>ACT 1 Introduction (background)
>ACT 2 Tracking (injury)
>tracking you online (violation of privacy, retention of your data and data profiling you)
>criminally exposing you to further (data hacks/leaks)
>ACT 3 Odd Connections (guilty parties)
>facebook, twitter (commercial links)
>owl (interdasting observations)