
Privacy Advocate Exposes All The Ways You're Being Surveilled
In the video below, civil rights lawyer, privacy advocate, and founder of the Surveillance Technology Oversight Project, Albert Fox Cahn uncovers the hidden ways surveillance technologies infiltrate nearly every aspect of modern life. You'll discover how your home has become a hub for data collection, how schools and workplaces are normalizing constant oversight, and how public spaces are losing their promise of anonymity. But it's not all doom and gloom—there are ways to push back. From understanding the risks of smart devices to advocating for stronger privacy laws, this exploration will equip you with the knowledge to navigate an increasingly monitored world. The question isn't whether you're being watched—it's how much control you can reclaim over your digital footprint. Surveillance and Privacy Risks Your Home: The New Epicenter of Data Collection
The home, once considered a sanctuary of privacy, has become a focal point for surveillance technologies. Devices such as smart speakers, connected appliances, and home security systems promise convenience and safety but come with substantial privacy risks. These gadgets continuously gather data, including voice recordings, video footage, and usage patterns, which are often shared with third parties like corporations or even law enforcement agencies.
For example, smart security cameras can provide footage to police with a warrant, and in some cases, you may not even be notified when your data is accessed. This level of intrusion underscores the need for stronger privacy protections and more transparent practices from technology providers. To safeguard your personal space, it is crucial to review device settings, restrict data-sharing permissions, and opt for products designed with user privacy in mind. By taking these steps, you can regain some control over the data generated within your home. Work and Education: Expanding the Reach of Surveillance
Surveillance technologies are no longer confined to traditional office environments. Schools, remote work setups, and even religious institutions are increasingly adopting monitoring tools. For instance, remote proctoring software used during online exams tracks students' behavior through webcams and microphones, raising concerns about data security and algorithmic biases. Similarly, workplace productivity tools monitor employees' activities, often without their explicit consent, blurring the lines between professional and personal life.
These practices not only erode privacy but also create an environment of constant oversight, which can affect mental well-being and trust. However, there are examples of resistance. Union-led efforts and student advocacy campaigns have successfully challenged some invasive practices, highlighting the importance of collective action. By organizing and voicing concerns, individuals and groups can push back against excessive surveillance and demand greater accountability from institutions. All The Ways You're Being Surveilled in 2025
Watch this video on YouTube.
Below are more guides on surveillance technologies from our extensive range of articles. Semi-Public Spaces: The Hidden Costs of Convenience
When you visit retail stores, attend events, or enter semi-public spaces, you may unknowingly be subjected to surveillance. Businesses increasingly deploy technologies like facial recognition to monitor customer behavior, often without clear disclosure or consent. While these systems are promoted as tools for enhancing security or improving customer experiences, they are far from infallible. Errors in facial recognition have led to wrongful accusations and detentions, exposing the technology's limitations and potential for harm.
As a consumer, you have the power to influence these practices. Supporting businesses that prioritize transparency and privacy can send a strong message. Additionally, advocating for regulations that require clear disclosure of surveillance practices can help ensure accountability. By making informed choices, you can contribute to a culture that values individual rights over unchecked monitoring. Public Spaces: The Decline of Anonymity
Public spaces, once synonymous with anonymity and freedom, are now heavily monitored. Streets, parks, and transportation hubs are equipped with surveillance tools such as facial recognition cameras and license plate readers. Even ride-sharing services contribute to this ecosystem by tracking users' movements. While these technologies are often justified as measures to enhance public safety, they come at the cost of personal freedom and autonomy.
The pervasive monitoring of public areas raises critical questions about the balance between security and privacy. As surveillance becomes more widespread, the concept of anonymity in public life is rapidly disappearing. This shift has profound implications for how individuals interact with their surroundings and exercise their rights in public spaces. Travel and Transit: Surveillance on the Move
Travelers encounter some of the most invasive forms of surveillance. Airports, border crossings, and transit hubs employ advanced technologies to monitor passengers. Customs officials may search digital devices, examining emails, photos, and social media activity. In some cases, algorithms analyze facial expressions and online behavior to assess potential security risks, further expanding the scope of surveillance.
To minimize your exposure, consider carrying fewer devices and limiting the sensitive data stored on them when traveling. However, individual actions alone are insufficient to address the systemic nature of these practices. Broader reforms and international agreements are necessary to protect travelers' privacy rights and ensure that surveillance measures are proportionate and transparent. Steps You Can Take to Protect Your Privacy
The rise of surveillance technologies calls for proactive measures to safeguard personal privacy. While systemic change requires collective action, there are steps you can take as an individual to reduce your exposure and advocate for broader reforms: Advocate for stronger privacy laws and regulations that limit the misuse of surveillance technologies.
and regulations that limit the misuse of surveillance technologies. Support organizations and initiatives that fight against invasive monitoring practices.
and initiatives that fight against invasive monitoring practices. Choose technologies and services that prioritize user privacy, such as those with end-to-end encryption or minimal data collection policies.
that prioritize user privacy, such as those with end-to-end encryption or minimal data collection policies. Educate yourself and others about the risks associated with surveillance and share strategies for mitigating them.
Privacy is a fundamental right, but preserving it in a surveillance-driven world requires vigilance and action. By staying informed, making deliberate choices, and supporting efforts to hold institutions accountable, you can play a role in shaping a future where privacy is respected and protected.
Media Credit: Proton Filed Under: Technology News, Top News
Latest Geeky Gadgets Deals
Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Geeky Gadgets
12 hours ago
- Geeky Gadgets
Privacy Advocate Exposes All The Ways You're Being Surveilled
What if your every move, word, and even thought could be tracked, analyzed, and stored? It might sound like the plot of a dystopian novel, but the reality is far closer to home—and far more insidious. From the moment you wake up and ask your smart speaker for the weather to the time you swipe your transit card or scroll through social media, you're leaving behind a digital trail. These seemingly mundane actions feed into a vast ecosystem of surveillance technologies that operate quietly in the background, often without your explicit consent. The tools marketed as conveniences or safety measures—smart devices, workplace monitoring software, facial recognition systems—are also gateways to an unprecedented erosion of personal privacy. Your home, workplace, and even public spaces are no longer the sanctuaries of anonymity they once were. In the video below, civil rights lawyer, privacy advocate, and founder of the Surveillance Technology Oversight Project, Albert Fox Cahn uncovers the hidden ways surveillance technologies infiltrate nearly every aspect of modern life. You'll discover how your home has become a hub for data collection, how schools and workplaces are normalizing constant oversight, and how public spaces are losing their promise of anonymity. But it's not all doom and gloom—there are ways to push back. From understanding the risks of smart devices to advocating for stronger privacy laws, this exploration will equip you with the knowledge to navigate an increasingly monitored world. The question isn't whether you're being watched—it's how much control you can reclaim over your digital footprint. Surveillance and Privacy Risks Your Home: The New Epicenter of Data Collection The home, once considered a sanctuary of privacy, has become a focal point for surveillance technologies. Devices such as smart speakers, connected appliances, and home security systems promise convenience and safety but come with substantial privacy risks. These gadgets continuously gather data, including voice recordings, video footage, and usage patterns, which are often shared with third parties like corporations or even law enforcement agencies. For example, smart security cameras can provide footage to police with a warrant, and in some cases, you may not even be notified when your data is accessed. This level of intrusion underscores the need for stronger privacy protections and more transparent practices from technology providers. To safeguard your personal space, it is crucial to review device settings, restrict data-sharing permissions, and opt for products designed with user privacy in mind. By taking these steps, you can regain some control over the data generated within your home. Work and Education: Expanding the Reach of Surveillance Surveillance technologies are no longer confined to traditional office environments. Schools, remote work setups, and even religious institutions are increasingly adopting monitoring tools. For instance, remote proctoring software used during online exams tracks students' behavior through webcams and microphones, raising concerns about data security and algorithmic biases. Similarly, workplace productivity tools monitor employees' activities, often without their explicit consent, blurring the lines between professional and personal life. These practices not only erode privacy but also create an environment of constant oversight, which can affect mental well-being and trust. However, there are examples of resistance. Union-led efforts and student advocacy campaigns have successfully challenged some invasive practices, highlighting the importance of collective action. By organizing and voicing concerns, individuals and groups can push back against excessive surveillance and demand greater accountability from institutions. All The Ways You're Being Surveilled in 2025 Watch this video on YouTube. Below are more guides on surveillance technologies from our extensive range of articles. Semi-Public Spaces: The Hidden Costs of Convenience When you visit retail stores, attend events, or enter semi-public spaces, you may unknowingly be subjected to surveillance. Businesses increasingly deploy technologies like facial recognition to monitor customer behavior, often without clear disclosure or consent. While these systems are promoted as tools for enhancing security or improving customer experiences, they are far from infallible. Errors in facial recognition have led to wrongful accusations and detentions, exposing the technology's limitations and potential for harm. As a consumer, you have the power to influence these practices. Supporting businesses that prioritize transparency and privacy can send a strong message. Additionally, advocating for regulations that require clear disclosure of surveillance practices can help ensure accountability. By making informed choices, you can contribute to a culture that values individual rights over unchecked monitoring. Public Spaces: The Decline of Anonymity Public spaces, once synonymous with anonymity and freedom, are now heavily monitored. Streets, parks, and transportation hubs are equipped with surveillance tools such as facial recognition cameras and license plate readers. Even ride-sharing services contribute to this ecosystem by tracking users' movements. While these technologies are often justified as measures to enhance public safety, they come at the cost of personal freedom and autonomy. The pervasive monitoring of public areas raises critical questions about the balance between security and privacy. As surveillance becomes more widespread, the concept of anonymity in public life is rapidly disappearing. This shift has profound implications for how individuals interact with their surroundings and exercise their rights in public spaces. Travel and Transit: Surveillance on the Move Travelers encounter some of the most invasive forms of surveillance. Airports, border crossings, and transit hubs employ advanced technologies to monitor passengers. Customs officials may search digital devices, examining emails, photos, and social media activity. In some cases, algorithms analyze facial expressions and online behavior to assess potential security risks, further expanding the scope of surveillance. To minimize your exposure, consider carrying fewer devices and limiting the sensitive data stored on them when traveling. However, individual actions alone are insufficient to address the systemic nature of these practices. Broader reforms and international agreements are necessary to protect travelers' privacy rights and ensure that surveillance measures are proportionate and transparent. Steps You Can Take to Protect Your Privacy The rise of surveillance technologies calls for proactive measures to safeguard personal privacy. While systemic change requires collective action, there are steps you can take as an individual to reduce your exposure and advocate for broader reforms: Advocate for stronger privacy laws and regulations that limit the misuse of surveillance technologies. and regulations that limit the misuse of surveillance technologies. Support organizations and initiatives that fight against invasive monitoring practices. and initiatives that fight against invasive monitoring practices. Choose technologies and services that prioritize user privacy, such as those with end-to-end encryption or minimal data collection policies. that prioritize user privacy, such as those with end-to-end encryption or minimal data collection policies. Educate yourself and others about the risks associated with surveillance and share strategies for mitigating them. Privacy is a fundamental right, but preserving it in a surveillance-driven world requires vigilance and action. By staying informed, making deliberate choices, and supporting efforts to hold institutions accountable, you can play a role in shaping a future where privacy is respected and protected. Media Credit: Proton Filed Under: Technology News, Top News Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.


The Guardian
2 days ago
- The Guardian
Microsoft launches inquiry into claims Israel used its tech for mass surveillance of Palestinians
Microsoft has launched an 'urgent' external inquiry into allegations Israel's military surveillance agency has used the company's technology to facilitate the mass surveillance of Palestinians. The company said on Friday the formal review was in response to a Guardian investigation that revealed how the Unit 8200 spy agency has relied on Microsoft's Azure cloud platform to store a vast collection of everyday Palestinian mobile phone calls. The joint investigation with the Israeli-Palestinian publication +972 Magazine and the Hebrew-language outlet Local Call found Unit 8200 made use of a customised and segregated area within Azure to store recordings of millions of calls made daily in Gaza and the West Bank. In a statement, Microsoft said 'using Azure for the storage of data files of phone calls obtained through broad or mass surveillance of civilians in Gaza and the West Bank' would be prohibited by its terms of service. The inquiry, to be overseen by lawyers at the US firm Covington & Burling, is the second external review commissioned by Microsoft into the use of its technology by the Israeli military. The first was launched this year amid dissent within the company and reports by the Guardian and others about Israel's reliance on the company's technology during its offensive in Gaza. Announcing the review's findings in May, Microsoft said it had 'found no evidence to date' the Israeli military had failed to comply with its terms of service or used Azure 'to target or harm people' in Gaza. However, the recent Guardian investigation prompted concerns among senior Microsoft executives about whether some of its Israel-based employees may have concealed information about how Unit 8200 uses Azure when questioned as part of the review. Microsoft said on Friday the new inquiry would expand on the earlier one, adding: 'Microsoft appreciates that the Guardian's recent report raises additional and precise allegations that merit a full and urgent review.' The company is also facing pressure from a worker-led campaign group, No Azure for Apartheid, which has accused it of 'complicity in genocide and apartheid' and demanded it cut off 'all ties to the Israeli military' and make them publicly known. Since the Guardian and its partners, +972 and Local Call, revealed Unit 8200's sweeping surveillance project last week, Microsoft has been scrambling to assess what data the unit holds in Azure. Several Microsoft sources familiar with internal deliberations said the company's leadership was concerned by information from Unit 8200 sources interviewed for the article, including claims that intelligence drawn from repositories of phone calls held in Azure had been used to research and identify bombing targets in Gaza. Israel's 22-month bombardment of the territory, launched after the Hamas-led attack on 7 October 2023, has killed more than 60,000 people, the majority of them civilians, according to the health authority in the territory, though the actual death toll is likely to be significantly higher. Senior Microsoft executives had in recent days considered an awkward scenario in which Unit 8200, an important and sensitive customer, could be in breach of the company's terms of service and human rights commitments, sources said. If you have something to share about this story, you can contact Harry Davies and Yuval Abraham using one of the following methods. Secure Messaging in the Guardian app The Guardian app has a tool to send tips about stories. Messages are end to end encrypted and concealed within the routine activity that every Guardian mobile app performs. This prevents an observer from knowing that you are communicating with us at all, let alone what is being said. If you don't already have the Guardian app, download it (iOS/Android) and go to the menu. Select 'Secure Messaging'. To send a message to Harry and Yuval please choose the 'UK Investigations' team. Signal Messenger You can message Harry using the Signal Messenger app. Use the 'find by username' option and type hfd.32 Email (not secure) If you don't need a high level of security or confidentiality you can email SecureDrop and other secure methods If you can safely use the tor network without being observed or monitored you can send messages and documents to the Guardian via our SecureDrop platform. Finally, our guide at lists several ways to contact us securely, and discusses the pros and cons of each. According to leaked files reviewed by the Guardian, the company was aware as early as late 2021 that Unit 8200 planned to move large volumes of sensitive and classified intelligence data into Azure. At Microsoft's headquarters in November that year, senior executives – including its chief executive, Satya Nadella – attended a meeting during which Unit 8200's commander discussed a plan to move as much as 70% of its data into the cloud platform. The company has said its executives, including Nadella, were not aware Unit 8200 planned to use or ultimately used Azure to store the content of intercepted Palestinian calls. 'We have no information related to the data stored in the customer's cloud environment,' a spokesperson said last week. An Israeli military spokesperson has previously said its work with companies such as Microsoft is 'conducted based on regulated and legally supervised agreements' and the military 'operates in accordance with international law'. The new inquiry will examine the military's commercial agreements with Microsoft. Once completed, the company will 'share with the public the factual findings that result from this review', its statement said.


Reuters
2 days ago
- Reuters
Chinese state media calls U.S. a 'surveillance empire' over trackers in chip shipments
BEIJING, Aug 15 (Reuters) - The United States' practice of installing location trackers in chip shipments at risk of diversion to China reflects the "instincts of a surveillance empire," China's state-run media outlet Xinhua said in a commentary published on Friday. Reuters reported earlier this week that U.S. authorities had secretly placed location tracking devices in targeted shipments of advanced chips to detect diversions to China, which is under U.S. curbs for advanced chip exports. The Xinhua commentary, titled "America turns chip trade into a surveillance game," cited "reports" that Washington had embedded such trackers, accusing the United States of running "the world's most sprawling intelligence apparatus". The U.S. government has in the past few years tightened restrictions on the exports of advanced chips as well as related technology and equipments to China, as the two superpowers vie for technological dominance. The Chinese commentary follows longstanding accusations from Washington and its Western allies that China could use some exported products, from telecommunications equipment to vehicles, for surveillance, posing potential security risks. In 2022, the Biden administration banned the sale and import of new telecommunications equipment from several Chinese firms, including Huawei, citing national security concerns. In January, it intensified scrutiny by targeting China-made cars and trucks. In its commentary, Xinhua accused the U.S. government of seeing its trading partners as "rivals to be tripped up or taken down," adding that "if U.S. chips are seen as Trojan horses for surveillance, customers will look elsewhere." China's cyberspace watchdog last month said it had asked U.S. chipmaker Nvidia to explain whether its H20 chips had any backdoor security risks - a hidden method of bypassing normal authentication or security controls. Chinese authorities have also cautioned domestic tech firms over their use of H20 chips, Reuters recently reported.