US as a Surveillance State
Schneier on Security
MAY 1, 2025
Two essays were just published on DOGE’s data collection and aggregation, and how it ends with a modern surveillance state. It’s good to see this finally being talked about.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Schneier on Security
MAY 1, 2025
Two essays were just published on DOGE’s data collection and aggregation, and how it ends with a modern surveillance state. It’s good to see this finally being talked about.
Schneier on Security
DECEMBER 13, 2023
This is not about mass surveillance of mail , this is about sorts of targeted surveillance the US Postal Inspection Service uses to catch mail thieves : To track down an alleged mail thief, a US postal inspector used license plate reader technology, GPS data collected by a rental car company, and, most damning of all, hid a camera inside one of the (..)
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Schneier on Security
FEBRUARY 15, 2022
Two US Senators claim that the CIA has been running an unregulated — and almost certainly illegal — mass surveillance program on Americans. The senator’s statement. Some declassified information from the CIA. No real details yet.
Schneier on Security
APRIL 4, 2024
The ProtonMail people are accusing Microsoft’s new Outlook for Windows app of conducting extensive surveillance on its users.
Schneier on Security
MARCH 20, 2020
Israel is using emergency surveillance powers to track people who may have COVID-19, joining China and Iran in using mass surveillance in this way. I believe pressure will increase to leverage existing corporate surveillance infrastructure for these purposes in the US and other countries. Expiration. Due Process.
Security Affairs
FEBRUARY 26, 2025
Researchers found an updated LightSpy spyware with enhanced data collection features targeting social media platforms like Facebook and Instagram. have found an updated version of the LightSpy spyware that supports an expanded set of data collection features to target social media platforms like Facebook and Instagram.
Schneier on Security
MARCH 30, 2020
The trade-offs are changing : As countries around the world race to contain the pandemic, many are deploying digital surveillance tools as a means to exert social control, even turning security agency technologies on their own civilians. I worry that in our haste and fear, we will fail to do any of that. More from EFF.
Schneier on Security
JANUARY 27, 2020
These efforts are well-intentioned, but facial recognition bans are the wrong way to fight against modern surveillance. Focusing on one particular identification method misconstrues the nature of the surveillance society we're in the process of building. Ubiquitous mass surveillance is increasingly the norm.
Adam Levin
SEPTEMBER 4, 2020
Bush in the wake of the September 11 attacks, but had been phased out by the NSA between 2018 and 2019 after disuse and technical issues had rendered the data collected unusable. . “[T]he The post NSA Mass Surveillance Program Is Ruled Illegal appeared first on Adam Levin. The ruling from the 9th U.S. Bush and Barack Obama. .
Schneier on Security
AUGUST 2, 2022
TheMarkup has an extensive analysis of connected vehicle data and the companies that are collecting it. The Markup has identified 37 companies that are part of the rapidly growing connected vehicle data industry that seeks to monetize such data in an environment with few regulations governing its sale or use.
Schneier on Security
MARCH 12, 2019
Gamification and algorithmic management of work activities through continuous data collection. More advanced time-tracking can generate itemized records of on-the-job activities, which can be used to facilitate wage theft or allow employers to trim what counts as paid work time.
Schneier on Security
JANUARY 30, 2024
It finally admitted to buying bulk data on Americans from data brokers, in response to a query by Senator Weyden. This is almost certainly illegal, although the NSA maintains that it is legal until it’s told otherwise. Some news articles.
Malwarebytes
JANUARY 20, 2025
Companies are showing customers different prices for the same goods and services based what data they have on them, including details like their precise location or browser history. The name for this method is surveillance pricing, and the FTC has just released initial findings of a report looking into that practice.
Schneier on Security
APRIL 12, 2022
John Oliver has an excellent segment on data brokers and surveillance capitalism.
Schneier on Security
JULY 23, 2021
A Catholic priest was outed through commercially available surveillance data.
Security Boulevard
MAY 2, 2024
In an age where manufacturers have decided that just about every device needs to be “smart,” it’s becoming difficult to avoid the data collection and privacy invasion that are often baked into these devices. The post The Surveillance Invasion: IoT and Smart Devices Stealing Corporate Secrets appeared first on Security Boulevard.
Schneier on Security
SEPTEMBER 26, 2019
The reason these threats are so real is that it's not difficult to hide surveillance or control infrastructure in computer components, and if they're not turned on, they're very difficult to find. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance.
Malwarebytes
SEPTEMBER 20, 2024
The conclusions seemed to upset the FTC, but we weren’t even mildly surprised: “The amount of data collected by large tech companies is simply staggering. Predicting, shaping, and monetizing human behavior through commercial surveillance is extremely profitable.” How they measure, promote, and research user engagement.
Security Boulevard
JANUARY 20, 2025
Specifically, stories and news items where public and/or private organizations have leveraged their capabilities to encroach on user privacy; for example, data brokers using underhanded means to harvest user location data without user knowledge or public organizations using technology without regard for user privacy.
Schneier on Security
JANUARY 21, 2022
News article : It’s not clear whether the security flaws were intentional or not, but the report speculated that proper encryption might interfere with some of China’s ubiquitous online surveillance tools, especially systems that allow local authorities to snoop on phones using public wireless networks or internet cafes.
WIRED Threat Level
SEPTEMBER 28, 2022
Want to speak up against Big Tech, unjust data collection, and surveillance? Here's how to be an activist in your community and beyond.
SC Magazine
MARCH 10, 2021
A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.
Schneier on Security
FEBRUARY 3, 2022
There’s a lot of talk about quantum computing, monitoring 5G networks, and the problems of big data: The math department, often in conjunction with the computer science department, helps tackle one of NSA’s most interesting problems: big data.
Security Affairs
FEBRUARY 12, 2023
Australia’s Defense Department announced that they will remove surveillance cameras made by Chinese firms linked to the government of Beijing. Australia’s Defense Department is going to replace surveillance cameras made by Chinese firms Hikvision and Dahua, who are linked to the government of Beijing.
Schneier on Security
JULY 12, 2023
No surprise, but Google just changed its privacy policy to reflect broader uses of all the surveillance data it has captured over the years: Research and development : Google uses information to improve our services and to develop new products, features and technologies that benefit our users and the public.
CSO Magazine
AUGUST 22, 2022
A class action lawsuit filed last week in the Northern District of California accused Oracle of running a “worldwide surveillance machine” and violating the fundamental privacy rights of hundreds of millions of people. To read this article in full, please click here
Security Boulevard
JANUARY 28, 2022
While many organizations have prioritized managing and securing this data, the topic of data privacy has also come into question particularly given the rise of connected devices and AI surveillance features. The post Understanding APIs Role in Data Privacy appeared first on Security Boulevard.
Schneier on Security
SEPTEMBER 15, 2023
Where possible, favor openness and transparency over aggressive data collection or restrictions which erode civil liberties. Surveillance creep risks violating autonomy. Privacy Rights – Pervasive monitoring and data collection erode privacy rights and dignity. Focus only on proportional responses.
Schneier on Security
JANUARY 14, 2020
These insecurities are a result of market forces that prioritize costs over security and of governments, including the United States, that want to preserve the option of surveillance in 5G networks. What's more, U.S. Again, near-term self-interest has so far triumphed over society's long-term best interests.
Schneier on Security
MARCH 13, 2019
And if you read his 3,000-word post carefully, Zuckerberg says nothing about changing Facebook's surveillance capitalism business model. It even collects what it calls " shadow profiles " -- data about you even if you're not a Facebook user. Better use of Facebook data to prevent violence.
Threatpost
JANUARY 24, 2020
government to collect telephone data from millions of Americans. The newly-introduced bill targets the Patriot Act's Section 215, previously used by the U.S.
Krebs on Security
MAY 18, 2022
for “deceptive statements” the company and its founder allegedly made over how they handle facial recognition data collected on behalf of the Internal Revenue Service , which until recently required anyone seeking a new IRS account online to provide a live video selfie to ID.me. ” But several days after a Jan.
Security Boulevard
MARCH 24, 2025
Surveillance Tech in the News This section covers surveillance technology and methods in the news. These apps also frequently use Bluetooth data to gather location information and proximity to nearby devices.
Security Affairs
MARCH 1, 2020
The Register reports that the secret structures of GCHQ are part of the surveillance programme codenamed “CIRCUIT” and also refers to an Overseas Processing Centre 1 (OPC-1), while another centre, OPC-2, has been planned, according to documents leaked by Snowden. In the documents, the company is referred to as a “partner” codenamed Gerontic.
Security Affairs
NOVEMBER 24, 2020
The code found in both apps allowed to gather device data, including model, MAC address, carrier information, and IMSI (International Mobile Subscriber Identity) number. The data collection code was found in the Baidu Push SDK, used to show real-time notifications inside both apps.
Security Affairs
SEPTEMBER 20, 2024
German law enforcement agencies have been surveilling Tor network by operating their own servers for months. Research conducted by ARD’s Panorama and STRG_F revealed that data collected during surveillance is processed using statistical methods, effectively breaking Tor’s anonymity. ” reported the NDR.
Security Affairs
MARCH 4, 2024
Consumer groups assert that Meta is not adhering to various rules established by the European privacy regulation GDPR: Fair Processing (Article 5(1)(a)): Personal data must be processed lawfully, fairly, and transparently. Consumer groups claim that Meta’s data collection is unfair and lacks transparency.
Malwarebytes
NOVEMBER 18, 2024
While it may be easy to discount the data collection requests of an air fryer app , it is getting harder to buy any type of product today that doesn’t connect to the internet, request your data, or share that data with unknown companies and contractors across the world.
Security Boulevard
MARCH 17, 2025
Surveillance Tech in the News This section covers surveillance technology and methods in the news. Of course, personalized in this context means leveraging extensive amounts of data collected on people.
SecureWorld News
NOVEMBER 15, 2023
The automakers argued that their practice was necessary to provide certain features and services, such as hands-free calling and texting, and that customers had consented to the data collection by agreeing to the terms of service when they purchased their vehicles.
Malwarebytes
AUGUST 20, 2024
It reasons that when consumers buy a vehicle, they want a mode of transportation to get them from one point to another, but with GM (and its subsidiary OnStar) they unwittingly opt-in to an all-seeing surveillance system. The driving data collected and sold by GM included trip details like speed, seatbelt status, and driven distance.
Privacy and Cybersecurity Law
JUNE 29, 2020
Risk #1: Surveillance both from the State and surveillance capitalism. Digital solutions generally create the risk of law enforcement access to the data they collect. Capitalist surveillance particularly arose around the Quayside project because of the link to Alphabet and Google. Risk # 5: Data Monetization.
Malwarebytes
OCTOBER 25, 2021
A privacy-forward web browser, like Mozilla, or Brave, might tell you that online privacy means being protected from third-party tracking and surreptitious data collection.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content