Privacy News StoriesExcerpts of Key Privacy News Stories in Major Media
Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
According to recent research by the Office of the eSafety Commissioner, "nearly 1 in 5 young people believe it's OK to track their partner whenever they want". Many constantly share their location with their partner, or use apps like Life360 or Find My Friends. Some groups of friends all do it together, and talk of it as a kind of digital closeness where physical distance and the busyness of life keeps them apart. Others use apps to keep familial watch over older relatives – especially when their health may be in decline. When government officials or tech industry bigwigs proclaim that you should be OK with being spied on if you're not doing anything wrong, they're asking (well, demanding) that we trust them. But it's not about trust, it's about control and disciplining behaviour. "Nothing to hide; nothing to fear" is a frustratingly persistent fallacy, one in which we ought to be critical of when its underlying (lack of) logic creeps into how we think about interacting with one another. When it comes to interpersonal surveillance, blurring the boundary between care and control can be dangerous. Just as normalising state and corporate surveillance can lead to further erosion of rights and freedoms over time, normalising interpersonal surveillance seems to be changing the landscape of what's considered to be an expression of love – and not necessarily for the better. We ought to be very critical of claims that equate surveillance with safety.
Note: For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
Ever thought of having your genome sequenced? 23andMe ... describes itself as a "genetics-led consumer healthcare and biotechnology company empowering a healthier future". Its share price had fallen precipitately following a data breach in October 2023 that harvested the profile and ethnicity data of 6.9 million users – including name, profile photo, birth year, location, family surnames, grandparents' birthplaces, ethnicity estimates and mitochondrial DNA. So on 24 March it filed for so-called Chapter 11 proceedings in a US bankruptcy court. At which point the proverbial ordure hit the fan because the bankruptcy proceedings involve 23andMe seeking authorisation from the court to commence "a process to sell substantially all of its assets". And those assets are ... the genetic data of the company's 15 million users. These assets are very attractive to many potential purchasers. The really important thing is that genetic data is permanent, unique and immutable. If your credit card is hacked, you can always get a new replacement. But you can't get a new genome. When 23andMe's data assets come up for sale the queue of likely buyers is going to be long, with health insurance and pharmaceutical giants at the front, followed by hedge-funds, private equity vultures and advertisers, with marketers bringing up the rear. Since these outfits are not charitable ventures, it's a racing certainty that they have plans for exploiting those data assets.
Note: Watch our new video on the risks and promises of emerging technologies. For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
In 2009, Pennsylvania's Lower Merion school district remotely activated its school-issued laptop webcams to capture 56,000 pictures of students outside of school, including in their bedrooms. After the Covid-19 pandemic closed US schools at the dawn of this decade, student surveillance technologies were conveniently repackaged as "remote learning tools" and found their way into virtually every K-12 school, thereby supercharging the growth of the $3bn EdTech surveillance industry. Products by well-known EdTech surveillance vendors such as Gaggle, GoGuardian, Securly and Navigate360 review and analyze our children's digital lives, ranging from their private texts, emails, social media posts and school documents to the keywords they search and the websites they visit. In 2025, wherever a school has access to a student's data – whether it be through school accounts, school-provided computers or even private devices that utilize school-associated educational apps – they also have access to the way our children think, research and communicate. As schools normalize perpetual spying, today's kids are learning that nothing they read or write electronically is private. Big Brother is indeed watching them, and that negative repercussions may result from thoughts or behaviors the government does not endorse. Accordingly, kids are learning that the safest way to avoid revealing their private thoughts, and potentially subjecting themselves to discipline, may be to stop or sharply restrict their digital communications and to avoid researching unpopular or unconventional ideas altogether.
Note: Learn about Proctorio, an AI surveillance anti-cheating software used in schools to monitor children through webcams–conducting "desk scans," "face detection," and "gaze detection" to flag potential cheating and to spot anybody "looking away from the screen for an extended period of time." For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
Automakers are increasingly pushing consumers to accept monthly and annual fees to unlock preinstalled safety and performance features, from hands-free driving systems and heated seats to cameras that can automatically record accident situations. But the additional levels of internet connectivity this subscription model requires can increase drivers' exposure to government surveillance and the likelihood of being caught up in police investigations. Police records recently reviewed by WIRED show US law enforcement agencies regularly trained on how to take advantage of "connected cars," with subscription-based features drastically increasing the amount of data that can be accessed during investigations. Nearly all subscription-based car features rely on devices that come preinstalled in a vehicle, with a cellular connection necessary only to enable the automaker's recurring-revenue scheme. The ability of car companies to charge users to activate some features is effectively the only reason the car's systems need to communicate with cell towers. Companies often hook customers into adopting the services through free trial offers, and in some cases the devices are communicating with cell towers even when users decline to subscribe. In a letter sent in April 2024 ... US senators Ron Wyden and Edward Markey ... noted that a range of automakers, from Toyota, Nissan, and Subaru, among others, are willing to disclose location data to the government.
Note: Automakers can collect intimate information that includes biometric data, genetic information, health diagnosis data, and even information on people's "sexual activities" when drivers pair their smartphones to their vehicles. The automakers can then take that data and sell it or share it with vendors and insurance companies. For more along these lines, read our concise summaries of news articles on police corruption and the disappearance of privacy.
Data that people provide to U.S. government agencies for public services such as tax filing, health care enrollment, unemployment assistance and education support is increasingly being redirected toward surveillance and law enforcement. Originally collected to facilitate health care, eligibility for services and the administration of public services, this information is now shared across government agencies and with private companies, reshaping the infrastructure of public services into a mechanism of control. Once confined to separate bureaucracies, data now flows freely through a network of interagency agreements, outsourcing contracts and commercial partnerships built up in recent decades. Key to this data repurposing are public-private partnerships. The DHS and other agencies have turned to third-party contractors and data brokers to bypass direct restrictions. These intermediaries also consolidate data from social media, utility companies, supermarkets and many other sources, enabling enforcement agencies to construct detailed digital profiles of people without explicit consent or judicial oversight. Palantir, a private data firm and prominent federal contractor, supplies investigative platforms to agencies. These platforms aggregate data from various sources – driver's license photos, social services, financial information, educational data – and present it in centralized dashboards designed for predictive policing and algorithmic profiling. Data collected under the banner of care could be mined for evidence to justify placing someone under surveillance. And with growing dependence on private contractors, the boundaries between public governance and corporate surveillance continue to erode.
Note: For more along these lines, read our concise summaries of news articles on government corruption and the disappearance of privacy.
On July 2022, Morgan-Rose Hart, an aspiring vet with a passion for wildlife, died after she was found unresponsive at a mental health unit in Essex. Her death was one of four involving a hi-tech patient monitoring system called Oxevision which has been rolled out in nearly half of mental health trusts across England. Oxevision's system can measure a patient's pulse rate and breathing without the need for a person to enter the room, or disturb a patient at night, as well as momentarily relaying CCTV footage when required. Oxehealth, the company behind Oxevision, has agreements with 25 NHS mental health trusts, according to its latest accounts, which reported revenues of about Ł4.7m in ... 2023. But it is claimed in some cases staff rely too heavily on the infra-red camera system to monitor vulnerable patients, instead of making physical checks. There are also concerns that the system – which can glow red from the corner of the room – may worsen the distress of patients in a mental health crisis who may have heightened sensitivity to surveillance or control. Sophina, who has experience of being monitored by Oxevision while a patient ... said: "I think it was something about the camera and it always being on, and it's right above your bed. "It's the first thing you see when you open your eyes, the last thing when you go to sleep. I was just in a constant state of hypervigilance. I was completely traumatised. I still felt too scared to sleep properly."
Note: For more along these lines, read our concise summaries of news articles on Big Tech and mental health.
The owner of a data brokerage business recently ... bragged about the degree to which his industry could collect and analyze data on the habits of billions of people. Publicis CEO Arthur Sadoun said that ... his company [can] deliver "personalized messaging at scale" to some 91 percent of the internet's adult web users. To deliver that kind of "personalized messaging" (i.e., advertising), Publicis must gather an extraordinary amount of information on the people it serves ads to. Lena Cohen, a technologist with the Electronic Frontier Foundation, said that data brokers like Publicis collect "as much information as they can" about web users. "The data broker industry is under-regulated, opaque, and dangerous, because as you saw in the video, brokers have detailed information on billions of people, but we know relatively little about them," Cohen said. "You don't know what information a data broker has on you, who they're selling it to, and what the people who buy your data are doing with it. There's a real power/knowledge asymmetry." Even when state-level privacy regulations are passed (such as the California Consumer Privacy Law), those cases are often not given enough focus or resources for the laws to be enforced effectively. "Most government agencies don't have the resources to enforce privacy laws at the scale that they're being broken," Cohen said. Cohen added that she felt online behavioral advertising–that is, advertising that is based on an individual web user's specific browsing activity–should be illegal. Banning behavioral ads would "fundamentally change the financial incentive for online actors to constantly surveil" web users and share their data with brokers, Cohen said.
Note: Read more about the disturbing world of online behavioral ads, where the data isn't just used to sell products. It's often accessed by governments, law enforcement, intelligence agencies, and other actors–sometimes without warrants or oversight. This turns a commercial ad system into a covert surveillance network. For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
Former US congresswoman Tulsi Gabbard's ascendance to director of national intelligence last month signaled a major shift in views toward government surveillance at the highest rung of the US intelligence community. Major privacy groups this week urged Gabbard to declassify information concerning Section 702 of the Foreign Intelligence Surveillance Act (FISA)–the nation's cornerstone wiretap authority ... known to vacuum up large quantities of calls, texts, and emails belonging to Americans. The groups privately urged Gabbard this week to declassify information regarding the types of US businesses that can now be secretly compelled to install wiretaps on the US National Security Agency's (NSA) behalf. While it's no secret that the government routinely compels phone and email service providers like AT&T and Google into conducting wiretaps, Congress passed a new provision last year expanding the range of businesses that can receive such orders. Legal experts had warned in advance that the provision was far too ambiguous and likely to vastly increase the number of Americans whose communications are wiretapped. But their warnings were not heeded. In response to questions from the US Senate ... Gabbard backed the idea of requiring the Federal Bureau of Investigation to obtain warrants before accessing the communications of Americans swept up by the 702 program.
Note: For more along these lines, read our concise summaries of intelligence agency corruption and the disappearance of privacy.
A WIRED investigation into the inner workings of Google's advertising ecosystem reveals that a wealth of sensitive information on Americans is being openly served up to some of the world's largest brands despite the company's own rules against it. Experts say that when combined with other data, this information could be used to identify and target specific individuals. Display & Video 360 (DV360), one of the dominant marketing platforms offered by the search giant, is offering companies globally the option of targeting devices in the United States based on lists of internet users believed to suffer from chronic illnesses and financial distress, among other categories of personal data that are ostensibly banned under Google's public policies. Among a list of 33,000 audience segments obtained by the ICCL, WIRED identified several that aimed to identify people working sensitive government jobs. One, for instance, targets US government employees who are considered "decision makers" working "specifically in the field of national security." Another targets individuals who work at companies registered with the State Department to manufacture and export defense-related technologies, from missiles and space launch vehicles to cryptographic systems that house classified military and intelligence data. In the wrong hands, sensitive insights gained through [commercially available information] could facilitate blackmail, stalking, harassment, and public shaming.
Note: For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
A United States judge dismissed a lawsuit pursued by four American attorneys and journalists, who alleged that the CIA and former CIA Director Mike Pompeo spied on them while they were visiting WikiLeaks founder Julian Assange in Ecuador's London embassy. The lawsuit claimed that the plaintiffs, like all visitors, were required to "surrender" their electronic devices to employees of Undercover Global, a Spanish security company managed by David Morales that was hired by Ecuador to handle embassy security. They were unaware that UC Global had allegedly "copied the information stored on the devices" and shared the information with the CIA. Pompeo allegedly approved the copying of visitors' passports, "including pages with stamps and visas." He ensured that all "computers, laptops, mobile phones, recording devices, and other electronics brought into the embassy," were "seized, dismantled, imaged, photographed, and digitized." In September 2021, Yahoo News published an investigation "based on conversations with more than 30 former U.S. officials–eight of whom described details of the CIA's proposals to abduct Assange." Pompeo allegedly "championed" proposals to abduct Assange after WikiLeaks published the Vault 7 materials in 2017. Pompeo favored a rendition operation that would involve breaking into the Ecuador embassy to drag Assange out and bring him to the U.S. "via a third country."
Note: Read about the CIA plots to kidnap or assassinate Assange. For more along these lines, read our concise summaries of news articles on intelligence agency corruption.
Each time you see a targeted ad, your personal information is exposed to thousands of advertisers and data brokers through a process called "real-time bidding" (RTB). This process does more than deliver ads–it fuels government surveillance, poses national security risks, and gives data brokers easy access to your online activity. RTB might be the most privacy-invasive surveillance system that you've never heard of. The moment you visit a website or app with ad space, it asks a company that runs ad auctions to determine which ads it will display for you. This involves sending information about you and the content you're viewing to the ad auction company. The ad auction company packages all the information they can gather about you into a "bid request" and broadcasts it to thousands of potential advertisers. The bid request may contain personal information like your unique advertising ID, location, IP address, device details, interests, and demographic information. The information in bid requests is called "bidstream data" and can easily be linked to real people. Advertisers, and their ad buying platforms, can store the personal data in the bid request regardless of whether or not they bid on ad space. RTB is regularly exploited for government surveillance. The privacy and security dangers of RTB are inherent to its design. The process broadcasts torrents of our personal data to thousands of companies, hundreds of times per day.
Note: Clearview AI scraped billions of faces off of social media without consent and at least 600 law enforcement agencies tapped into its database. During this time, Clearview was hacked and its entire client list – which included the Department of Justice, U.S. Immigration and Customs Enforcement, Interpol, retailers and hundreds of police departments – was leaked to hackers. For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
Mitigating the risk of extinction from AI should be a global priority. However, as many AI ethicists warn, this blinkered focus on the existential future threat to humanity posed by a malevolent AI ... has often served to obfuscate the myriad more immediate dangers posed by emerging AI technologies. These "lesser-order" AI risks ... include pervasive regimes of omnipresent AI surveillance and panopticon-like biometric disciplinary control; the algorithmic replication of existing racial, gender, and other systemic biases at scale ... and mass deskilling waves that upend job markets, ushering in an age monopolized by a handful of techno-oligarchs. Killer robots have become a twenty-first-century reality, from gun-toting robotic dogs to swarms of autonomous unmanned drones, changing the face of warfare from Ukraine to Gaza. Palestinian civilians have frequently spoken about the paralyzing psychological trauma of hearing the "zanzana" – the ominous, incessant, unsettling, high-pitched buzzing of drones loitering above. Over a decade ago, children in Waziristan, a region of Pakistan's tribal belt bordering Afghanistan, experienced a similar debilitating dread of US Predator drones that manifested as a fear of blue skies. "I no longer love blue skies. In fact, I now prefer gray skies. The drones do not fly when the skies are gray," stated thirteen-year-old Zubair in his testimony before Congress in 2013.
Note: For more along these lines, read our concise summaries of news articles on AI and military corruption.
"Anonymity is a shield from the tyranny of the majority," wrote Supreme Court Justice John Paul Stevens in a 1995 ruling affirming Americans' constitutional right to engage in anonymous political speech. That shield has weakened in recent years due to advances in the surveillance technology available to law enforcement. Everything from social media posts, to metadata about phone calls, to the purchase information collected by data brokers, to location data showing every step taken, is available to law enforcement – often without a warrant. Avoiding all of this tracking would require such extrication from modern social life that it would be virtually impossible for most people. International Mobile Subscriber Identity (IMSI) catchers, or Stingrays, impersonate cell phone towers to collect the unique ID of a cell phone's SIM card. Geofence warrants, also known as reverse location warrants ... lets law enforcement request location data from apps on your phone or tech companies. Data brokers are companies that assemble information about people from a variety of usually public sources. Tons of websites and apps that everyday people use collect information on them, and this information is often sold to third parties who can aggregate or piece together someone's profile across the sites that are tracking them. Companies like Fog Data Science, LexisNexis, Precisely and Acxiom possess not only data on billions of people, they also ... have information about someone's political preferences as well as demographic information. Surveillance of social media accounts allows police to gather vast amounts of information about how protests are organized ... frequently utilizing networks of fake accounts. One firm advertised the ability to help police identify "activists and disruptors" at protests.
Note: For more along these lines, explore concise summaries of news articles on police corruption and the erosion of civil liberties from reliable major media sources.
Before the digital age, law enforcement would conduct surveillance through methods like wiretapping phone lines or infiltrating an organization. Now, police surveillance can reach into the most granular aspects of our lives during everyday activities, without our consent or knowledge – and without a warrant. Technology like automated license plate readers, drones, facial recognition, and social media monitoring added a uniquely dangerous element to the surveillance that comes with physical intimidation of law enforcement. With greater technological power in the hands of police, surveillance technology is crossing into a variety of new and alarming contexts. Law enforcement partnerships with companies like Clearview AI, which scraped billions of images from the internet for their facial recognition database ... has been used by law enforcement agencies across the country, including within the federal government. When the social networking app on your phone can give police details about where you've been and who you're connected to, or your browsing history can provide law enforcement with insight into your most closely held thoughts, the risks of self-censorship are great. When artificial intelligence tools or facial recognition technology can piece together your life in a way that was previously impossible, it gives the ones with the keys to those tools enormous power to ... maintain a repressive status quo.
Note: Facial recognition technology has played a role in the wrongful arrests of many innocent people. For more along these lines, explore concise summaries of revealing news articles on police corruption and the disappearance of privacy.
Air fryers that gather your personal data and audio speakers "stuffed with trackers" are among examples of smart devices engaged in "excessive" surveillance, according to the consumer group Which? The organisation tested three air fryers ... each of which requested permission to record audio on the user's phone through a connected app. Which? found the app provided by the company Xiaomi connected to trackers for Facebook and a TikTok ad network. The Xiaomi fryer and another by Aigostar sent people's personal data to servers in China. Its tests also examined smartwatches that it said required "risky" phone permissions – in other words giving invasive access to the consumer's phone through location tracking, audio recording and accessing stored files. Which? found digital speakers that were preloaded with trackers for Facebook, Google and a digital marketing company called Urbanairship. The Information Commissioner's Office (ICO) said the latest consumer tests "show that many products not only fail to meet our expectations for data protection but also consumer expectations". A growing number of devices in homes are connected to the internet, including camera-enabled doorbells and smart TVs. Last Black Friday, the ICO encouraged consumers to check if smart products they planned to buy had a physical switch to prevent the gathering of voice data.
Note: A 2015 New York Times article warned that smart devices were a "train wreck in privacy and security." For more along these lines, read about how automakers collect intimate information that includes biometric data, genetic information, health diagnosis data, and even information on people's "sexual activities" when drivers pair their smartphones to their vehicles.
Tech companies have outfitted classrooms across the U.S. with devices and technologies that allow for constant surveillance and data gathering. Firms such as Gaggle, Securly and Bark (to name a few) now collect data from tens of thousands of K-12 students. They are not required to disclose how they use that data, or guarantee its safety from hackers. In their new book, Surveillance Education: Navigating the Conspicuous Absence of Privacy in Schools, Nolan Higdon and Allison Butler show how all-encompassing surveillance is now all too real, and everything from basic privacy rights to educational quality is at stake. The tech industry has done a great job of convincing us that their platforms – like social media and email – are "free." But the truth is, they come at a cost: our privacy. These companies make money from our data, and all the content and information we share online is basically unpaid labor. So, when the COVID-19 lockdowns hit, a lot of people just assumed that using Zoom, Canvas and Moodle for online learning was a "free" alternative to in-person classes. In reality, we were giving up even more of our labor and privacy to an industry that ended up making record profits. Your data can be used against you ... or taken out of context, such as sarcasm being used to deny you a job or admission to a school. Data breaches happen all the time, which could lead to identity theft or other personal information becoming public.
Note: Learn about Proctorio, an AI surveillance anti-cheating software used in schools to monitor children through webcams–conducting "desk scans," "face detection," and "gaze detection" to flag potential cheating and to spot anybody "looking away from the screen for an extended period of time." For more along these lines, see concise summaries of deeply revealing news articles on Big Tech and the disappearance of privacy from reliable major media sources.
A whistleblower group is suing the Department of Justice over its efforts to "secretly surveil" congressional staff conducting oversight on the FBI's Trump-Russia investigation. Empower Oversight Whistleblowers and Research says in a civil suit filed Tuesday that the DOJ has repeatedly stonewalled records requests involving the "undisputed" surveillance. Its suit seeks to force the Justice Department to hand over records related to the alleged unconstitutional surveillance. Empower's founder, Jason Foster, discovered in October that he was one of those congressional staff members surveilled by the Justice Department while serving as Iowa GOP Sen. Chuck Grassley's chief investigative counsel. "Last fall, @Google told me @TheJusticeDept forced it to secretly turn over my comms records in 2017," Foster posted on X, referencing a Sept. 12 subpoena that year for his private cell phone and email communications. Foster confirmed the DOJ and FBI also "targeted a dozen or so other Capitol Hill attorneys' personal accounts – from both political parties" who were looking into the FBI misconduct that included Foreign Intelligence Surveillance Act abuses as well. Both federal law-enforcement agencies later imposed non-disclosure orders for six years on Google and other big tech giants such as Apple and Verizon that had been subpoenaed for congressional staff communications.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
Ford Motor Company is just one of many automakers advancing technology that weaponizes cars for mass surveillance. The ... company is currently pursuing a patent for technology that would allow vehicles to monitor the speed of nearby cars, capture images, and transmit data to law enforcement agencies. This would effectively turn vehicles into mobile surveillance units, sharing detailed information with both police and insurance companies. Ford's initiative is part of a broader trend among car manufacturers, where vehicles are increasingly used to spy on drivers and harvest data. In today's world, a smartphone can produce up to 3 gigabytes of data per hour, but recently manufactured cars can churn out up to 25 gigabytes per hour–and the cars of the future will generate even more. These vehicles now gather biometric data such as voice, iris, retina, and fingerprint recognition. In 2022, Hyundai patented eye-scanning technology to replace car keys. This data isn't just stored locally; much of it is uploaded to the cloud, a system that has proven time and again to be incredibly vulnerable. Toyota recently announced that a significant amount of customer information was stolen and posted on a popular hacking site. Imagine a scenario where hackers gain control of your car. As cybersecurity threats become more advanced, the possibility of a widespread attack is not far-fetched.
Note: FedEx is helping the police build a large AI surveillance network to track people and vehicles. Michael Hastings, a journalist investigating U.S. military and intelligence abuses, was killed in a 2013 car crash that may have been the result of a hack. For more along these lines, explore summaries of news articles on the disappearance of privacy from reliable major media sources.
Big tech companies have spent vast sums of money honing algorithms that gather their users' data and scour it for patterns. One result has been a boom in precision-targeted online advertisements. Another is a practice some experts call "algorithmic personalized pricing," which uses artificial intelligence to tailor prices to individual consumers. The Federal Trade Commission uses a more Orwellian term for this: "surveillance pricing." In July the FTC sent information-seeking orders to eight companies that "have publicly touted their use of AI and machine learning to engage in data-driven targeting," says the agency's chief technologist Stephanie Nguyen. Consumer surveillance extends beyond online shopping. "Companies are investing in infrastructure to monitor customers in real time in brick-and-mortar stores," [Nguyen] says. Some price tags, for example, have become digitized, designed to be updated automatically in response to factors such as expiration dates and customer demand. Retail giant Walmart–which is not being probed by the FTC–says its new digital price tags can be remotely updated within minutes. When personalized pricing is applied to home mortgages, lower-income people tend to pay more–and algorithms can sometimes make things even worse by hiking up interest rates based on an inadvertently discriminatory automated estimate of a borrower's risk rating.
Note: For more along these lines, see concise summaries of deeply revealing news articles on AI and corporate corruption from reliable major media sources.
Some renters may savor the convenience of "smart home" technologies like keyless entry and internet-connected doorbell cameras. But tech companies are increasingly selling these solutions to landlords for a more nefarious purpose: spying on tenants in order to evict them or raise their rent. Teman, a tech company that makes surveillance systems for apartment buildings ... proposes a solution to a frustration for many New York City landlords, who have tenants living in older apartments that are protected by a myriad of rent control and stabilization laws. The company's email suggests a workaround: "3 Simple Steps to Re-Regulate a Unit." First, use one of Teman's automated products to catch a tenant breaking a law or violating their lease, such as by having unapproved subletters or loud parties. Then, "vacate" them and merge their former apartment with one next door or above or below, creating a "new" unit that's not eligible for rent protections. "Combine a $950/mo studio and $1400/mo one-bedroom into a $4200/mo DEREGULATED two-bedroom," the email enticed. Teman's surveillance systems can even "help you identify which units are most-likely open to moving out (or being evicted!)." Two affordable New York City developments made headlines when tenants successfully organized to stop their respective owners' plans to install facial recognition systems: Atlantic Towers in Brooklyn and Knickerbocker Village in the Lower East Side.
Note: For more along these lines, see concise summaries of deeply revealing news articles on AI and corporate corruption from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.