Privacy News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
SpaceX is building a network of hundreds of spy satellites under a classified contract with a U.S. intelligence agency, five sources familiar with the program said. The network is being built by SpaceX's Starshield business unit under a $1.8 billion contract signed in 2021 with the National Reconnaissance Office (NRO), an intelligence agency that manages spy satellites. The plans show the extent of SpaceX's involvement in U.S. intelligence and military projects and illustrate a deeper Pentagon investment into vast, low-Earth orbiting satellite systems aimed at supporting ground forces. If successful, the sources said the program would significantly advance the ability of the U.S. government and military to quickly spot potential targets almost anywhere on the globe. Reuters reporting discloses for the first time that the SpaceX contract is for a powerful new spy system with hundreds of satellites bearing Earth-imaging capabilities that can operate as a swarm in low orbits. The planned Starshield network is separate from Starlink, SpaceX's growing commercial broadband constellation that has about 5,500 satellites in space. The classified constellation of spy satellites represents one of the U.S. government's most sought-after capabilities in space because it is designed to offer the most persistent, pervasive and rapid coverage of activities on Earth. "No one can hide," one of the sources said of the system's potential capability, when describing the network's reach.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Anything you purchase can be used against you. After the Jan. 6 Capitol clash, the Biden administration vastly expanded federal surveillance of average Americans. The Treasury Department's Financial Crimes Enforcement Network (FinCEN) stretched its "suspicious behavior" definition, warning banks to track "â€extremism' indicators that include â€transportation charges, such as bus tickets, rental cars, or plane tickets, for travel to areas with no apparent purpose,' or â€the purchase of books (including religious texts),'" the House committee reported. If you bought a gun or ammo since 2021, Team Biden bureaucrats may have automatically classified you as a "potential active shooter." FinCEN encouraged banks to use terms including "TRUMP" and "MAGA" for "identifying transactions on behalf of federal law enforcement," the House Judiciary Committee reports. Rep. Jordan is seeking sworn testimony about the FBI's "mass accumulation and use of Americans' private information without legal process." Jordan complained that the FBI "prepared an official report that broadly characterized certain political beliefs as indicative of domestic violent extremism." The Canadian government used emergency decrees to freeze the bank accounts of anyone suspected of being tied to COVID "Freedom Convoy" protests in 2022.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
Under ... Section 702 [of the Foreign Intelligence Surveillance Act], the US government collects hundreds of millions of phone calls, emails, and text messages each year. An inestimable chunk belongs to American citizens, permanent residents, and others in the United States neither suspected nor accused of any crime. Police and intelligence agencies buy their way around the Fourth Amendment by paying US companies for information that they'd otherwise demand a warrant to disclose. The House Intelligence Committee's bill–the FISA Reform and Reauthorization Act, or FRRA–does nothing to address this privacy threat. What the FRRA does appear to do, despite its name, is explode the number of companies the US government may compel to cooperate with wiretaps under Section 702. That was the assessment on Friday of Marc Zwillinger, amicus curiae to the Foreign Intelligence Surveillance Court of Review (FISCR). Section 702 currently allows the government to compel a class of companies called "electronic communications providers" to collect communications. If the FRRA becomes law, according to Zwillinger, that category would be greatly expanded to include a slew of new businesses, including "data centers, colocation providers, business landlords, and shared workspaces," as well as, he says, "hotels where guests connect to the internet." Communications may be seized under 702 and only years later dug up for an entirely different reason.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
People around the world are getting their eyeballs scanned in exchange for a digital ID and the promise of free cryptocurrency. The Worldcoin project says it aims to create a new "identity and financial network" and that its digital ID will allow users to, among other things, prove online that they are human, not a bot. The project launched on Monday, with eyeball scans taking place in countries including Britain, Japan and India. At a crypto conference in Tokyo, people on Tuesday queued in front of a gleaming silver globe flanked by placards stating: "Orbs are here." Applicants lined up to have their irises scanned by the device, before waiting for the 25 free Worldcoin tokens the company says verified users can claim. Worldcoin's data-collection is a "potential privacy nightmare," said the Electronic Privacy Information Center. Worldcoin's privacy policy ... says that data may be passed to subcontractors and could be accessed by governments and authorities. UK privacy campaign group Big Brother Watch said there was a risk biometric data could be hacked or exploited. "Digital ID systems increase state and corporate control over individuals' lives and rarely live up to the extraordinary benefits technocrats tend to attribute to them," senior advocacy officer Madeleine Stone said. In a mall in Bengaluru, India, orb-operators approached passers-by on Tuesday and showed them how to sign up. Most interviewed by Reuters said they were not worried about privacy.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
When Edward Snowden blew the whistle on mass surveillance by the US government, he traded a comfortable existence in Hawaii, the paradise of the Pacific, for indefinite exile in Russia, now a pariah in much of the world. But 10 years after Snowden was identified as the source of the biggest National Security Agency (NSA) leak in history, it is less clear whether America underwent a similarly profound transformation in its attitude to safeguarding individual privacy. Was his act of self-sacrifice worth it – did he make a difference? On 6 June 2013, the Guardian published the first story based on Snowden's disclosures, revealing that a secret court order was allowing the US government to get Verizon to share the phone records of millions of Americans. The impact was dramatic. James Clapper, the director of national intelligence, who earlier that year had testified to Congress that the NSA did not collect data on millions of Americans, was forced to apologise and admit that his statement had been "clearly erroneous". The American Civil Liberties Union (ACLU) filed a constitutional lawsuit in federal court. It eventually led to a ruling that held the NSA telephone collection program was and always had been illegal, a significant breakthrough given that national security surveillance programs had typically been insulated from judicial review. You will not find any coherent statement by any US security official that says clearly what harm was done by these disclosures.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Footprints left on a beach. Air breathed in a busy room. Ocean water. Scientists have been able to collect and analyze detailed genetic data from human DNA from all these places, raising thorny ethical questions about consent, privacy and security when it comes to our biological information. The researchers from the University of Florida, who were using environmental DNA found in sand to study endangered sea turtles, said the DNA was of such high quality that the scientists could ... determine the genetic ancestry of populations living nearby. They could also match genetic information to individual participants who had volunteered to have their DNA recovered. Human DNA that has seeped into the environment through our spit, skin, sweat and blood could be used to help find missing persons, aid in forensic investigations to solve crimes, locate sites of archaeological importance, and for health monitoring. However, the ability to capture human DNA from the environment could have a range of unintended consequences – both inadvertent and malicious. These included privacy breaches, location tracking, data harvesting, and genetic surveillance of individuals or groups. [Researchers] retrieved DNA from footprints made in sand by four volunteers. They were able to sequence part of the participants' genomes. Next, the researchers took samples of air from a ... room in an animal clinic. The team recovered DNA that matched the staff volunteers [and] animal patients.
Note: This research was published in the journal Nature Ecology & Evolution. For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.
Frank Forrester Church sat in the US Senate for 24 years. He battled for civil rights and came to oppose the Vietnam war. He believed Americans were citizens, not subjects. Chairing the intelligence select committee was his most enduring accomplishment. James Risen, a Pulitzer-winning reporter now with the Intercept, sees him as a hero. The Last Honest Man is both paean and lament. "For decades ... the CIA's operations faced only glancing scrutiny from the White House, and virtually none from Congress," Risen writes. "True oversight would have to wait until 1975, and the arrival on the national stage of a senator from Idaho, Frank Church." For 16 months, Church and his committee scrutinized the CIA, FBI and National Security Agency and their many abuses. Political assassinations, covert operations and domestic surveillance finally received scrutiny and oversight. A plot to kill Fidel Castro, with an assist from organized crime, made headlines. So did the personal ties that bound John F Kennedy, mob boss Sam Giancana and their shared mistress, Judith Campbell Exner. Giancana was murdered before he testified. Before John Rosselli, another mobster, could make a third appearance, his decomposed body turned up in a steel fuel drum near Miami. Against this grizzly but intriguing backdrop, Risen's book is aptly subtitled: The CIA, the FBI, the Mafia, and the Kennedys – And One Senator's Fight to Save Democracy.
Note: Read more about James Risen's courageous reporting on the intelligence community. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The Georgia Army National Guard plans to combine two deeply controversial practices – military recruiting at schools and location-based phone surveillance – to persuade teens to enlist, according to contract documents reviewed by The Intercept. The federal contract materials outline plans by the Georgia Army National Guard to geofence 67 different public high schools throughout the state, targeting phones found within a one-mile boundary of their campuses with recruiting advertisements "with the intent of generating qualified leads of potential applicants for enlistment while also raising awareness of the Georgia Army National Guard." Geofencing refers generally to the practice of drawing a virtual border around a real-world area. The ad campaign will make use of a variety of surveillance advertising techniques, including capturing the unique device IDs of student phones, tracking pixels, and IP address tracking. It will also plaster recruiting solicitations across Instagram, Snapchat, streaming television, and music apps. The campaign plans not only call for broadcasting recruitment ads to kids at school, but also for pro-Guard ads to follow these students around as they continue using the internet and other apps, a practice known as retargeting. While the state's plan specifies targeting only high school juniors and seniors ages 17 and above, demographic ad targeting is known to be error prone, and experts told The Intercept it's possible the recruiting messages could reach the phones of younger children.
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and the disappearance of privacy from reliable major media sources.
The reptilian annual World Economic Forum at Davos, where the masters of the universe meet to congratulate themselves on their benevolent dictatorship, is home to many sinister ideas. This year, one of the creepiest discussions of all was delivered under the guise of progress and productivity. Nita Farahany, a Duke University professor and futurist, gave a presentation at Davos about neurotechnology that is creating "brain transparency." The new technologies, which Farahany says are being deployed in workplaces around the world ... include a variety of wearable sensors that read the brain's electrical impulses and can show how fatigued you are, whether you're focused on the task at hand or if your attention is wandering. According to Farahany, thousands of companies have hooked workers ranging from train drivers to miners up to these devices already, in the name of workplace safety. But what we are really discussing is workplace surveillance. Farahany paints a picture of a near future in which every office worker could be fitted with a small wearable that would constantly record brain activity, creating an omnipotent record of your thoughts, attention and energy that the boss could study at leisure. Farahany acknowledges that there could be drawbacks here: "Done poorly, it could become the most oppressive technology we've ever introduced on a wide scale." All of this raises the question: what exactly is your employer buying when they give you a paycheck? For bosses, the answer is simple: "Everything."
Note: Tune into a fascinating, 17 min. conversation about this issue that raises important questions about the overreliance on technology as a tool of control, under the guise of workplace safety. For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption from reliable major media sources.
The internet has come a long way since Tim Berners-Lee invented the world wide web in 1989. Now, in an era of growing concern over privacy, he believes it's time for us to reclaim our personal data. Through their startup Inrupt, Berners-Lee and CEO John Bruce have created the "Solid Pod" – or Personal Online Data Store. It allows people to keep their data in one central place and control which people and applications can access it, rather than having it stored by apps or sites all over the web. Users can get a Pod from a handful of providers. Not only is user data safe from corporations, and governments, it's also less likely to be stolen by hackers, Bruce says. Launched in 2017, Inrupt reportedly raised $30 million in December 2021 and Berners-Lee says it will help deliver the next iteration of the web – "Web 3." Paul Brody, a blockchain expert for analysts Ernst and Young, believes Web 3 could change the way we use the internet. "You'll hear people talk about Web 3 and decentralization as being very similar in ideas and goals," he says. "Owning your own data and really controlling your own commerce infrastructure is something that Web 3 will enable. It will be ultimately really transformational for users." Berners-Lee hopes his platform will give control back to internet users. "I think the public has been concerned about privacy – the fact that these platforms have a huge amount of data, and they abuse it," he says. "You need to get back to a situation where you have autonomy, you have control of all your data."
Note: For more along these lines, see concise summaries of deeply revealing news articles on the erosion of privacy from reliable major media sources.
In a cheerfully animated promotional video, a woman narrates Cubic Transportation Systems' vision for the future. Travelers will pay fares using a ticket-free mobile account. Real-time data will be aggregated, linked, and shared. "The more information that is gathered, the more powerful the system becomes," the narrator tells us. "The piece of the puzzle missing ... is you." Over the past decade, Cubic has taken the first steps toward actualizing its vision by snapping up contracts for the development of mobile-based, contactless fare collection systems in eight of America's 10 largest public transit networks. Transit authorities have embraced tap-to-pay technology for its convenience and speed, but privacy advocates are worried that the new fare collection systems pose serious surveillance and security risks. In addition to its transit operation, Cubic is a vast military contractor doing hundreds of millions of dollars in business with the U.S. military and sales to foreign militaries. The company supplies surveillance technologies, training simulators, satellite communications equipment, computing and networking platforms, and other military hardware and software. As Cubic's quiet grip on fare collection takes hold in more cities, the company's ability to process rider data grows with it, creating a sprawling corporate apparatus that has the extraordinary potential to gather up reams of information on the very people it is supposed to serve.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
As protesters around the country have marched against police brutality and in support of the Black Lives Matter movement, activists have spotted a recurring presence in the skies: mysterious planes and helicopters hovering overhead, apparently conducting surveillance on protesters. A press release ... revealed that the Drug Enforcement Agency and U.S. Marshals Service were asked by the Justice Department to provide unspecified support to law enforcement during protests. A few days later, a memo obtained by BuzzFeed News ... revealed that shortly after protests began in various cities, the DEA had sought special authority from the Justice Department to covertly spy on Black Lives Matter protesters on behalf of law enforcement. Both the DEA and the Marshals possess airplanes outfitted with so-called stingrays or dirtboxes: powerful technologies capable of tracking mobile phones or, depending on how they’re configured, collecting data and communications from mobile phones in bulk. That data can be used to identify people — protesters, for example — and track their movements during and after demonstrations, as well as to identify others who associate with them. They also can inject spying software onto specific phones. Stingrays are routinely used to target suspects in drug and other criminal investigations, but activists also believe the devices were used during protests against the Dakota Access pipeline, and against Black Lives Matter protesters over the last three months.
Note: Read more about invasive "stingray" technology and the secrecy surrounding its use. Learn how Google is siphoning all information about you it can get. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
Spies for centuries have trained their sights on those who shape destinies of nations: presidents, prime ministers, kings. And in the 21st century, most of them carry smartphones. Such is the underlying logic for some of the most tantalizing discoveries for an international investigation that in recent months scrutinized a list of more than 50,000 phone numbers that included – according to forensic analyses of dozens of iPhones – at least some people targeted by Pegasus spyware licensed to governments worldwide. The list contained the numbers of politicians and government officials by the hundreds. But what of heads of state and governments, arguably the most coveted of targets? Fourteen. Or more specifically: three presidents, 10 prime ministers and a king. Forensic testing that might have revealed infection by NSO's signature spyware, Pegasus, was not possible. Nor was it possible to determine whether any NSO client attempted to deliver Pegasus to the phones of these country leaders – much less whether any succeeded in turning these highly personal devices into pocket spies capable of tracking a national leader's nearly every movement, communication and personal relationship. According to NSO marketing materials and security researchers, Pegasus is designed to collect files, photos, call logs, location records, communications and other private data from smartphones, and can activate cameras and microphones as well for real-time surveillance at key moments.
Note: Read how this Pegasus spyware was used to target activists and journalists in Mexico. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
The FBI has come under intense criticism after a 2017 leak exposed that its counterterrorism division had invented a new, unfounded domestic terrorism category it called “black identity extremism.” A number of civil rights groups have filed public records requests to try to better understand who exactly the FBI is investigating under that designation. The latest batch of FBI documents ... reveals that between 2015 and 2018, the FBI dedicated considerable time and resources to opening a series of “assessments” into the activities of individuals and groups it mostly labeled “black separatist extremists.” This designation was eventually folded into the category of “black identity extremism.” Assessments differ from full-blown investigations - or “predicated investigations,” in the bureau’s lingo - because they do not need to be predicated on a factual basis. As a new report by the civil liberties group Defending Rights & Dissent notes, when choosing targets for an assessment, agents are allowed to use ethnicity, religion, or speech protected by the First Amendment as a factor, “as long as it is not the only one.” As the report notes, “Even though the standards for opening an assessment are extraordinarily low, the FBI is allowed to use extremely intrusive investigative techniques in performing them, including physical surveillance, use of informants, and pretextual interviews.” The bureau has in recent years shifted its target from those espousing “separatist” views to the much larger group of those protesting police violence.
Note: Read more about the FBI's use of "Black Identity Extremism" as a label in its terrorism investigations. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
Not only is Alexa listening when you speak to an Echo smart speaker, an Amazon employee is potentially listening, too. Amazon (AMZN) employs a global team that transcribes the voice commands captured after the wake word is detected and feeds them back into the software ... Bloomberg reports. Amazon reportedly employs thousands of full-time workers and contractors in several countries, including the United States, Costa Rica and Romania, to listen to as many as 1,000 audio clips in shifts that last up to nine hours. The audio clips they listen to were described as "mundane" and even sometimes "possibly criminal," including listening to a potential sexual assault. In a response to the story, Amazon confirmed to CNN Business that it hires people to listen to what customers say to Alexa. Amazon doesn't "explicitly" tell Alexa users that it employs people to listen to the recordings. Amazon said in its frequently asked question section that it uses "requests to Alexa to train our speech recognition and natural language understanding systems." People can opt out of Amazon using their voice recordings to improve the software in the privacy settings section of the Alexa app. Alexa auditors don't have access to the customers' full name or address, but do have the device's serial number and the Amazon account number associated with the device. Amazon previously has been embroiled in controversy for privacy concerns regarding Alexa.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.
It is widely regarded as the world's most potent spyware, capable of reliably cracking the encrypted communications of iPhone and Android smartphones. The software, Pegasus, made by an Israeli company, NSO Group, has been able to track terrorists and drug cartels. It has also been used against human rights activists, journalists and dissidents. Now, an investigation published Friday by The New York Times Magazine has found that Israel, which controls the export of the spyware ... has made Pegasus a key component of its national security strategy, using it to advance its interests around the world. The F.B.I. bought and tested NSO software for years with plans to use it for domestic surveillance until the agency finally decided last year not to deploy the tools. The F.B.I., in a deal never previously reported, bought the spyware in 2019. It also spent two years discussing whether to deploy a newer product, called Phantom, inside the United States. The discussions at the Justice Department and the F.B.I. continued until last summer. But Pegasus equipment is still in a New Jersey building used by the F.B.I. And the company also gave the agency a demonstration of Phantom, which could hack American phone numbers. A brochure ... says that Phantom allows American law enforcement and spy agencies to "turn your target's smartphone into an intelligence gold mine." In 2018 ... the C.I.A. bought Pegasus to help Djibouti, an American ally, fight terrorism, despite longstanding concerns about human rights abuses there.
Note: Read about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Vice-premier Sun Chunlan, one of the most senior government officials to visit the centre of the coronavirus outbreak [was] heckled by residents who yelled “fake, fake, everything is fake” as she inspected the work of a neighbourhood committee charged with taking care of quarantined residents. Videos posted online showed Sun and a delegation walking along the grounds while residents appeared to shout from their apartment windows, “fake, fake,” “it’s all fake,” as well as “we protest”. Since 12 February, all residential compounds in Wuhan have been put under lockdown, barring most residents from leaving their homes. In an unusual turn of events, on Friday various Chinese state media outlets reported the videos showing public discontent. Such videos are frequently censored. Yet, the People’s Daily posted a video subtitled in English showing one person shouting “fake, fake,” which has since been removed. A government-affiliated account on WeChat ... said in an essay posted on Thursday that all the facts of the incident were “basically true”. According to state broadcaster CCTV, Sun held a meeting immediately after the incident to deal with the complaints. Staff have been dispatched to visit the residents one by one. Observers say state media may be trying to co-opt discussion of the videos, which circulated widely online, and provide their own narrative of events. Elsewhere in China, schools in provinces reporting no new cases for a number of days, started to set their opening dates in a sign of the country returning to normal. Wuhan reported 126 new coronavirus cases on Thursday but the wider province of Hubei excluding the capital recorded none for the first time during the outbreak.
Note: Remember all of the privacy and freedoms given up after 9/11? How many of those have been given back? Learn more about the serious risk of the Coronavirus increasing the surveillance state in this excellent article. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
From 2008 to 2010, as Edward Snowden has revealed, the National Security Agency (NSA) collaborated with the British Government Communications Headquarters to intercept the webcam footage of over 1.8 million Yahoo users. The agencies were analyzing images they downloaded from webcams and scanning them for known terrorists who might be using the service to communicate, matching faces from the footage to suspects with the help of a new technology called face recognition. In attempting to find faces, the Pentagon's Optic Nerve program recorded webcam sex by its unknowing targets–up to 11 percent of the material the program collected was "undesirable nudity" that employees were warned not to access. And that's just the beginning of what face recognition technology might mean for us in the digital era. The U.S. government is in the process of building the world's largest cache of face recognition data, with the goal of identifying every person in the country. The creation of such a database would mean that anyone could be tracked wherever his or her face appears, whether it's on a city street or in a mall. Today's laws don't protect Americans from having their webcams scanned for facial data. "If cameras connected to databases can do face recognition, it will become impossible to be anonymous in society," [attorney Jennifer] Lynch says. That means every person in the U.S. would be passively tracked at all times.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
More than 60 years ago, in his "Foundation" series, the science fiction novelist Isaac Asimov invented a new science – psychohistory – that combined mathematics and psychology to predict the future. Now social scientists are trying to mine the vast resources of the Internet – Web searches and Twitter messages, Facebook and blog posts, the digital location trails generated by billions of cellphones – to do the same thing. The government is showing interest in the idea. This summer a little-known intelligence agency began seeking ideas from academic social scientists and corporations for ways to automatically scan the Internet in 21 Latin American countries for "big data," according to a research proposal. The three-year experiment ... is being financed by the Intelligence Advanced Research Projects Activity, or Iarpa. The automated data collection system is to focus on patterns of communication, consumption and movement of populations. It will use publicly accessible data, including Web search queries, blog entries, Internet traffic flow, financial market indicators, traffic webcams and changes in Wikipedia entries. It is intended to be an entirely automated system, a "data eye in the sky" without human intervention. Some social scientists and advocates of privacy rights are deeply skeptical of the project, saying it evokes queasy memories of Total Information Awareness, a post-9/11 Pentagon program that proposed hunting for potential attackers by identifying patterns in vast collections of public and private data.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Spit into a cup when you land in an airport, and your DNA is stored. Every phone in every city talks to every other nearby device. Cross-border travel is enabled only by governments sharing data about millions of private movements. These are all possible visions of a future that the coronavirus pandemic has rushed on us. But a lurch into an even more intense era of mass data-collection - the vast hoovering up of who went near whom and when, who is healthy to travel, and even scraps of personal DNA languishing in databases - appears to be on the verge of becoming the new reality. It took the attacks of September 11, 2001 to shove aside the previous decade's phobia of mass surveillance ... in exchange for keeping us safe from terror. Over the next 15 years, billions of people agreed to a tacit deal where Facebook or Google were permitted to learn a staggering amount about them. But the challenge presented by Covid-19 - and the urgent need to trace contacts and movements - is of another scale of intimacy. South Korea located over 10,000 cellphones near the latest outbreak and texted them. The UK government has toyed with a centralized database of movements and health records, secured by government cyber-spies, able potentially to see who has been sick and who they have been near. Russia and many others have issued QR codes. China is putting surveillance cameras right outside people's doors. Will we look back at 2020 as the moment privacy finally evaporated?
Note: For more along these lines, see concise summaries of deeply revealing news articles on the coronavirus and the disappearance of privacy from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.