Every move we make is subject to digital prying eyes, and once your data has been collected, there's no telling where it might end up. Here's who's looking at you, kid.

1 Hackers AFP/Getty Images State-sponsored computer spies, hacker collectives, criminals, and random trolls all mine the Internet for personal data. Some hackers trick users into giving up personal info; others steal it from government and business databases.

2 Online Services Searches and online email accounts provide rich sources of data for advertisers; weak password protection can also make personal online accounts prime targets for hackers.

3 Social Networks Even if you are restrictive with your privacy settings, social services such as Facebook, Google+, and Twitter follow you beyond their own websites—everywhere there is a Like, Tweet, or other recommendation button, the sites can track you.

4 Personal Computers Getty Images The nexus for most online snooping, PCs can be watched to monitor your browsing habits or taken over outright by spyware, enabling remote access to all of your personal files and control of the device itself.

5 Law Enforcement Scott Davidson/Flickr In the past 12 years, law enforcement agencies have been granted vast surveillance powers through changes in both the law and the technology available to them. Local, state, and federal authorities routinely access records about customers from private industry as well.

6 Vehicles Getty Images Cameras monitor cars from the outside, but many cars have Internet- connected telematics systems on the inside that log location and driver behavior. Insurers now offer safe-driver discounts for drivers who enable tracking devices on their vehicles.

7 Cameras AFP/Getty Images Both the quantity and capability of surveillance cameras have increased dramatically in the past decade. Modern license plate readers can process 1800 plates per minute, and facial recognition systems such as the one used by the Pennsylvania Justice Network can automatically match faces from surveillance footage to mug shots in criminal databases.

8 GPS AFP/Getty Images Access to Global Positioning System satellites is now routinely built into cars, smartphones, and tablet computers, making it possible to locate any of these devices to within 25 feet.

9 Cell Towers The Washington Post/Getty Images Cell companies collect data every time a mobile phone accesses a tower, whether or not a call is made. That leaves a time-coded trail of user movement accessible to law enforcement.

10 Smartphones Kevin Nixon/Future Publishing via Getty Images The gold standard of personal tracking devices, smartphones have embedded GPS, are Internet-connected, and can run software. They allow location and behavior to be tracked through your cellular provider, by the device manufacturer, and by the developers of the apps you install.

11 Companies Bloomberg via Getty Images Customer data is big business—for targeted advertising, sales leads, and behavioral analysis. Some firms collect data directly from customers; others use data aggregators, which amass bigger, richer databases from multiple sources. That information is sometimes hacked due to substandard security, and much of it is subject to subpoena by law enforcement.

12 Home Theater William Hook/Flickr Cable companies are experimenting with tracking and targeted advertising to individual households' cable boxes. Game systems that require online accounts can potentially expose a player's personal information to hackers.

13 Online Stores Getty Images North America Retailers such as Amazon and Apple's iTunes have made customer profiling part of their business strategy. Many stores use cookies, pixel tags, and Web beacons to track you to other sites as well—so the product you browsed at one site shows up as an ad at another.

14 Credit Cards Bloomberg via Getty Images Banks and credit card companies routinely sell your shopping data to marketers. Even the feds can sniff your purchases in real time via a warrantless "hotwatch" request.

This content is created and maintained by a third party, and imported onto this page to help users provide their email addresses. You may be able to find more information about this and similar content at piano.io