Privacy News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Let's say your teenager is a habitual truant and there is nothing you can do about it. A Washington area politician thinks he might have the solution: Fit the child with a Global Positioning System chip, then have police track him down. "It allows them to get caught easier," said Maryland Delegate Doyle Niemann (D-Prince George's), who recently co-sponsored legislation in the House that would use electronic surveillance as part of a broader truancy reduction plan. "It's going to be done unobtrusively. The chips are tiny and can be put into a hospital ID band or a necklace." Niemann's legislation mirrors a bill sponsored by state Sen. Gwendolyn Britt (D-Prince George's). Both would provide truants and their parents with better access to social services, such as mental health evaluations and help with schoolwork. Electronic monitoring would be a last resort. Still, the prospect of tagging children and using them in some "catch and release" hunt by police casts a pall over everything that's good about the plan. Odd how billions and billions of dollars keep going to a war that almost nobody wants, but there's never enough to fund the educational programs that nearly everybody says are needed. Aimed solely at students in Prince George's — the only predominantly black county in the Washington area — the truancy effort is called a "pilot program," a first-of-its-kind experiment. It would cost $400,000 to keep track of about 660 students a year.
Note: For more reliable information on the push to microchip the entire population, click here.
When Kevin Warwick enters his office building on the campus of Reading University, strange things happen. As Warwick heads down the main hall, lights turn on. When he turns to the right, an office door unbolts and opens. Each step is clocked and recorded. The building knows who he is, where he is, and what he expects to happen. The building [even] says, “Hello Professor Warwick.” The structure knows Warwick because of the electrical fuse-sized “smart card” implanted in his left arm. In Britain, he’s been dubbed “The Cyborg Man,” the first person known to have a microchip implanted in his body for communication with outside machines. Warwick predicts chip implants will one day replace time cards, criminal tracking devices, even credit cards. Capable of carrying huge amounts of data, they may, he says, one day be used to identify individuals by Social Security numbers, blood type, even their banking information. No one knows yet how the body will respond to this type of invasion. Warwick is not blind to the ethical questions of this technology. Implants ostensibly designed to clock workers in and out might be misused to monitor where people are at all times and who they are meeting. Governments could move to use implants instead of I.D. cards and passports, but what would stop them from using this new science to invade privacy? “I feel mentally different. When I am in the building I feel much more closely connected with the computer.
Note: Those who would like to control the public named these implants "smart cards" to encourage us to accept them. For more reliable information on important topic, click here and here.
Over the last two months, Chinese citizens have had to adjust to a new level of government intrusion. Getting into one’s apartment compound or workplace requires scanning a QR code, writing down one’s name and ID number, temperature and recent travel history. Telecom operators track people’s movements while social media platforms like WeChat and Weibo have hotlines for people to report others who may be sick. Some cities are offering people rewards for informing on sick neighbours. Chinese companies are meanwhile rolling out facial recognition technology that can detect elevated temperatures in a crowd or flag citizens not wearing a face mask. A range of apps use the personal health information of citizens to alert others of their proximity to infected patients. Experts say the virus ... has given authorities a pretext for accelerating the mass collection of personal data to track citizens. “It’s mission creep,” said Maya Wang, senior China researcher for Human Rights Watch. According to Wang, the virus is likely to be a catalyst for a further expansion of the surveillance regime. Citizens are particularly critical of a system called Health Code, which users can sign up for through Alipay or WeChat, that assigns individuals one of three colour codes based on their travel history, time spent in outbreak hotspots and exposure to potential carriers of the virus. The software, used in more than 100 cities, will soon allow people to check the colours of other residents when their ID numbers are entered.
Note: Learn in this New York Times article how everyone in China is given a red, yellow, or green code which determines how free they are to move about and even enter businesses. This article shows how foreigners are being stopped instantly from making live podcasts from China using facial recognition technology. For more along these lines, see concise summaries of deeply revealing news articles on the coronavirus and the disappearance of privacy from reliable major media sources.
In an exchange this week on "All-In Podcast," Alex Karp was on the defensive. The Palantir CEO used the appearance to downplay and deny the notion that his company would engage in rights-violating in surveillance work. "We are the single worst technology to use to abuse civil liberties, which is by the way the reason why we could never get the NSA or the FBI to actually buy our product," Karp said. What he didn't mention was the fact that a tranche of classified documents revealed by [whistleblower and former NSA contractor] Edward Snowden and The Intercept in 2017 showed how Palantir software helped the National Security Agency and its allies spy on the entire planet. Palantir software was used in conjunction with a signals intelligence tool codenamed XKEYSCORE, one of the most explosive revelations from the NSA whistleblower's 2013 disclosures. XKEYSCORE provided the NSA and its foreign partners with a means of easily searching through immense troves of data and metadata covertly siphoned across the entire global internet, from emails and Facebook messages to webcam footage and web browsing. A 2008 NSA presentation describes how XKEYSCORE could be used to detect "Someone whose language is out of place for the region they are in," "Someone who is using encryption," or "Someone searching the web for suspicious stuff." In May, the New York Times reported Palantir would play a central role in a White House plan to boost data sharing between federal agencies, "raising questions over whether he might compile a master list of personal information on Americans that could give him untold surveillance power."
Note: Read about Palantir's revolving door with the US government. As former NSA intelligence official and whistleblower William Binney articulated, "The ultimate goal of the NSA is total population control." For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
Everywhere you go online, you're being tracked. Almost every time you visit a website, trackers gather data about your browsing and funnel it back into targeted advertising systems, which build up detailed profiles about your interests and make big profits in the process. At the end of last year, thousands of websites started being more transparent about how many companies your data is being shared with. A WIRED analysis of the top 10,000 most popular websites shows that dozens of sites say they are sharing data with more than 1,000 companies, while thousands of other websites are sharing data with hundreds of firms. Quiz and puzzle website JetPunk tops the pile, listing 1,809 "partners" that may collect personal information, including "browsing behavior or unique IDs." More than 20 websites from publisher Dotdash Meredith–including Investopedia.com, People.com, and Allrecipes.com–all say they can share data with 1,609 partners. The newspaper The Daily Mail lists 1,207 partners, while internet speed-monitoring firm Speedtest.net, online medical publisher WebMD, and media outlets Reuters, ESPN, and BuzzFeed all state they can share data with 809 companies. DuckDuckGo keeps a record of the companies that have the biggest tracking footprint across the web. Among the most common trackers, Google has its technology on 79 percent of websites, while those from five other companies are on more than 20 percent of websites.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
The nation's largest pharmacy chains have handed over Americans' prescription records to police and government investigators without a warrant, a congressional investigation found, raising concerns about threats to medical privacy. Though some of the chains require their lawyers to review law enforcement requests, three of the largest – CVS Health, Kroger and Rite Aid, with a combined 60,000 locations nationwide – said they allow pharmacy staff members to hand over customers' medical records in the store. Pharmacies' records hold some of the most intimate details of their customers' personal lives, including years-old medical conditions and the prescriptions they take for mental health and birth control. Because the chains often share records across all locations, a pharmacy in one state can access a person's medical history from states with more-restrictive laws. The Health Insurance Portability and Accountability Act, or HIPAA, regulates how health information is used and exchanged among "covered entities" such as hospitals and doctor's offices. But the law gives pharmacies leeway as to what legal standard they require before disclosing medical records to law enforcement. In briefings, officials with eight American pharmacy giants – Walgreens Boots Alliance, CVS, Walmart, Rite Aid, Kroger, Cigna, Optum Rx and Amazon Pharmacy – told congressional investigators that they required only a subpoena, not a warrant, to share the records.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
On the morning of 10 June 2013 ... the journalist Glenn Greenwald and film-maker Laura Poitras published on the Guardian site a video revealing the identity of the NSA whistleblower behind one of the most damning leaks in modern history. It began: "My name is Ed Snowden." William Fitzgerald, then a 27-year-old policy employee at Google, knew he wanted to help. Fitzgerald found himself waiting in the lobby of the Hong Kong W Hotel to meet Greenwald and introduce him to Robert Tibbo and Jonathan Man – the men who became Snowden's legal representatives and hid him in the homes of Tibbo's refugee clients. The Snowden files told a ... sinister story, revealing mass surveillance by the US National Security Agency (NSA). The NSA files suggested that some tech firms, including Google, Facebook and Apple, were aware. Google and other tech firms worked to distance themselves from the NSA's efforts. But over time [Google's] culture appeared to shift, reflecting the changing needs of various governments. Google stopped promoting its transparency report to the media, free expression advocates were replaced by more traditional business-focused executives, and then there was Project Maven – the controversial Department of Defense drone project that Google signed on to build artificial intelligence for. Google isn't alone in vying for government contracts – Microsoft, Amazon, IBM have all since made a play for or struck multimillion-dollar deals to build tools of surveillance for various entities including the Pentagon.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
In the pandemic's bewildering early days, millions worldwide believed government officials who said they needed confidential data for new tech tools that could help stop coronavirus' spread. In return, governments got a firehose of individuals' private health details, photographs that captured their facial measurements and their home addresses. Now, from Beijing to Jerusalem to Hyderabad, India, and Perth, Australia, The Associated Press has found that authorities used these technologies and data to halt travel for activists and ordinary people, harass marginalized communities and link people's health information to other surveillance and law enforcement tools. In some cases, data was shared with spy agencies. China's ultra-strict zero-COVID policies recently ignited the sharpest public rebuke of the country's authoritarian leadership since ... 1989. Just as the balance between privacy and national security shifted after the Sept. 11 terrorist attacks, COVID-19 has given officials justification to embed tracking tools in society that have lasted long after lockdowns. What use will ultimately be made of the data collected and tools developed during the height of the pandemic remains an open question. Australia's intelligence agencies were caught "incidentally" collecting data from the national COVIDSafe app. In the U.S. ... the federal government took the opportunity to build out its surveillance toolkit, including two contracts in 2020 worth $24.9 million to the data mining and surveillance company Palantir Technologies Inc.
Note: Read an essay by constitutional attorney John W. Whitehead on COVID and the surveillance state. Detroit police recently sought COVID relief funds to install ShotSpotter microphones throughout the city. For more along these lines, see concise summaries of deeply revealing news articles on the coronavirus and the disappearance of privacy from reliable major media sources.
A whistleblower who works in Project Nightingale, the secret transfer of the personal medical data of up to 50 million Americans from one of the largest healthcare providers in the US to Google, has expressed anger to the Guardian that patients are being kept in the dark about the massive deal. The anonymous whistleblower has posted a video on the social media platform Daily Motion that contains a document dump of hundreds of images of confidential files relating to Project Nightingale. The secret scheme ... involves the transfer to Google of healthcare data held by Ascension, the second-largest healthcare provider in the US. The data is being transferred with full personal details including name and medical history and can be accessed by Google staff. Unlike other similar efforts it has not been made anonymous through a process of ... de-identification. The disclosed documents include highly confidential outlines of Project Nightingale, laying out the four stages or “pillars” of the secret project. By the time the transfer is completed next March, it will have passed the personal data of 50 million or more patients in 21 states to Google, with 10 million or so files already having moved across – with no warning having been given to patients or doctors. Google has entered into similar partnerships on a much smaller scale with clients such as the Colorado Center for Personalized Medicine. But in that case all the data handed over to the search giant was encrypted, with keys being held only on the medical side.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
Over time, the CIA upper echelon has secretly developed all kinds of policy statements and legal rationales to justify routine, widespread surveillance on U.S. soil of citizens who arent suspected of terrorism or being a spy. Newly declassified documents from 2014 ... reveal the CIA not only intercepted emails of U.S. citizens but they were emails of the most sensitive kind written to Congress and involving whistleblowers reporting alleged wrongdoing within the Intelligence Community. The disclosures, kept secret until now, are two letters of congressional notification from the Intelligence Community inspector general at the time, Charles McCullough. He stated that during routine counterintelligence monitoring of government computer systems, the CIA collected emails between congressional staff and the CIAs head of whistleblowing and source protection. McCullough added that he was concerned about the CIAs potential compromise to whistleblower confidentiality and the consequent chilling effect. The March 2014 intercepts ... happened amid whats widely referred to as the Obama administrations war on whistleblowers and mass surveillance scandals. The evidence points to bad actors targeting candidate Donald Trump and his associates in part to keep them - and us - from learning about and digging into an even bigger scandal: our Intelligence Community increasingly spying on its own citizens, journalists, members of Congress and political enemies for the better part of two decades.
Note: The above article was written by Emmy award winning investigative journalist and former news anchor for CBS and CNN Sharyl Attkisson. She has been attacked numerous times for investigating too deeply into the lives of certain politicians. Her top-selling book Stonewalled describes her fight for truth against powerful political forces. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
It's no secret that computers are insecure. The risks are about to get worse, because computers are being embedded into physical devices and will affect lives, not just our data. Many of today’s new computers are not just screens that we stare at, but objects in our world with which we interact. A refrigerator is now a computer that keeps things cold; a car is now a computer with four wheels and an engine. These computers sense us and our environment, and they affect us and our environment. They talk to each other over networks ... and they have physical agency. They drive our cars, pilot our planes, and run our power plants. They control traffic, administer drugs ... and dispatch emergency services. These connected computers and the network that connects them - collectively known as “the internet of things” - affect the world in a direct physical manner. Computers fail differently than most other machines: It's not just that they can be attacked remotely - they can be attacked all at once. It’s impossible to take an old refrigerator and infect it with a virus or recruit it into a denial-of-service botnet, and a car without an internet connection simply can’t be hacked remotely. But that computer with four wheels and an engine? It - along with all other cars of the same make and model - can be made to run off the road, all at the same time. Do we want to allow vulnerable automobiles on the streets and highways during the weeks before a new security patch is written, tested, and distributed?
Note: A 2015 New York Times article called the Internet of Things a "train wreck in privacy and security". Read how a hacked vehicle may have resulted in journalist Michael Hastings' death in 2013. For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy and the risks of wireless technologies.
At least 75 companies receive anonymous, precise location data from apps whose users enable location services. Several of those businesses claim to track up to 200 million mobile devices in the United States — about half those in use last year. The database reviewed by The Times ... reveals people’s travels in startling detail, accurate to within a few yards and in some cases updated more than 14,000 times a day. These companies sell, use or analyze the data to cater to advertisers, retail outlets and even hedge funds. It’s a hot market, with sales of location-targeted advertising reaching an estimated $21 billion this year. Businesses say their interest is in the patterns, not the identities, that the data reveals. They note that the information apps collect is tied not to someone’s name or phone number but to a unique ID. But those with access to the raw data — including employees or clients — could still identify a person without consent. They could follow someone they knew, by pinpointing a phone that regularly spent time at that person’s home address. More than 1,000 popular apps contain location-sharing code from such companies. Google’s Android system was found to have about 1,200 apps with such code, compared with about 200 on Apple’s iOS.
Note: For more along these lines, see concise summaries of deeply revealing privacy news articles from reliable major media sources.
By now, almost everyone knows what Edward Snowden did. He leaked top-secret documents revealing that the National Security Agency was spying on hundreds of millions of people. The key to Snowden’s effectiveness, according to Thomas Devine, the legal director of the Government Accountability Project (GAP), was that he practised “civil disobedience” rather than “lawful” whistleblowing. “None of the lawful whistleblowers who tried to expose the government’s warrantless surveillance ... had any success,” Devine told me. “They came forward ... but the government just said, ‘They’re lying. We’re not doing those things.’ And the whistleblowers couldn’t prove their case because the government had classified all the evidence.” The NSA whistleblowers were not leftwing peace nuts. They had spent their professional lives inside the US intelligence apparatus – devoted, they thought, to the protection of the homeland and defense of the constitution. They were political conservatives, highly educated, respectful of evidence, careful with words. And they were saying, on the basis of personal experience, that the US government was being run by people who were willing to break the law and bend the state’s awesome powers to their own ends. They were saying that laws and technologies had secretly been put in place that threatened to overturn the democratic governance Americans took for granted and shrink their liberties to a vanishing point.
Note: The article above was is adapted from Mark Hertsgaard’s book, Bravehearts: Whistle Blowing in the Age of Snowden. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
AI's promise of behavior prediction and control fuels a vicious cycle of surveillance which inevitably triggers abuses of power. The problem with using data to make predictions is that the process can be used as a weapon against society, threatening democratic values. As the lines between private and public data are blurred in modern society, many won't realize that their private lives are becoming data points used to make decisions about them. What AI does is make this a surveillance ratchet, a device that only goes in one direction, which goes something like this: To make the inferences I want to make to learn more about you, I must collect more data on you. For my AI tools to run, I need data about a lot of you. And once I've collected this data, I can monetize it by selling it to others who want to use AI to make other inferences about you. AI creates a demand for data but also becomes the result of collecting data. What makes AI prediction both powerful and lucrative is being able to control what happens next. If a bank can claim to predict what people will do with a loan, it can use that to decide whether they should get one. If an admissions officer can claim to predict how students will perform in college, they can use that to decide which students to admit. Amazon's Echo devices have been subject to warrants for the audio recordings made by the device inside our homes–recordings that were made even when the people present weren't talking directly to the device. The desire to surveil is bipartisan. It's about power, not party politics.
Note: As journalist Kenan Malik put it, "It is not AI but our blindness to the way human societies are already deploying machine intelligence for political ends that should most worry us." Read about the shadowy companies tracking and trading your personal data, which isn't just used to sell products. It's often accessed by governments, law enforcement, and intelligence agencies, often without warrants or oversight. For more, read our concise summaries of news articles on AI.
On July 2022, Morgan-Rose Hart, an aspiring vet with a passion for wildlife, died after she was found unresponsive at a mental health unit in Essex. Her death was one of four involving a hi-tech patient monitoring system called Oxevision which has been rolled out in nearly half of mental health trusts across England. Oxevision's system can measure a patient's pulse rate and breathing without the need for a person to enter the room, or disturb a patient at night, as well as momentarily relaying CCTV footage when required. Oxehealth, the company behind Oxevision, has agreements with 25 NHS mental health trusts, according to its latest accounts, which reported revenues of about Ł4.7m in ... 2023. But it is claimed in some cases staff rely too heavily on the infra-red camera system to monitor vulnerable patients, instead of making physical checks. There are also concerns that the system – which can glow red from the corner of the room – may worsen the distress of patients in a mental health crisis who may have heightened sensitivity to surveillance or control. Sophina, who has experience of being monitored by Oxevision while a patient ... said: "I think it was something about the camera and it always being on, and it's right above your bed. "It's the first thing you see when you open your eyes, the last thing when you go to sleep. I was just in a constant state of hypervigilance. I was completely traumatised. I still felt too scared to sleep properly."
Note: For more along these lines, read our concise summaries of news articles on Big Tech and mental health.
Each time you see a targeted ad, your personal information is exposed to thousands of advertisers and data brokers through a process called "real-time bidding" (RTB). This process does more than deliver ads–it fuels government surveillance, poses national security risks, and gives data brokers easy access to your online activity. RTB might be the most privacy-invasive surveillance system that you've never heard of. The moment you visit a website or app with ad space, it asks a company that runs ad auctions to determine which ads it will display for you. This involves sending information about you and the content you're viewing to the ad auction company. The ad auction company packages all the information they can gather about you into a "bid request" and broadcasts it to thousands of potential advertisers. The bid request may contain personal information like your unique advertising ID, location, IP address, device details, interests, and demographic information. The information in bid requests is called "bidstream data" and can easily be linked to real people. Advertisers, and their ad buying platforms, can store the personal data in the bid request regardless of whether or not they bid on ad space. RTB is regularly exploited for government surveillance. The privacy and security dangers of RTB are inherent to its design. The process broadcasts torrents of our personal data to thousands of companies, hundreds of times per day.
Note: Clearview AI scraped billions of faces off of social media without consent and at least 600 law enforcement agencies tapped into its database. During this time, Clearview was hacked and its entire client list – which included the Department of Justice, U.S. Immigration and Customs Enforcement, Interpol, retailers and hundreds of police departments – was leaked to hackers. For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
"Anonymity is a shield from the tyranny of the majority," wrote Supreme Court Justice John Paul Stevens in a 1995 ruling affirming Americans' constitutional right to engage in anonymous political speech. That shield has weakened in recent years due to advances in the surveillance technology available to law enforcement. Everything from social media posts, to metadata about phone calls, to the purchase information collected by data brokers, to location data showing every step taken, is available to law enforcement – often without a warrant. Avoiding all of this tracking would require such extrication from modern social life that it would be virtually impossible for most people. International Mobile Subscriber Identity (IMSI) catchers, or Stingrays, impersonate cell phone towers to collect the unique ID of a cell phone's SIM card. Geofence warrants, also known as reverse location warrants ... lets law enforcement request location data from apps on your phone or tech companies. Data brokers are companies that assemble information about people from a variety of usually public sources. Tons of websites and apps that everyday people use collect information on them, and this information is often sold to third parties who can aggregate or piece together someone's profile across the sites that are tracking them. Companies like Fog Data Science, LexisNexis, Precisely and Acxiom possess not only data on billions of people, they also ... have information about someone's political preferences as well as demographic information. Surveillance of social media accounts allows police to gather vast amounts of information about how protests are organized ... frequently utilizing networks of fake accounts. One firm advertised the ability to help police identify "activists and disruptors" at protests.
Note: For more along these lines, explore concise summaries of news articles on police corruption and the erosion of civil liberties from reliable major media sources.
A whistleblower group is suing the Department of Justice over its efforts to "secretly surveil" congressional staff conducting oversight on the FBI's Trump-Russia investigation. Empower Oversight Whistleblowers and Research says in a civil suit filed Tuesday that the DOJ has repeatedly stonewalled records requests involving the "undisputed" surveillance. Its suit seeks to force the Justice Department to hand over records related to the alleged unconstitutional surveillance. Empower's founder, Jason Foster, discovered in October that he was one of those congressional staff members surveilled by the Justice Department while serving as Iowa GOP Sen. Chuck Grassley's chief investigative counsel. "Last fall, @Google told me @TheJusticeDept forced it to secretly turn over my comms records in 2017," Foster posted on X, referencing a Sept. 12 subpoena that year for his private cell phone and email communications. Foster confirmed the DOJ and FBI also "targeted a dozen or so other Capitol Hill attorneys' personal accounts – from both political parties" who were looking into the FBI misconduct that included Foreign Intelligence Surveillance Act abuses as well. Both federal law-enforcement agencies later imposed non-disclosure orders for six years on Google and other big tech giants such as Apple and Verizon that had been subpoenaed for congressional staff communications.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
Surveillance technologies have evolved at a rapid clip over the last two decades – as has the government's willingness to use them in ways that are genuinely incompatible with a free society. The intelligence failures that allowed for the attacks on September 11 poured the concrete of the surveillance state foundation. The gradual but dramatic construction of this surveillance state is something that Republicans and Democrats alike are responsible for. Our country cannot build and expand a surveillance superstructure and expect that it will not be turned against the people it is meant to protect. The data that's being collected reflect intimate details about our closely held beliefs, our biology and health, daily activities, physical location, movement patterns, and more. Facial recognition, DNA collection, and location tracking represent three of the most pressing areas of concern and are ripe for exploitation. Data brokers can use tens of thousands of data points to develop a detailed dossier on you that they can sell to the government (and others). Essentially, the data broker loophole allows a law enforcement agency or other government agency such as the NSA or Department of Defense to give a third party data broker money to hand over the data from your phone – rather than get a warrant. When pressed by the intelligence community and administration, policymakers on both sides of the aisle failed to draw upon the lessons of history.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
If you appeared in a photo on Facebook any time between 2011 and 2021, it is likely your biometric information was fed into DeepFace – the company's controversial deep-learning facial recognition system that tracked the face scan data of at least a billion users. That's where Texas Attorney General Ken Paxton comes in. His office secured a $1.4 billion settlement from Meta over its alleged violation of a Texas law that bars the capture of biometric data without consent. Meta is on the hook to pay $275 million within the next 30 days and the rest over the next four years. Why did Paxton wait until 2022 – a year after Meta announced it would suspend its facial recognition technology and delete its database – to go up against the tech giant? If our AG truly prioritized privacy, he'd focus on the lesser-known companies that law enforcement agencies here in Texas are paying to scour and store our biometric data. In 2017, [Clearview AI] launched a facial recognition app that ... could identify strangers from a photo by searching a database of faces scraped without consent from social media. In 2020, news broke that at least 600 law enforcement agencies were tapping into a database of 3 billion facial images. Clearview was hit with lawsuit after lawsuit. That same year, the company was hacked and its entire client list – which included the Department of Justice, U.S. Immigration and Customs Enforcement, Interpol, retailers and hundreds of police departments – was leaked.
Note: For more along these lines, see concise summaries of deeply revealing news articles on AI and Big Tech from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.