https://www.youtube.com/watch?v=BXtDH2IXKY8
Extreme threats might require extreme measures. If the threat is low then the measures don't need to be so extreme.
When he says that the CIA can spy on you through your smart TV, that doesn't mean that they are spying on every American through their TVs.
I have no way of knowing if all of his claims are true. He could be seeking attention for personal gain.
We do know that the government was monitoring all international calls and emails.
According to Google...
Government internet activity monitoring
The government engages in widespread internet monitoring, meaning it is highly likely that your internet activity data is part of mass surveillance efforts and can be retrieved as needed. Targeted, individual surveillance typically requires legal authorization but is also possible.
How Government Monitoring Works
Government agencies like the NSA, FBI, and DHS collect information through various methods:
- Direct Access: Agencies obtain communications and data directly from major tech companies (Google, Facebook, Apple) and internet service providers (ISPs) like AT&T and Verizon, often via secret court orders or data-sharing agreements.
- Public Information: Federal agencies actively monitor publicly available online information and social media postings for investigations, threat detection, and situational awareness.
- Automated Systems & AI: Powerful AI-based tools analyze vast amounts of collected data and metadata to identify patterns, relationships, and potential threats.
- Malware: In some cases, agencies may use malware or spyware installed on a user's device to monitor activity.
What Data Is Collected
Agencies collect various types of data, depending on the surveillance program and legal basis:
- Metadata: This includes your IP address, the websites you visit, phone numbers called, duration of communications, and location data. This can reveal significant information about an individual's habits and associations.
- Content: Under certain legal authorities (like the Foreign Intelligence Surveillance Act), the content of communications, such as emails, instant messages, and phone calls, can be intercepted and analyzed.
- Social Media Data: Public posts, photos, likes, comments, and connections are collected and analyzed, sometimes without suspicion of wrongdoing.
Legal Framework
In the U.S., surveillance is conducted under laws such as the Foreign Intelligence Surveillance Act (FISA) and the USA PATRIOT Act, and Executive Orders. These laws balance national security needs with individual privacy rights under the Fourth Amendment, which protects against unreasonable searches and seizures.
- A federal court ruled in 2020 that the NSA's bulk data collection program was unlawful.
- Despite restrictions, transparency reports have shown that the FBI has used FISA to search the communications of millions of U.S. citizens without a traditional warrant.
Protecting Your Privacy
While no method is foolproof against advanced government capabilities, you can take steps to enhance your online privacy:
- Use a VPN: A reliable Virtual Private Network (VPN) encrypts your internet traffic, masking your browsing activities and IP address from third parties, including your ISP.
- Use Encrypted Communication: Use apps and services that offer strong end-to-end encryption for messaging and email.
- Minimize Oversharing: Be cautious about the amount of personal information you share on social media.
- Use Privacy-Focused Browsers/Search Engines: Consider using browsers and search engines that do not track your activity or history.
No comments:
Post a Comment