be repurposed for criminal intent, exploiting innocent user data along the way.
The system relies on tools like GPS and offline maps to track the burglar's movements and alert them of potential threats. It allows the "watcher" to send real-time updates, such as the arrival of police or the presence of neighbors, directly to the burglar's smartwatch, all while maintaining anonymity.
Exploiting Innocent Data:
One of the most unsettling aspects of WatchOut! is its ability to exploit seemingly harmless information, like neighborhood layouts or GPS coordinates. By using publicly available tools like Google Maps and combining them with the data users freely share online—such as their routine activities or home addresses—criminals can easily plan their crimes with minimal effort.
For example, by monitoring social media posts or running routes shared through apps, criminals can predict when someone is away from home. This data, combined with WatchOut!’s real-time navigation and updates, allows burglars to maximize their chances of success while minimizing their risks.
The Broader Implications of Data Misuse:
WatchOut! is a provocative reminder that even technologies designed with positive intentions, such as location-based services or fitness tracking, can be used against us. As digital platforms encourage users to share more of their lives online, the line between convenience and exploitation becomes increasingly blurred. This system highlights the broader implications of data misuse and raises critical questions about how much information we should share, even if it seems innocent.
What Can Be Done to Protect Users?
The potential for systems like WatchOut! to exist brings urgency to the conversation around user education and platform responsibility. While WatchOut! is a hypothetical example, the risks it illustrates are very real. It underscores the importance of educating users about the dangers of oversharing and the need for platforms to develop more robust tools to protect user data from misuse.
Conclusion:
The WatchOut! system is not designed to encourage unethical behavior but rather to stimulate thought about the real dangers of data misuse. By examining how innocent information can be weaponized, it urges us to reconsider how much we share online and highlights the urgent need for better protections against the misuse of personal data.

Resources:
Bernasco, W. (2006). Co-offending and the choice of target areas in burglary. Journal of Investigative Psychology and Offender Profiling, 3, 139-155.
Bluetooth SIG Proprietary (2017). Bluetooth Core Specification, V5.0. https://www.bluetooth.com/specications/bluetooth-core-specication
Cornish, D. B., & Clarke, R. V. (2014). The reasoning criminal: Rational choice perspectives on offending. Transaction Publishers.
Townsley, M., Birks, D., Bernasco, W., Ruiter, S., Johnson, S. D., White, G., & Baum, S. (2015). Burglar target selection: A cross-national comparison. Journal of Research in Crime and Delinquency, 52(1), 3-31.
Vandeviver, C., Neutens, T., van Daele, S., Geurts, D., & Vander Beken, T. (2015). A discrete spatial choice model of burglary target selection at the house-level. Applied Geography, 64, 24-34.


Comments