Project for Privacy and Surveillance Accountability (PPSA)
  • Issues
  • Solutions
  • SCORECARD
  • News
  • About
  • TAKE ACTION
  • Issues
  • Solutions
  • SCORECARD
  • News
  • About
  • TAKE ACTION
  • Back
  • SCORECARD
  • Congressional Scorecard Rubric
  • Back
  • TAKE ACTION
  • Section 702 Reform
  • PRESS Act
  • DONATE

 NEWS & UPDATES

Pause
Current Time 0:09
/
Duration Time 0:12
Remaining Time -0:02
Loaded: 0%
Progress: 0%
00:00
Fullscreen
00:00
Unmute
Subtitles
  • subtitles off
Captions
  • captions off
Chapters
  • Chapters
  • Former NSA General Counsel Tells Senate to Bug Out on Oversight

    2/4/2026

     
    Picture
    ​Stewart Baker, former general counsel of the National Security Agency, opened his testimony before the Senate Judiciary Committee last week with a startling, if somewhat insolent, proposal.

    Baker’s proposal came at the beginning of that hearing on the “review and reform of the Foreign Intelligence Surveillance Act,” which centered around FISA Section 702. This is an authority enacted by Congress to enable spying on foreign targets on foreign soil without the need for a warrant or court order. Yet it has been used in recent years to enable warrantless government access to millions of Americans’ private communications.

    Section 702 sunsets in April 2026 after the last reauthorization in April 2024. The reauthorization debate now beginning on Capitol Hill is being used to explore not just Section 702, but many other surveillance authorities associated with it as well.

    “It’s time to say – let’s stop putting a sunset on 702,” Baker said. “It is only putting our most valuable security tool up for grabs every couple of years and then praying that there is enough bipartisan spirit in the Congress to do what needs to be done.”

    This flew in the face of remarks by Chairman Chuck Grassley (R-IA) and Ranking Member Dick Durbin (D-IL).

    Sen. Grassley said that while Section 702 is an “essential national security and intelligence tool,” he believes that “constant Congressional oversight and vigilance is also essential to ensure that this authority is exercised responsibly.”

    The chairman also expressed concern about FISA’s “reach” and said there is “still more work to be done.”

    To underscore this point, Sen. Grassley reminded the committee that he and Sen. Durbin have complained that an oversight measure passed into law in 2024 is being blocked by the Department of Justice.

    That law allows senators and staff members with high levels of security clearance to attend hearings of the Foreign Intelligence Surveillance courts. But an onerous set of restrictions imposed by the Justice Department under the Biden administration and continued by the Trump administration has made it impossible for Members of Congress to attend the hearings with staff – or even to discuss them with anyone, whether cleared staff or other senators.

    That is not a guardrail. It is a gag order.

    The Justice Department also asserts a right to remove senators and Members of Congress at will. This is peculiar, given that the right to remove people from a courtroom is normally exercised by the presiding judge, not a functionary from the executive branch.

    Ranking Member Sen. Durbin echoed the chairman on their “responsibility to conduct oversight” of Section 702. “For years the government has used it as a domestic spying tool to collect millions, maybe billions, of Americans’ private communications.”

    Sen. Durbin added that the government has been:

    “Reading our text messages and emails, and listening to our phone calls, all without a warrant requirement of the Fourth Amendment … Section 702 has been abused to spy on business and religious leaders, political parties, Members of Congress, campaign donors, journalists, and political protesters of all stripes.”

    The intelligence community has long played clever word games with Section 702 to enable such warrantless domestic spying. And when federal agencies are called out on their domestic spying, more often than not they fail to respond to their putative overseers on the Hill or to innumerable Freedom of Information Act (FOIA) requests filed by PPSA and other civil liberties organizations.

    Consider the letter of protest Sen. Grassley and Sen. Durbin sent in November to Attorney General Pam Bondi asking her to stop those executive branch restrictions on congressional oversight at the FISA court hearings.

    Three months have passed and Attorney General Bondi has yet to respond to the Chairman and Ranking Member of the Senate Judiciary Committee.
    ​
    Could we have a better example of why senators believe Congress must use sunsetting and other robust measures to try to compel oversight of an intelligence community that refuses to answer even basic questions?

      STAY UP TO DATE

    Subscribe to Newsletter
    DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

    This App Knows Users’ Masturbation Habits – and Now So Can the World

    2/2/2026

     
    Picture
    ​One of the unintended consequences of living in the digital age is that everything, sooner or later, becomes quantified as a data point. That now includes – insert “Rated R” warning here – an app user’s masturbation frequency. (Exercising great discipline, we will resist the temptation to make tasteless puns throughout this piece, though they practically write themselves. So, use your imagination.)

    Back to the story – addictions of many sorts are as old as humanity. If there’s a silver lining to the otherwise debatable benefits of social media, it may be the proliferation of apps now claiming to offer support for those who seek to overcome their habits. That includes the category of sexual addiction to pornography and masturbation.

    404 Media, which originally broke the story, says that an app devoted to helping users defeat their porn addiction is inadvertently sharing related data. This includes how often users look at porn, how they respond, and how it makes them feel when they do. 404 says the story is “a good reminder to think twice before giving any app your personal information.”

    The data also includes the users’ age. 404 Media’s reporting suggests that many of the affected users described themselves as minors – as many as 100,000 of the 600,000 whose records proved to be accessible. These vulnerabilities were apparently first reported to the app maker by an independent security researcher in September.

    To date, however, the company has not resolved the issue. In fact, its founder has dismissed the allegations as “a bit of a joke,” suggesting the potential for a data leak was faked. For privacy reasons, 404 isn’t naming the app. The root cause of this vulnerability is a long-understood flaw in Google Firebase, which is used by developers to build apps. This flaw is therefore easily replicated by experts. In other words, it’s no joke.

    The report indicates that for reasons unknown, Google itself hasn’t fixed the issue. But it’s even more curious that all app makers and even app marketplaces – in whose trust users place their data – haven’t done so, either. All of which means that when it comes to data security, an entry made in confidence can amount to global oversharing.

    "The data they can get on what motivates you, what actually makes you take an action – that's so valuable," says technology journalist Elaine Burke. “This is [about] so much more than what your browsing habits are and what you're interested in.” She warns that developers are sold on the notion that humans are “mathematical problems that can be solved with the right metric.”

    This story points to the larger issue of falsely believing that when it comes to defeating age-old personal issues in the 21st century, it’s as simple as thinking there’s an app for that. That impulse leads many to unknowingly risk their most personal data with the tap of a digital button. The promise is self-control. But the price might be a loss of privacy.

    This demolition of personal privacy by datapoint is made worse by the regular practice of a dozen federal agencies – ranging from the FBI to the IRS – to purchase Americans’ private digital information from data brokers and review it at will. That is all the more reason for Congress to pass a law that imposes a probable-cause warrant requirement before agencies can inspect Americans’ most private information.
    ​
    In the meantime, practice caveat venditor: seller beware – especially when the product is you.

      STAY UP TO DATE

    Subscribe to Newsletter
    DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

    What Iran’s Constitution Tells Us About Our Own

    2/2/2026

     
    Picture
    ​Greg Lukianoff of the Foundation for Individual Rights and Expression recently called the crisis in Iran the biggest free speech story in the world. It is also a reminder why we must struggle to uphold the unqualified guarantees in our nation’s Constitution.

    Consider how the internet blackout in Iran enabled a constellation of injustices and outrages against human rights – from the mass murder of protesters (now estimated to be in the thousands, if not tens of thousands), to the arbitrary arrests of people speaking their minds, to the random searches of people and their devices, the latter of which is forbidden in our country by the Fourth Amendment.

    The Iranian example powerfully illustrates the many ways in which it matters how idealistic-sounding constitutional protections are worded.

    For example, the Iranian Constitution states that Iranian women are equal to men. Not only that, but the life, dignity, and property of all individuals are “inviolate.” So are freedom of speech and belief. All these rights are guaranteed to Iranian citizens – except for the escape clauses and exceptions that allow the government to do whatever it wants.

    For example, Iran’s constitution declares:

    “The inspection of letters and the failure to deliver them, the recording and disclosure of telephone conversations, the disclosure of telegraphic and telex communications, censorship, or the willful failure to transmit them, eavesdropping, and all forms of covert investigation are forbidden, except as provided by law.”

    Which is to say: any law the government cares to create or cite.

    Other rights of Iranian citizens are qualified with conditionals – fully 20 of them (words that translate into “except,” “unless,” “in conformity with,” and more) – making Iranians’ rights subject to the state’s definition of social order, statutory convenience, and theocratic fascism. The right to an open trial is guaranteed, “unless a court determines that an open trial would be detrimental to public morality.”

    Our Bill of Rights contains no dress code. But the vagueness of Iran’s Constitution allows both the punishment of women who fail to wear a hijab in public, and the executions of sexual minorities. In contrast, the American Fourth Amendment constrains government surveillance of Americans without weasel words. To search Americans and their communications, the government must obtain a probable cause warrant. With the emergence of digital technology, our government often violates this amendment, but at least we have an unequivocal standard by which we can hold the government to task for its failings.

    It is no coincidence then that the 60-plus liberties spelled out in the Bill of Rights are integrated and mutually supporting. The guarantees of the Fourth Amendment, which ensure a high degree of privacy, necessarily protect our First Amendment rights. Thus, the encroachment by federal agencies on the Fourth Amendment is a concern for the health of all our rights. But at least we have a standard to appeal to. In an authoritarian state, when confronted with millions of people clamoring for democracy, the paper rights of Iran’s constitution collapse together.

    Iran shows us that our Fourth Amendment is not a technicality: it is a structural defense for every other liberty we possess. If we allow it to be weakened by convenience or fear, we inch closer to the kind of paper guarantees that collapse under pressure. Iran shows us the end state.
    ​

    The tragedy in Iran should give us all the more reason to cherish our Fourth Amendment and other rights – and to defend their boundaries fiercely.

      STAY UP TO DATE

    Subscribe to Newsletter
    DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

    WATCH: Sen. Wyden Exposes NSA Nominee’s “Unfamiliarity with Basic Constitutional Rights”

    1/29/2026

     
    Play
    Current Time 0:00
    /
    Duration Time 0:00
    Remaining Time -0:00
    Loaded: 0%
    Progress: 0%
    00:00
    0:00
    Fullscreen
    00:00
    Mute
    Subtitles
    • subtitles off
    Captions
    • captions off
    Chapters
    • Chapters
    • ​At a Senate Intelligence Committee hearing today (see 54:25), Sen. Ron Wyden (D-OR) probed Lt. Gen. Joshua Rudd – nominated to lead the National Security Agency – on whether he would obey the Fourth Amendment’s requirement for a probable cause warrant before surveilling the communications of American citizens in programs authorized by Section 702 of the Foreign Intelligence Surveillance Act.
       
      That authority was enacted by Congress to enable the surveillance of foreign terrorists and spies on foreign soil. The National Security Agency’s trawl of global communications has since become a resource for U.S. intelligence agencies to routinely spy on the communications of American citizens and other “U.S. persons” on American soil.
       
      Given that Congress is beginning to debate whether to continue the risk Section 702 poses to Americans’ privacy – with a vote on its reauthorization in April – you might think that Lt. Gen. Rudd would have a good grasp of the background on this issue, if not an actual opinion.
       
      The hearing revealed that he has neither.
       
      In response to Sen. Wyden’s questions, Lt. Gen. Rudd replied with non-answers. Worse, he admitted that he really didn’t understand the privacy issues at the heart of the looming Section 702 debate.
       
      Sen. Wyden framed his questions with a quote from Benjamin Franklin, who wrote: “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.” Sen. Wyden said that he sees “striking that balance” between safety and liberty as “essential.”
       
      The senator then asked: “General, if you are directed to target people in the United States for surveillance, will you insist that there will be a judicial warrant?”
       
      General Rudd replied: “What I can tell you, senator, is that if confirmed I will absolutely commit to executing the foreign intelligence mission of the NSA in accordance with the authorities it has been given and within all applicable laws.”
       
      Sen. Wyden came back: “That is about as vague as anything I’ve heard on the subject. And it seems to me that unfamiliarity with basic constitutional rights is not something that can be accepted in this position. It’s so crucial. I continue to believe that what I described for you is not mutually exclusive. Smart policies give you security and liberty. Not so smart policies give you less of both.”
       
      Sen. Wyden again asked whether Lt. Gen. Rudd could give us some insight into his thinking. Rudd gave another boilerplate non-answer answer.
       
      Sen. Wyden asked: “Do you believe that U.S. person searches of Section 702 collection should require a warrant except in emergencies, which has been largely the position of those who would like to find some common ground as we go forward?”
       
      General Rudd replied: “Senator that’s a topic I’d need to look into, and get a better understanding of, and give you a more fulsome and complete answer on that one.”
       
      An informed officer might have turned the tables on the senator and noted that a warrant requirement is set to be debated and voted on by Congress in April. He could then have sat back and added, “I will execute whatever laws you, Senator Wyden, and your colleagues pass.”
       
      But Lt. Gen. Rudd did not know to do that. Instead, he revealed he wasn’t even conversant with the issue. Not a good look at the hearing – and not very reassuring for the American people.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      PPSA Urges Supreme Court to Rein in Geofence Warrants

      1/27/2026

       

      Chatrie v. United States

      Picture
      The Project for Privacy & Surveillance Accountability is asking the U.S. Supreme Court to consider whether the Fourth Amendment allows law enforcement to use geofence warrants to retroactively track the movements of everyone in a defined area. These so-called “reverse warrants” involve law enforcement’s request for information from technology companies – like Google, Apple, Snapchat, Lyft, or Uber – that allows them to identify potential suspects in a crime.
       
      This case began with a robbery in 2019 of $200,000 from a credit union in Midlothian, Virginia. Detectives soon hit a dead end in a search for suspects. So they served Google with a geofence warrant to provide certain cellphone data for everyone who passed through a circumscribed area around the credit union.
       
      As a result, people suspected of no crime had their personal information examined by police. Targets included residents of a nursing home, diners and wait staff at a Ruby Tuesday restaurant, and guests who had checked into a Hampton Inn. The search led to the arrest and guilty plea of one Okello T. Chatrie, who now seeks to exclude this evidence on constitutional grounds.
       
      Federal Judge Mary Hannah Lauck noted that because Google logs cellphone users’ location 240 times a day, technology gives police “an almost unlimited pool from which to seek location data” in a broad area in which everyone has “effectively been tailed.” But the U.S. Court of Appeals for the Fourth Circuit, sitting en banc to review a divided panel decision, held that this geofence warrant did not violate the Fourth Amendment.
       
      The U.S. Supreme Court is now set to take up this question. In our brief, we are telling the Court that such dragnet surveillance is fundamentally incompatible with the Fourth Amendment’s core protections. 
       
      Geofence Warrants Are “Digital General Warrants”
       
      One of the primary abuses that motivated the Founders to create the Fourth Amendment was the use in colonial times of general warrants – broad search authorizations that allowed the King’s agents to rummage through private lives and property without individualized suspicion. Geofence warrants are their modern equivalent.
       
      Instead of naming a person or place to be searched based on probable cause, geofence warrants similarly authorize the government to sift through massive location databases to identify people who might be worth investigating.
       
      PPSA told the court that these warrants invert the constitutional order – everyone becomes a suspect first, and probable cause, if it appears at all, comes afterward.
       
      The Supreme Court’s Carpenter Decision Was Not a Narrow Exception
       
      Lower courts have struggled to apply the Supreme Court’s landmark decision in Carpenter v. United States (2018), which held that people have a reasonable expectation of privacy in long-term cellphone location records, even when those records are held by a third party. In Chatrie, the Fourth Circuit treated Carpenter as a narrow exception limited to long-term tracking of a single suspect. PPSA demonstrates that this take misreads the case entirely. 
       
      Carpenter reaffirmed a broader principle: Fourth Amendment protections must preserve the level of privacy that existed at the nation’s founding, even as technology evolves. The fact that data is held by a third party – or that the government demands only a “slice” of a much larger tracking database – does not erase reasonable expectations of privacy. A two-hour window into a comprehensive location history can still reveal intensely private information – where someone worships, seeks medical care, attends political meetings, or simply lives their daily life.
       
      PPSA is telling the Court that the privacy concerns raised by geofence warrants are even more severe than those in Carpenter, because they involve mass surveillance of unknown and unsuspected individuals. This is not targeted policing. It is suspicionless data mining.
       
      Your Privacy Rights Depend on Where You Live
       
      Courts across the country are sharply divided on this issue. The Fourth and Eleventh Circuits have suggested that geofence searches may not even trigger the Fourth Amendment. By contrast, the Fifth Circuit has correctly recognized that geofence warrants are unconstitutional in nearly all circumstances because they lack particularity and probable cause.
       
      That split leaves Americans’ privacy rights dependent on geography, and in the case of Texas, whether state or federal proceedings are involved. PPSA urges the Supreme Court to step in now, before this powerful surveillance tool becomes permanently normalized.
       
      The Constitution Must Keep Up with Technology
       
      As PPSA warns, geofence warrants are only the beginning. We told the High Court:
       
      “Fourth Amendment protections are not categorically lost when a person shares or stores his data with a third party while maintaining reasonable expectations and assurances of privacy. The Court should …  prevent a contrary understanding of Carpenter from continuing to erode Americans’ privacy – especially now, as third-party storage becomes more ubiquitous and artificial intelligence becomes powerful enough to piece together intimate information from seemingly innocuous details about a target’s life.”
       
      The data that this practice puts at risk is not limited to location. The government has used other forms of these “reverse search warrants” to extract other private data, such as identifying anyone who has searched for a specific phrase or forcing commercial genealogy companies to allow access to their DNA databases.
       
      Advances in artificial intelligence already allow law enforcement to infer locations from photos and videos, even when no geolocation data is attached. Without firm constitutional limits, today’s location dragnet could become tomorrow’s visual surveillance dragnet.
       
      The Fourth Amendment’s precise wording is designed to prevent unchecked surveillance. PPSA’s calls on the Supreme Court to reaffirm that Americans do not surrender their constitutional rights simply by carrying a cellphone.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      AI, Facecrime, and the Growing Risk of Emotional Surveillance

      1/27/2026

       
      Picture
      ​Are you having a good day! I certainly am! When I got to work this morning I could barely contain my excitement at seeing such a full inbox of wonderful things to do! I swear, at times it seems almost criminal to accept pay for doing work I love so much!

      [Smile in the direction of the workplace surveillance camera.]

      Anyway, I’d love to join you in the breakroom, but I really can’t wait to get back to my workstation! Toodles!

      Artificial intelligence is getting better at reading human emotion. It is used by commercial technology to perform “sentiment analysis,” reading the emotional tone of written communications – a valuable tool for HR departments, advertisers, and customer-engagement consultants.

      The next bold step is already at the threshold: AI that can read emotions in our voices, the fleeting micro-expressions on our faces, and our body language. This technology will certainly expand into policing, hiring, and education. Are you acting guilty? Did you hide something in your job interview? Are you bored by the teacher’s lecture?

      As biometric corridors become commonplace in U.S. airports, AI is being tested to read facial expressions and body language that could identify potential terrorists – based on the tidy theory that people who plan to blow themselves up at 35,000 feet tend to be nervous. But so are people who are running late for their connection, who just had an argument with a spouse, got fired, or are jet-lagged.

      Emine Akar in a blog for the Institute for the Future of Work enumerated the potential pitfalls of emotional surveillance: “Emotions are not simply reflexes. They are complex, contextual, and culturally shaped experiences. A tear can mean grief, joy, manipulation, or even boredom.”

      The other risk is that AI, which improves by the day, will read our emotions all too well. Pervasive emotional surveillance may force us to put on a happy face at work, school, and the airport. To frown may be to risk detention, detainment, or delay. We could even risk committing “facecrime,” to name just one of the clever neologisms of George Orwell’s 1984.

      That novel’s protagonist, Winston Smith, was well acquainted with facecrime. One had to always have an expression of love when watching Big Brother on the telescreen. One had to have an expression of rage when engaging in the mandatory two minutes of hate. Smith knew that the “smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself – anything that carried with it the suggestion of abnormality, of having something to hide.”

      When we allow machines to read our emotions, we risk giving them power over us. “The danger here is not just that machines fail to understand us,” Akar wrote. “It’s that they may begin to discipline us – nudging our expressions, altering our behavior, shaping our emotional lives in invisible ways.”

      This kind emotional manipulation was well captured in the movie Her, in which a man falls in love with an AI (not hard to do when the voice belongs to Scarlett Johansson). Pope Leo XIV is not being prescient – he is simply being current – when he warned us over the weekend about getting involved with “overly affectionate” chatbots, lest they become “hidden architects of our emotional states.”
      ​
      We need to be more concerned about the implications of emotionless minds that can read, exploit, and manipulate our emotions. The European Union’s AI Act is one example of how to restrict emotional surveillance at school, work, and other sensitive areas. It is time for Congress, states, and technology leaders to put proper guardrails on emotional surveillance of Americans as well.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      Trial Lawyers Buy Personal Medical Files to Shop for Clients

      1/26/2026

       
      ​The next time you get a letter asking you to join a class-action lawsuit for something that is in fact relevant to you … it’s probably not a coincidence.

      Epic Systems is the largest vendor of electronic health records (EHR) in the United States. A few years ago, its engineers noticed that some of its customers were behaving suspiciously. Their internal investigation revealed what they allege are “organized syndicates” that purchased records under false pretenses in order to use the data for non-treatment purposes – mostly to generate client leads for law firms.

      It's all in a new federal lawsuit against Health Gorilla and its customers. This suit was filed by Epic and various healthcare partners, including UMass Memorial, as detailed by Daniel Gilbert in The Washington Post last week (paywalled story here).

      Among other things, Epic’s investigation revealed that as many as thirty law firms appeared to have accessed patient records. Though no firms are named in the litigation, Epic says they don’t need to be. The suit alleges that, as gatekeeper, Health Gorilla was knowingly “in league with its connections’ misuse of health information as a commodity.”

      Epic also claims that Health Gorilla’s customers went to great lengths to disguise themselves as healthcare providers to hide their true intent. These tactics included adding junk data to patient charts to “give the false impression they are treating patients.” Fictitious websites, shell companies, and the use of sham National Provider Identification numbers are cited as additional evidence of malfeasance mentioned in the complaint.

      The lawsuit suggests that the schemers operate like a Hydra: “When one fraudulent entity is exposed, the bad actors birth a new one.” If Epic asked one company about unusual patterns in its records requests, submissions would abruptly stop only to be restarted by another.

      As Brittany Trang of STAT News notes, the current lawsuit “raises fresh questions about how to guarantee patient records are only shared with legitimate medical providers.” Industry expert Don Rucker agrees, calling it “a fight over who controls access to clinical data and how those data are governed once they move outside the provider's EHR.”

      Rucker and others point out that the HIPAA Privacy Rule – like most federal statutes on the matter – poorly defines “purpose of use,” leaving room for broad secondary categories that include, among other things, marketing.

      The legitimate use of anonymized patient data is beyond dispute, especially when combined with responsible AI practices. Meta-analyses, for example, can lead to scientific breakthroughs including lifesaving treatments and cures. Anonymized data can improve quality standards and innovations in both practice and research methods.
      ​
      In order for that to happen, HIPAA needs to be updated to protect privacy. A good first step would be for Congress to put guardrails on data brokers’ selling of Americans’ personal digital data.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      India’s Surveillance Regime Isn’t So Different From Ours

      1/25/2026

       
      Picture
      ​India is big on surveillance. In fact, you could call it a global surveillance innovator. Case in point: Sanchar Saathi, a state-authored spy app the government quietly demanded be pre-installed on all phones sold to its population of more than 1.4 billion people. Following widespread backlash, the order was rescinded.

      The Internet Freedom Foundation called this attempt an effort to convert “every smartphone sold in India into a vessel for state-mandated software that the user cannot meaningfully refuse, control, or remove.”

      India’s privacy policies rank among the world’s lowest, surpassed in most surveys only by the usual suspects, including China and Russia. Speaking of Russia, last August it mandated the pre-installation of the Kremlin’s Messenger Max app on every phone and tablet sold. So, if anything, India has joined the race for last place.

      Lest we gloat, however, while India is third from last, the United States is seventh from last. Fully 40 countries outrank us (Ireland, France, and Portugal are among the best-rated nations). All of this “matters for the U.S.,” warns Rana Ayyub in The Washington Post, “because the underlying pressures are strikingly familiar.” Those pressures are manifold and include the following (with links to recent examples of each):
      ​
      • Government purchases of data

      • Facial recognition technology

      • License plate readers

      • The absence of a comprehensive federal privacy law

      • Warrantless surveillance in violation of the Fourth Amendment

      India is a mirror for our democracy – “a preview,” to quote Ayyub again, “of the political, social, and democratic costs of letting state access to digital infrastructure expand unchecked.”

      A debate about whether or not to place meaningful checks on Section 702 of the Foreign Intelligence Surveillance Act looms this spring. It may be our last chance to begin reclaiming our Founders’ original defense of privacy – what Justice Louis Brandeis would eventually label the “right to be let alone.”
      ​
      It may already be too late for India. It is not too late for us.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      I Spy With My Little Eye – Students and Employees

      1/22/2026

       
      ​School prepares students for the world of work by instilling discipline, the ability to manage a schedule and prioritize, to solve problems with curiosity and teamwork… and to become accustomed to always being under the watchful eye of the American surveillance state.
       
      Public schools use AI software like Gaggle to scrutinize the emails, online chats, and online searches students make on school equipment. Joe Wilkins of Futurism recounts the ordeal reported by Lesley Mathis, a mother in Tennessee, whose eighth-grade daughter was “arrested, interrogated, strip-searched, and held in jail for a night, over some teasing online.”
       
      What was this student’s offense?
       
      Wilkins: “Specifically, the student’s friends had heckled her about her ‘Mexican’ complexion, even though she has a different ancestry. ‘On Thursday we kill all the Mexico’s,’ [sic] the eighth-grader quipped back.”
       
      Was the remark stupid, tasteless, and uncalled for? Yes, yes, and yes. But, as Wilkins writes, “it was clearly a bit of eighth-grade immaturity boiling over, not an actionable threat.” A school counselor would have seen this for what it was. AI did not.
       
      “It made me feel like, is this the America we live in?” Mathis said. “And it was this stupid, stupid technology that is just going through picking up random words and not looking at context.” But this was in keeping with Tennessee’s zero-tolerance law requiring any threat of mass violence against a school to be reported immediately.
       
      For its part, Gaggle’s CEO Jeff Patterson told The Milwaukee Independent that in this case the school did not use Gaggle the way it is intended. “I wish that was treated as a teachable moment, not a law-enforcement moment,” Patterson said.


      It is understandable – given how this nation is regularly traumatized by school shootings – why Tennessee has embraced such a standard. But when the filters are set so wide, and the reactions to infractions so extreme, it is hard to justify such a system on the basis of public safety as well as free speech.

      Schools are learning, slowly, to put up guardrails against overreaction, but only after hard bumps into reality. Consider the policy of Philadelphia schools, which in 2010 allowed students to take school laptops home. None of these students were told that when opened, their laptops would snap an image of them at home – often in their bedrooms – every 15 minutes. One student, 15-year-old Blake Robbins, was accused by his school of being involved with illegal drugs on the basis of what his laptop had recorded. This charge was based on images of Blake lying on his bed, popping fruit-flavored candy into his mouth. Schools have since been taught by public backlash that watching a student in his bedroom is illicit. But privacy-infringing technology continues. It is legal for schools to monitor students’ public social-media posts and online activity made on students’ own devices and on their own time.
       
      All of which prepares America’s public-school students for the new American workplace. In many offices, active surveillance of employees extends from the parking lot to the workstation, to the breakroom. Employers not only use technology to scrutinize employees’ search histories. They also use sensors to monitor “desk attendance,” and to follow employees as they move from office to office, on their breaks, and even – in some states – into the bathroom.

      Nicole Kobie of ITPro reports that one in five office workers are now being monitored by some kind of activity tracker. She also reports surveys that tracked employees are 73 percent more likely to distrust their employer, and twice as likely to be job-hunting as those who are not tracked in their workplace.
       
      In California, Assembly Bill 1331 would have barred monitoring in employee-only areas such as break rooms and locker rooms. The bill, which would have fined employers $500 per violation, recently died in the California State Senate.
       
      There is likely a human cost – and thus a cost in learning at school and productivity at work – when surveillance records a person’s every move and utterance – all initially judged by artificial intelligence that lacks nuance and social intelligence. Such systems are not only Orwellian; they are also destructive of the trust that is needed for effective teamwork, whether between teacher and student, or employer and employee. 
       
      Consider the story of Olivia Stober, in her interview with CBS News, who compared her old retail job – where her every interaction with customers was monitored and critiqued by her employer – with her new job, where she is a trusted employee and the cameras are aimed only at the establishment’s front door.
       
      Unlike Stober, today’s students are being inured to constant surveillance as they graduate from classrooms to workplaces under the watchful eye of those who claim to only have our best interests at heart.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      Watching the Watchers: “Un-Personing People,” or How To Control a Population in Three Easy Steps

      1/20/2026

       
      ​The ACLU’s Jay Stanley just published a critique of the increasing push by states to adopt digital ID systems. It’s his fifth admonition in as many months, and the message is more urgent than ever: the digital ID bandwagon is becoming a rush job that threatens to discard privacy guardrails.

      Of the many possible pitfalls, the greatest may be the ability of authorities to “un-person” someone. In the parlance of Orwell and his novel 1984, an “unperson” simply vanishes as every last record of that person’s existence is expunged.

      Stanley's version of Orwell hinges on what happens when authorities revoke an ID that exists only in digital form. In his new essay, “How to Give the Government New Power to ‘Un-Person’ Someone, in Three Easy Steps,” Stanley unmasks the underlying features of digital IDs that can be revoked at will:

      • It’s about control: “The big push for state digital driver's licenses that we’ve been warning about is effectively a movement to increase the power of big companies and government to control individuals.”
       
      • It’s about power: “The power to revoke people’s IDs, cutting off in a single stroke their ability to access their accounts, visit much of the Internet, access government services, start a new job, obtain healthcare, and who knows what else. In short, kneecap their ability to function effectively in society.”
       
      • It’s about dependency: “Make it frictionless to present an ID, which will make it easy for every business to demand your ID.”
       
      • It’s a universal ID: “Build a new digital identity system, such as digital driver’s licenses, that comes to serve as the proof of identity (and age, and residency, and other characteristics) for the vast majority of the population in the vast majority of use cases.”
       

      • It’s an at-will free-for-all: “People could be un-personed because of simple errors, because they have unfairly been accused of wrongdoing, or out of abusive targeting for political reasons.”
       
      • It’s too easy: “With digital licenses, state governments can create a system that allows them to … reach into your digital wallet in your phone and remotely deactivate your ID.”
       
      • It avoids individuality: “Don’t create protections for individuals (such as those that some states have erected around the scanning of barcodes on physical licenses).”
       
      • Put plastic and paper on the road to extinction: “Before long, physical IDs may be treated as a second class after-thought as digital IDs become de facto mandatory.”

      Stanley recommends that lawmakers impose statutory limits on the revocation of state-issued IDs, along with strong due-process protections. He also recommends adding technical guardrails against abusive revocation.
      ​
      Stanley’s original piece goes into much more detail. We also recommend GovernmentTechnology reporter Nikki Davidson’s recent interview with Stanley – it is more than worth ten minutes of your time.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      ICE Demonstrates that “Total Information Awareness” Is Back

      1/20/2026

       
      Border Patrol Commander in North Minneapolis following a shooting involving a federal agent on January 14, 2026. PHOTO CREDIT: Chad Davis (https://chaddavis.photography/sets/ice-in-minneapolis/)
      Has there ever been a more Orwellian-sounding program than “Total Information Awareness?”

      This was the post-9/11 brainchild of the Defense Advanced Research Projects Agency (DARPA), a think tank for the Department of Defense. The idea was simple: collect all data on all Americans, then data-mine that giant pile of information to identify “terrorist patterns.”

      The goal of Total Information Awareness was “predictive policing,” applying the same data-modeling techniques credit card companies use to spot fraudsters in order to catch terrorists before they act. The premise was dubious at its core – identifying terrorist patterns involves a far greater order of complexity than spotting someone misusing a credit card number.

      Worse, in order for Total Information Awareness to work, the government would need to have access to virtually all information about every American. It would be like stamping out drunk driving – which every year kills four times as many Americans as the terrorist attacks of 9/11 did – by stopping every motorist every few miles to give them a breathalyzer.

      Admiral John Poindexter, one of the masterminds of the project, wasn’t kidding when he called Total Information Awareness a “Manhattan Project for counterterrorism.” Sen. Ron Wyden (D-OR) called it the “biggest surveillance program in the history of the United States.” The ACLU in 2003 called it “the closest thing to a true ‘Big Brother’ program that has ever been seriously contemplated in the United States.”

      But nothing was more telling than the slogan of the Information Awareness Office, the Pentagon office that ran the program: “Knowledge is Power.” But power over whom and for what purpose? Total Information Awareness could be used for terrorism today, tax compliance tomorrow, and political surveillance the day after that.

      Congress was sufficiently alarmed to pull the plug on the Information Awareness Office in 2003. But in 2026, to quote the little girl in Poltergeist II, “they’re back.”

      This time, the architects of total surveillance have been smart about branding. An executive order issued in March was titled “Stopping Waste, Fraud, and Abuse By Eliminating Information Silos.” It instructs all agencies and departments to make their information on Americans available to all other agencies.

      These silos were there for a reason. They were put there by the Privacy Act of 1974, often described as “an American Bill of Rights on data.” The law’s purpose was to establish a Code of Fair Information Practice to govern the collection, maintenance, use, and dissemination of on all personally identifiable information (PII) of Americans. Despite this law, federal agencies are complying with the executive order, seeking data from each other and from the states (though 20 blue states are suing in federal court to stop data sharing).

      The Immigration and Customs Enforcement agency (ICE) is now the gleaming tip of a data “ICEberg,” after a federal judge ruled that the Centers for Medicare and Medicaid Services can share the personal Medicaid data of 80 million Americans. Many agree with the administration that Medicaid needs to be reserved for Americans, not illegal aliens. But no one believes that there is anything close to 80 million illegals in the United States. How might all this PII on Americans be used? How long will this data be kept? How might it be shared with other agencies for very different purposes?
      ​
      “Every generation imagines itself to be more intelligent than the one that went before it, and wiser than the one that comes after it,” George Orwell wrote. To blithely discard the guardrails of the Privacy Act – and to trust that vast amounts of highly personal information won’t one day be abused by the FBI, the IRS, and other agencies – is either cynical or beyond naïve.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      What the Supreme Court Missed By Allowing Warrantless Entry into a Home

      1/20/2026

       

      Case v. Montana

      ​The Fourth Amendment to the Constitution requires law enforcement to obtain a warrant supported by probable cause before entering our homes. That very American principle has roots in English law, in the spirit of the 18th century prime minister who said that “the poorest man may, in his cottage, bid defiance to all the forces of the Crown.”

      But another doctrine, the “community caretaking” standard, emerged from an understanding that the police may, in certain emergencies, enter a home without a warrant. In Brigham City v. Stuart (2006), the Court allowed police entry when there is an “objectively reasonable basis” for believing that someone inside is in danger of physical harm or in need of aid.

      The U.S. Supreme Court in 2021 found, in Caniglia v. Strom, limits to this “community caretaking” exception to the warrant requirement. Last week, however, the Court took a step back in favor of warrantless entry in Case v. Montana, finding reason in common law to uphold the conviction of William Case.

      A Montana resident, Case had repeatedly threatened suicide. When police showed up to perform “a welfare check” at Case’s home after receiving a distressing call from his girlfriend, they saw an empty holster and what appeared to them to be a suicide note on a table. Case had also threatened to kill any police officer who entered his home. The police eventually entered Case’s home without a warrant, found Case hiding in a closet with a black object in his hand, and shot him in the stomach.

      Case survived and went to court to seek the exclusion of any evidence obtained from this warrantless intrusion. The Supreme Court ruled unanimously against him. The facts of this case, like the proverbial camel’s nose thrust under a tent, are undeniably ugly. But ugly or not, Case v. Montana is still a camel’s nose – one that portends danger for privacy.

      This case has two underlying complexities to keep in mind whenever the Court reviews future cases on the emergency entry exception.

      The first concern is the Court’s central reliance on common law. Justice Neil Gorsuch, in a concurring opinion, wrote that: “From before the founding through the present day, the common law has generally permitted a private citizen to enter another’s house and property in order to avert serious physical harm.”

      The problem with Justice Gorsuch’s reliance on this “accumulated learning of common law” is that it is still trumped by the U.S. Constitution. There is no “community caretaking exception” to be found in the Fourth Amendment.

      A second danger is that the community caretaking exception will be broadened.

      In our brief to the Court, we warned about about the “diluting effect such a low bar for emergency-aid searches would cause in other contexts – especially regarding electronic devices … it seems inevitable that lowering the burden for warrantless home invasion would lower the burdens for warrantless invasion of all other repositories of private information.”

      Millions of Americans have sensitive information in their phones – apps for alcohol, drug, and gambling addictions; apps for prayer requests; apps for pregnancy symptoms; apps for financial issues; and apps for romance. Cellphones can track Americans’ location, and data that reveals where an American worships, banks, organizes political activities, and maintains a network of friend and associates.
      ​

      When the Court lowers the bar for warrantless entry into a home, it weakens constitutional protections everywhere else – especially in a world where our most intimate lives reside on digital devices. If this logic continues unchecked, today’s emergency entry into a house could tomorrow become emergency entry into a phone, a cloud account, or an entire digital life. That would be the kind of “general warrant” the Fourth Amendment was written to prevent.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      ICE Now Can Trace Americans Back to Their Homes, Places of Work, and Worship

      1/13/2026

       
      ​PPSA has long warned that allowing federal intelligence and law enforcement agencies to purchase Americans’ personal digital data from data brokers would build a surveillance state. Now the federal government has put in place the most effective tools to activate that surveillance state in America.
       
      This is the natural consequence of two technologies purchased by Immigration and Customs Enforcement (ICE). Whether you believe ICE’s approach to mass deportations is necessary, or an exercise in cruelty, there is no question that what ICE is doing with technology is guaranteed to transform the whole balance between the federal government and its citizenry. It is deploying two forms of surveillance without a warrant that can track people to meetings with friends, their place of work, and homes, their houses of worship, while also drawing on data gleaned from social media to compile dossiers on Americans’ beliefs and personal associations. In using these technologies, ICE often doesn’t know if the target is an American citizen or someone who is not lawfully in this country.
       
      Joseph Cox of 404 Media, in his most recent blockbuster revelation, details the consequences of two technologies purchased from a company called Penlink.
       
      One such technology is Webloc, which allows ICE to draw a rectangle, circle, or polygon around a portion of a city and pick out smartphones of interest. Cox writes that “they can get more details about that particular phone, and, by extension, its owner by seeing where else it has traveled both locally and across the country. Users can click a route feature which shows the path the device took.”
       
      Webloc’s surveillance relies on exploiting code in ordinary apps on our phones, like games and weather apps, that track our location. The rest comes from data brokers that sell our private information through real-time bidding. In the digital age, we are all standing on the digital auction block.
       
      Another Penlink technology, called Tangles, is a social media monitoring product that can take an image of a person’s face on the street, identify that person, locate that person’s social media feeds, and produce a “sentiment analysis” from that target’s posts. At a glance, the government will have a file on your beliefs.
       
      These new government capabilities should worry conservatives, libertarians, and MAGA supporters, as well as liberals and progressives. The effectiveness of such technologies makes it inevitable that it will spread beyond ICE to the FBI, IRS, and other agencies, as the government works to break down the traditional data silos between agencies. They are sure to be used against Americans by administrations of both parties.
       
      Webloc and Tangles cost only a few million dollars – a rounding error for the federal government. As these capabilities expand and become daily practice, the constitutional balance of government by the consent of the governed – based on the Fourth Amendment’s requirement for a probable cause warrant – will inevitably give way to authoritarian control.
       
      Only Congress can stop this. As the surveillance debate heats up ahead of the reauthorization of FISA Section 702 in April, Congress must urgently use that debate to pass a bill or an amendment that will restrict the currently unrestricted purchasing of Americans’ data by the government.
       
      As an old Kenny Loggins rock song put it, “make no mistake where you are, your back’s to the corner … stand up and fight.” Let Congress know it is not acceptable for federal agencies to buy our private and sensitive data without a warrant.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR PRIVACY RIGHTS

      The Minneapolis Shooting Sharpens the Question: Is Recording ICE an Act of Violence?

      1/12/2026

       
      ICE Agents in Minneapolis After Shooting. PHOTO CREDIT: Chad Davis (https://chaddavis.photography/sets/ice-in-minneapolis/)
      The fatal shooting of 37-year-old Renee Nicole Good by an Immigration and Customs Enforcement agent in Minneapolis is proving to be a national ideological Rorschach Test. Some who watch the video of the event see an officer reacting in fear for his life; others, including former Secretary of State Hillary Clinton, see a “murder.”

      As ambiguous as the video may be, imagine if there were no video at all. Would we be better off? At least there is a record that can be examined and debated. Without this video, we would be left with hearsay and fallible memories – weak tools for judging the use of deadly force.

      Yet according to the Trump administration, the person who recorded this encounter had no right to do so – and may have even committed a crime.

      Department of Homeland Security Secretary Kristi Noem (hat tip to G.J. Ciaramella, Reason) equated filming officers with “violence” and “doxing,” adding “it’s videotaping them where they’re at when they’re out on operations, encouraging other people to come and to throw things, rocks, bottles.” DHS Assistant Secretary for Public Affairs Tricia McLaughlin said that “videotaping ICE law enforcement and posting photos and videos of them online” is a crime, and that “we will prosecute those who illegally harass ICE agents to the fullest extent of the law.”

      No one disputes that harassing and threatening officers is a crime. But recording them is not. The right to document public officials performing public duties is well established in federal courts. Seven federal circuits have recognized Americans’ “right to record” – the right to hold up a smartphone and make a video of law enforcement in action.

      The Fourth Circuit made that explicit in a case involving a passenger who livestreamed a traffic stop. The court held that “livestreaming a police traffic stop is speech protected by the First Amendment,” explaining that “recording police encounters creates information that contributes to discussion about governmental affairs.”

      We have to agree with Reason’s Ciaramella:

      “Recording government agents is one of the few tools citizens have to hold state power accountable. Any attempt to define observation as ‘violence’ is not only unconstitutional – it’s authoritarian gaslighting. When a government fears cameras more than crimes, it isn’t protecting the rule of law. It’s protecting itself.”

      Too many in the Trump administration have slipped into a lazy – and dangerous – syllogism. “Videotaping” law enforcement = “doxing” = “violence” = “terrorism.” We do not discount by any means the need to protect officers. But the logic now coming from Washington is as simple as it is dangerous.
      ​
      You have the right to record the police. There should be no erase button on this principle.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      Is California Dreamin’? Not When It Comes to Data Privacy

      1/12/2026

       
      Picture
      ​Here’s some good news – when it comes to privacy, California is catching up to privacy leaders like Utah and Montana. Three new data-privacy bills in Sacramento would give California consumers powerful new tools to manage their personal information.

      The three legislative initiatives would:

      • Put guardrails on the use and sale of personal information (PI)
       
      • Ban the sale of geolocation data
       
      • Expand the definition of PI as a category (a definition that hasn’t been revisited since California passed its Information Practices Act in 1977).

      These bills would build on a solid base of existing reforms. California has launched a data-broker enforcement strike force. In the 2023 Delete Act, it created a centralized website for consumers to opt out of sales of their data and delete the data already collected by brokers. Another new law also requires web browsers to let consumers set one universal privacy control. California, home to the nation’s tech industry, is suddenly a national leader on privacy.

      As our readers know, the gathering, buying, and selling of personal data is big business. Worse, it takes shockingly few data points to identify us as individuals. In today's information economy, that knowledge is gold – to government agencies, police, marketers, and hackers alike.

      The Delete Act now shines a spotlight on data brokers and their shadowy privacy practices. And the new enforcement strike force adds muscle, promising real accountability for brokers – and the businesses that rely on them – to adhere to their privacy policies.

      CalPrivacy executive director Tom Kemp said:

      “Data brokers pose unique risks to Californians through the industrial-scale collection and sale of our personal information. The widespread availability of digital dossiers makes it easier for our personal information to be weaponized against us, and even well-meaning data brokers can be victims of data breaches that leave all of us vulnerable.”

      Under the law, brokers must register with the state and pay an annual fee. That annual registration fee is funding the new Delete Request and Opt-Out Platform (DROP). Starting in August, California residents who use this free service can have their data profiles wiped – and kept that way, with mandatory deletions every 45 days.

      Next up – the California Opt Me Out Act, which goes into effect in 2027. It will require major browsers to offer users one simple switch – one click to say “no” to data sharing across thousands of websites. Technically, it’s known as an OOPS, an Opt-Out Preference Signal.

      It certainly doesn’t sound like a mistake. Here’s hoping – California dreamin’ – that these initiatives take root. Perhaps they will be so well received that our representatives in Washington will be inspired to follow suit by curbing the limitless appetite of federal agencies for Americans’ personal data.
      ​
      The last hope may still be a dream. But if the nation’s most populous state can take such steps, it’s a dream worth having.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      PPSA 2025 Year in Review

      1/11/2026

       
      Picture
      ​Privacy is a bedrock of American democracy. The fight to preserve it never ends, and the struggle ever been more fierce.

      PPSA stood in the gap throughout 2025 alongside our coalition allies. On this news blog we published more than 200 articles calling attention to surveillance threats to Americans’ privacy. But we did more than raise awareness and offer our perspective. We took action. Here’s a list of the concrete ways we engaged in the privacy fight throughout 2025:

      On the public record:
      • PPSA’s senior policy advisor and former House Judiciary Chairman Bob Goodlatte supported congressional efforts to repeal the Corporate Transparency Act, whose database provisions and disclosure requirements represent an unprecedented threat to Americans’ financial privacy. Two months later, Treasury announced it would no longer enforce the CTA’s penalties. Secretary Scott Bessent called it a “victory for common sense.”
      • Bob Goodlatte also dispatched a letter to Attorney General Pam Bondi warning of the UK’s abuse of technical capabilities notices (TCNs) under the CLOUD Act agreement. “I am deeply troubled by how the United Kingdom has taken advantage of our goodwill,” he wrote, urging the Department of Justice to suspend the Agreement unless and until the UK withdraws its use of TCNs. These secret orders, issued under the UK Investigatory Powers Act, can compel U.S. technology companies to weaken, delay, or suspend the deployment of essential security features.
      • Gene Schaerr, PPSA general counsel, praised a district court ruling in United States v. Hasbajrami. This ruling found that warrantless searches of U.S. citizens’ communications are an abuse of the Foreign Intelligence Surveillance Act (FISA) and violate the Fourth Amendment. “We can have aggressive protection of the American people while standing up for the Constitution,” Schaerr said. “This court recognized that those two principles can go hand in hand.”
      • PPSA President Erik Jaffe called on the U.S. government to push back against the British government’s “internet imperialism” when it demanded that Apple provide Whitehall with access to all encrypted communications. He said: “Efforts to give the government back-door access to encryption is no different than the government pressuring every locksmith and lock maker to give it an extra key to every home and apartment.”

      In the legal and legislative arenas:
      • In two separate appearances, Schaerr testified before Congress that Section 702 is symptomatic of the larger anti-privacy, pro-surveillance arc the U.S. government has increasingly embraced. “Elements of an emerging American surveillance state are being knitted together before our eyes,” he warned. In April 2026, Congress will have the opportunity to reform FISA Section 702. In testimony before the House Judiciary Committee, Schaerr anticipated that moment by outlining four critical reforms advanced by PPSA and our allies.

      In court:
      • In Case v. Montana, PPSA filed a brief asking the U.S. Supreme Court to preserve the privacy standard previously established in Caniglia v. Strom. The Caniglia ruling greatly restricted the use of warrantless home entry under the “community caretaking” exception. Our message? Ignoring that standard is a slippery slope. “Lowering the burden for warrantless home invasion would lower the burdens for warrantless invasion of all other repositories of private information.” PPSA’s amicus brief was the only one filed in the case, and the Supreme Court granted the petitioner’s request a few months later.
      • Lowering privacy standards is inextricably linked to diminishing expectations of a right to privacy. Preventing this destructive codependence was at the heart of the brief we filed with the Supreme Court on behalf of James Harper. In Harper's case, the First Circuit’s interpretation of the third-party doctrine would have limited the notion of privacy to something belonging to the bygone era of paper and ink. Our data deserves the same privacy the Founders granted its physical analogs in the 19th century, especially as “third-party storage becomes ubiquitous” in the digital age.
      • Such sweeping interpretations of the third-party doctrine bedeviled privacy rights at every turn in 2025. In a Wisconsin case, we reminded the state’s high court that searches of personal data were subject to the Fourth Amendment regardless of how that data is stored: “The ransacking of our cloud-based data is much like the ‘general warrants’ of the colonial era, when agents of the Crown could rifle through anyone’s documents at will.”

      PPSA also filed briefs in 2025 before the Supreme Court on the nature of geofence warrants, before a federal appellate court on the expansive practice of border searches of phones, and before a state court on sweeping searches of data in a phone unrelated to a probable cause warrant.

      Near the end of the year, we applauded the Judiciary Committee’s bipartisan – and unanimous – decision to put the Non-Disclosure Order (NDO) Fairness Act before the full House for a vote. Earlier in the year, PPSA congratulated House Majority Whip Tom Emmer (R-MN) for his tireless work to pass the Anti-CBDC bill, forbidding the Federal Reserve from establishing a government-issued digital currency. As we noted at the time, a central bank digital currency “would enable mass surveillance of American consumers, and the debanking of any targeted group.”

      Finally, we were encouraged when the Department of Justice showed a more responsive spirit in reply to one of our FOIA requests. In the past, when we asked about internal policies regarding the use of cell-site simulators (“stingrays”), we were met with non-reply responses, often redacted to the point of absurdity. This time, however, the department suggested it intends to comply with its 2015 memo requiring probable cause warrants before stingrays could be used.
      ​
      We are glad to see a change of heart, but we won’t stop issuing FOIAs. Trust, but verify.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      A Class-Action Lawsuit Against San Francisco Details How “Vehicle Fingerprints” Are Used in the Mass Surveillance of Drivers

      1/5/2026

       
      Picture
      ​Michael Moore is a retired public-school teacher living in San Francisco. Nearly every day, as he drives to the store, to his sons’ schools, or to meet friends and family, his movements are watched and recorded at every turn. But he is not being tailed by a private detective or by the police.

      Moore, like every other driver in San Francisco, is being tracked because he must navigate through the city’s network of almost 500 automated license plate readers (ALPRs).

      These devices, operated by the San Francisco Police Department (SFPD), constitute a major link in the national surveillance network that the vendor Flock Safety is providing to state and local law enforcement. Moore has had enough. At the end of December, he filed a class action lawsuit in a federal courtroom on his behalf and on behalf of his fellow San Franciscans against the city and its police department over this continuous violation of their Fourth Amendment rights.

      In his suit, Moore states that Flock ALPRs “make it functionally impossible to drive anywhere in the City without having one’s movement tracked, photographed, and stored in an AI-assisted database that enables the warrantless surveillance of one’s movements.”

      Here are some of the topline revelations from Moore’s lawsuit:

      Suspiciousness surveillance: Of the over 1 billion license plate scans collected by 82 agencies nationwide in 2019, “99.9 percent of this surveillance data was not actively related to any criminal investigation when it was collected.”

      Creates “vehicle fingerprints”: “When Flock Cameras capture an image of a car, Flock’s software uses machine learning to create what Flock calls a ‘Vehicle Fingerprint.’ The ‘fingerprint’ includes the color and make and model of the car and any distinctive features, like an anti-Trump bumper sticker or roof rack. Flock’s software converts each of those details into text and stores them into an organized database.”

      Tracks social networks: “Flock provides advanced search and artificial intelligence functions that SFPD officers can use to output a list of locations a car has been captured, create lists of cars that have visited specific locations, and even track cars that are seen together.”

      Data stored indefinitely: “The data that Flock Cameras collect belong to the SFPD but Flock retains data on a rolling 30-day basis. Nothing, however, prevents the SFPD or its officers from downloading and saving the data for longer than SFPD’s 365-day retention period.”

      Flock doesn’t just see and record – it thinks and analyzes:

      “ALPR technology is a powerful surveillance tool that is used to invade the privacy of individuals and violate the rights of entire communities. ALPR systems collect and store location about drivers whose vehicles pass through ALPR cameras’ fields of view, which, along with the date and time of capture, can be organized by a database that develops a driver profile revealing sensitive details about where individuals work, live, associate, worship, protest and travel.”

      Moore’s lawsuit poses a profound constitutional question: Can a city turn every resident into a perpetual suspect simply for driving on public roads?
      ​

      The Fourth Amendment was written to forbid dragnet surveillance untethered to suspicion, warrants, or individualized cause. Yet San Francisco has quietly constructed a system that records nearly every movement of its citizens, not because they are suspected of wrongdoing, but because technology makes it easy. If this practice is allowed to stand, the right to move freely without government monitoring may become a relic – honored in theory, but surrendered in practice to cameras, algorithms, and convenience.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      “We're An American Brand,” Sings Roomba (in Chinese)

      1/5/2026

       
      Picture
      ​If you got a Roomba for Christmas, we have good news and bad news. The good news is that your product will likely continue to be supported despite the company’s recent bankruptcy filing. The bad news: this Massachusetts-based brand may soon be just another piece of Chinese-owned spy tech.

      Amazon tried to buy iRobot, the maker of Roomba, in 2021, but that deal was ultimately nixed by the Federal Trade Commission on antitrust grounds. Now, if a judge approves the pending sale of iRobot to Shenzhen Picea Robotics, Roomba will join numerous brands under the ever-expanding surveillance umbrella that many Chinese products represent.

      Not that China is the sole problem when it comes to protecting the privacy of American consumer data. The United States has no robust privacy laws apart from a few state initiatives, and the data practices of companies like Amazon are a mixed bag. But the Chinese Communist Party doesn't even pretend to care about privacy, instead marketing highly functional (and affordable) electronics capable of gathering all manner of personal information. This ill-fated combination has created a veritable Wild West when it comes to the consumer electronics market.

      iRobot says Roomba will remain an American brand, a claim that means little when no one is minding the privacy store in the first place. So you can either trust that your data will be treated with care (good luck) or you can try to protect yourself just a bit. According to experts, disconnecting from Wi-Fi and Bluetooth will likely disable any advanced features but will not prevent Roomba models from actually cleaning.

      “Advanced features” in this context mostly mean updates to the app, which Roombas can operate without. And it certainly refers to a data pipeline that goes straight to who-knows-where, replete with maps of your home’s layout and eye-level images of your pets and you playing on the floor. Remember, any connected devices, including vacuum cleaners, can be (and have been) hacked.
      ​
      Apps are black holes for data and privacy anyway. So just press “Clean” and forget it.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      Texas AG Sues Five TV Makers for Being “Uninvited, Digital Invaders”

      1/2/2026

       
      Picture
      ​In the 1980s, singer Rockwell went to the top of the charts with “Somebody’s Watching Me,” a synth-pop, R&B celebration of unrestrained paranoia. In one verse, he asks: “Can the people on TV see me, or am I just paranoid?”

      On that point, you can relax. The (truly) odious Jackson Lamb in Slow Horses and the passive-aggressive aliens on Pluribus cannot see you. But if you have a smart TV equipped with a camera for recognizing gesture control, or for making video calls, your TV itself might be watching you – although manufacturers are dropping this feature after being hit with a tsunami of consumer outrage. After all, who is at their best sitting on the couch at 9 o’clock at night?

      The real danger is Automated Content Recognition (ACR) technology, which can capture screenshots of a user’s television display every 500 milliseconds, monitoring your viewing in real time, and transmitting that information back to the company without your knowledge or consent. Your personal information then becomes a commodity on the consumer data market.

      Texas Attorney General Ken Paxton said in a statement that this technology can put private and sensitive information – from passwords to bank information – at risk. Consumer activist and privacy expert Louis Rossmann explains that if your TV is connecting to home security cameras, if you use your TV as a computer screen for searching the web, or if you send videos and photos through your TV, ACR captures all that information.  

      “The television is, unfortunately, a form of spyware,” says Rossmann.

      Paxton is now suing Sony, Samsung, and LG, as well as Chinese-based Hisense and TCL Technology Corporation for secretly recording and harvesting consumer data.

      “Companies, especially those connected to the Chinese Communist Party, have no business illegally recording Americans’ devices inside their own homes,” Attorney General Paxton said. “This conduct is invasive, deceptive, and unlawful. The fundamental right to privacy will be protected in Texas because owning a television does not mean surrendering your personal information to Big Tech or foreign adversaries.”

      Watch Rossmann for detailed descriptions of these companies’ labyrinthine concept of informed consent and the technical ways you can try to sidestep surveillance. As Paxton’s lawsuit matures, we will see if courts will find actual law-breaking here, or just another abuse of consumer trust.
      ​
      Stay tuned.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      Naughty by Nature: Sex Toys that Spy On You

      12/23/2025

       
      Picture
      ​There are few spaces meant to be more private than the bedroom. But that, writes Wired’s Chloe Valentine, may be about to change. In a trend that gives a twisted new meaning to the concept of the “Internet of Things,” sex toys are joining the ranks of app-connected devices. As they do, the adult toy industry has found a way to breach one of privacy’s few remaining sanctums.

      Who knew there was an app for that?

      But here’s the thing about apps: users see them as a way to interact with devices. Companies, however, view them as something much more valuable – collectors of data that can be monetized. And what better place to collect personal information than the boudoir?

      As if data privacy wasn’t already teetering on the brink, along comes a new – and deeply invasive – set of variables to track and mine for insights. Think of it this way: If it’s a setting on the device, it’s measurable. And if it’s measurable, it has value to the company that markets it.

      Behavioral data is especially valuable but was long notoriously difficult to obtain until about a decade ago, when the consumer IoT market began to proliferate. Thanks to the rise of connected devices, companies can now acquire behavioral data about their consumers in the most accurate and intimate way possible – by observing them in the act.

      For those who are comfortable with sex toy companies gathering their behavioral data, that’s their prerogative. But sexual behavior data potentially includes many things: location information, usage frequency, which toy a consumer is using, even which functions and intensity settings they choose. When combined with purchase records and demographic data, this amounts to an expansive – and intensely personal – profile.

      Moreover, there is no way to truly guarantee anonymity, despite what organizations may claim. Meanwhile, the potential actions of hackers or other bad actors remain an ever-present threat. And in the end consumer data is just as likely as not to end up in the hands of brokers who won’t hesitate to sell it to any interested parties (whether obtained legally or not, the rotten practice of data brokering remains perfectly legal).

      If you add cameras and Wi-Fi to the mix, then you’ve got another layer of “What could possibly go wrong?” Here one need only recall the sordid tale of the Savkom Siime Eye, an early entrant in the field of IoT adult toys.

      If you get one of the new generation of adult toys, start by checking permission settings in the product’s app – and on your smart phone more generally. Most smartphones eagerly assist apps in sharing information, so you might be shocked to learn just how much your data gets around.

      As a reminder, check the app settings for your other connected devices, including:

      Appliances, smart glasses, security cameras, vehicles, doorbells, wearables, children’s toys, small electrics, TVs, thermostats, plugs and switches, lightbulbs, speakers, navigation systems, locks, motion detectors, smoke alarms, air purifiers, humidifiers, blinds, garage door openers, irrigation systems, solar panels, rechargeable batteries, carbon monoxide detectors, projectors, soundbars, gaming consoles, rings, hearing aids, scales, bikes, scooters, conference systems, printers, lighting panels, pet feeders, litter boxes, aquariums, and birdhouses.

      Plus your toothbrush. And don’t forget your mattress.
      ​
      Feeling safe now?

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      Further Proof American Citizens Have No Fourth Amendment Rights at the Border

      12/22/2025

       

      Have Citizenship, Will (Not Necessarily Be Able To) Travel

      Picture
      ​Fresh on the heels of the Bill of Rights’ 234th birthday comes a salient reminder of just how difficult it is for those in power to resist abusing their authority, and why the Fourth Amendment in particular is every bit as relevant today as it was in 1791.

      Wilmer Chavarria is suing the U.S. Department of Homeland Security (DHS) for an incident in Houston in July. According to his lawsuit, U.S. Customs and Border Patrol (CBP) agents detained him, demanded his passwords, then searched the contents of his devices as he tried to enter the country at George Bush Intercontinental.

      Actually, make that returning home rather than trying to enter – Wilmer Chavarria is as American as tarta de manzana. He’s a school superintendent in Vermont, where apples are the state fruit and apple pie is literally the state pie (either à la mode or with cheddar). Born in Nicaragua, Chavarria became a citizen of the United States in 2018 after coming here a full decade earlier to do that most American of things – get an education. That day in July, this American citizen was returning home after visiting his mother and family in Nicaragua.

      CBP separated him from his husband, then interrogated Chavarria for several hours before releasing him without explanation. Along the way, he was informed that he had no Fourth Amendment right to resist. The primary problem with that argument is, of course, that the Fourth Amendment applies to all American citizens. It clearly states that no one living under the authority of the Constitution must endure unreasonable search and seizure, and that a warrant, based on probable cause, must be obtained by authorities whenever one’s personal effects are to be searched.

      To be clear, these protections do not apply to noncitizens seeking to enter the country. Chavarria was utterly and completely covered the moment he finished swearing “so help me God,” on the day of his naturalization. 

      Another potential problem with the DHS/CBP argument is a landmark 2014 decision in which the U.S. Supreme Court declared that digital devices like cellphones are covered by the amendment’s original language of “persons, houses, papers, and effects.” But the ruling left the notorious “border exception” intact, which may explain CBP’s inclination to take a constitutional mile with the mere inch the parchment actually gives them. With any luck, Chavarria’s case may breathe renewed life into the space that United States v. Smith clawed back from the border exception in 2023.

      Despite such rulings, border agents seem not only unfazed but also emboldened. According to research by the Pacific Legal Foundation, warrantless searches of electronic devices have quadrupled in the decade since the high court’s original 2014 ruling.

      When asked about cases like Chavarria’s, CBP demurs. These tactics are “rare” and “highly regulated” according to the agency’s assistant commissioner Hilton Beckham. She also insisted to the Houston Chronicle that such searches are only used to combat serious crimes. “Lawful travelers,” she says, need not fear.

      By such logic, Chavarria must have somehow represented a danger to national security. Perhaps New England schoolchildren, gay marriage, and naturalized Nicaraguans are a greater existential threat to the future of the republic than anyone previously realized.

      Or it could be good old fashioned political targeting. In April, mere months before his trip, Chavarria refused to sign his state’s request to certify to the U.S. Department of Education that Vermont was not using “illegal DEI practices.” And he did so on the record, noting that his district is the most diverse in the state. The federal request was one that some 19 states, eventually including Vermont, simply refused to comply with. Agree or disagree with that position, it should be a matter of serious concern for people of all political stripes if the government applied a political standard to its warrantless intrusion into an American’s digital devices.

      It is perhaps no coincidence, then, that before he even boarded his domestic flight back to Vermont that day, Chavarria received an email. In it, CBP announced that his longtime TSA Global Entry status had been revoked because he suddenly “did not meet program eligibility requirements.”
      ​
      So it’s come to this: If you’re traveling abroad, consider using burner phones and leaving your personal and work devices at home.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS

      Former House Judiciary Committee Chairman Bob Goodlatte Urges DOJ to Suspend U.S.–UK Data Deal

      12/19/2025

       

      General Warrants Are Back – This Time in Digital Form

      Former U.S. Congressman from Virginia and Chairman of the House Judiciary Committee, Bob Goodlatte.
      ​If you’ve read Rick Atkinson’s prize-winning books on the American Revolution or watched Ken Burns’ documentaries on that founding event, you know how deeply Americans have always valued privacy. The Revolution itself was sparked, in part, by outrage over the British Crown’s use of “general warrants” – sweeping authorities that allowed the King’s agents to ransack homes, warehouses, offices, and ships at dock in search of anything they deemed suspicious.

      Now, nearly 250 years after the Declaration of Independence, London is at it again.

      This time, the British government is executing a plan to override the security and encryption protections built into U.S. technology products – exposing the private data of Americans, and potentially users around the world, beginning with Apple devices.

      The CLOUD Act — and a Deal Gone Wrong

      PPSA Senior Policy Advisor Bob Goodlatte knows this territory well. A former congressman from Virginia and Chairman of the House Judiciary Committee, Goodlatte helped lead passage in 2018 of the Clarifying Lawful Overseas Use of Data Act, better known as the CLOUD Act.

      The CLOUD Act allows the United States and trusted foreign partners to enter into data-sharing agreements, enabling law enforcement to seek data through warrants or subpoenas regardless of where that data is stored. But Congress paired this authority with firm guardrails to protect privacy, civil liberties, and the rule of law.

      One of those agreements – the U.S.–UK Data Access Agreement (DAA) – has now veered sharply off course.

      “I am deeply troubled by how the United Kingdom has taken advantage of our goodwill,” Goodlatte wrote in a letter sent late last week to Attorney General Pam Bondi.

      Britain’s Abuse of Surveillance Powers

      At issue is the UK’s use of so-called Technical Capabilities Notices, or TCNs, issued under the UK Investigatory Powers Act. These secret orders can compel U.S. technology companies to weaken, delay, or suspend the deployment of essential security features, including end-to-end encryption.

      “The threat to Americans’ privacy from these measures is real,” Goodlatte warned, whether the UK’s actions affect U.S. companies’ global products or are limited to services offered in Britain. Even in the latter case, he explained, the consequences are profound: increased risk of global surveillance, compromised digital infrastructure, and a direct assault on the protections Congress demanded when it approved the agreement.

      Approval Rights and Gag Orders on U.S. Companies

      Goodlatte also pointed to a particularly alarming requirement: U.S. companies must notify the British government before rolling out security upgrades – precisely the kind of foreign leverage Congress explicitly sought to prevent.

      The CLOUD Act’s promise of streamlined cross-border cooperation, he wrote, “was never intended by Congress to be leveraged by a foreign partner to compel any form of ‘backdoor’ access or other types of decryption assistance.”

      Even worse, UK policy reportedly imposes gag orders that prevent U.S. companies, starting with Apple, from disclosing this interference even to the U.S. government itself.

      The Only Remedy: Suspend the Agreement

      The CLOUD Act anticipated this scenario. Under the DAA, the United States may suspend or terminate the agreement when a partner government’s laws or practices materially undermine its privacy and civil liberties commitments.

      “Accordingly,” Goodlatte wrote, “I urge the Department of Justice to invoke Article 12.3 and suspend the Agreement unless and until the UK withdraws its use of TCNs.”

      During passage of the CLOUD Act, Goodlatte insisted on strong congressional oversight of the law’s implementation. Now, he is calling on the Justice Department to enforce the deal’s terms – and protect Americans from a digital revival of the general warrants our founders fought to abolish.
      ​
      Expect sitting Members of Congress to take up that call as well.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US PROTECT YOUR FOURTH AMENDMENT RIGHTS

      China’s Surveillance State Reaches into Midland, Texas

      12/19/2025

       
      Picture
      ​Almost every day, we learn of new capabilities in China’s ever-expanding surveillance and intimidation operations. Xi Jinping’s regime is perfecting its ability to track enemies, even as far from Beijing as West Texas.

      Consider the story of Li Chuanliang, a retired Communist Party official who fled China and was granted asylum in the United States. Now in Midland, Texas, Li told the Associated Press:

      “They track you 24 hours a day. All your electronics, your phone – they’ll use every method to find you, your relatives, your friends, where you live: No matter where you are, you’re under their control.”

      What’s even more disturbing may be the source of China’s capabilities. Technology first deployed to track and persecute China’s Muslim Uyghur minority now helps power the country’s worldwide surveillance network,  supported by technology developed in the United States.

      When the AP asked U.S. companies about their role in such potentially deadly technology transfer, most deflected: “IBM said in a statement that it sold its division making the i2 program in 2022, and has ‘robust processes’ to ensure its technology is used responsibly. Oracle declined comment, and Microsoft did not respond.”

      But for China, it’s all been a golden opportunity – literally. The regime named the U.S.-derived lynchpins of its surveillance network “Golden Tax,” “Golden Finance,” and “Golden Audit.” (See also China’s notorious Golden Shield program, which American cyber-giant Cisco helped to build.)

      The Chinese Communist Party hunts for its perceived enemies in-person as well as online. It involves attempts to recruit American citizens to the cause, according to court filings against two Chinese organizations. The schemes included the use of fake social media accounts to intimidate Chinese dissidents residing abroad.

      And, it seems, they occasionally have help from U.S. citizens such as an ex-New York cop convicted of hunting dissidents for the PRC. It’s a sordid tale and, sadly, far from an isolated incident. Nor is the tale of such transnational aggression limited to state actors like China alone.

      In addition to matters of statecraft, the human toll exacted by such global Big Brother programs is immeasurable, as seen in the mental health effects of state surveillance on Chinese students who are merely studying in the United States. Some have cut all ties to family and friends back home to protect their loved ones from the suspicion that comes from simply being in America.

      We should remember these souls during this season of light. If you know a Chinese student or resident who doesn’t seem to have many friends here, it might not be by choice. Consider reaching out to them in person and offering your support. Just be careful about using your cellphone (or theirs) to make plans. Consider getting your church involved too, like congregants in Midland did for Li and others.
      ​
      Speaking of which, check out the AP’s poignant photo essay chronicling Li’s attempts to build a new life in Midland, together with other Chinese expatriates.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US PROTECT YOUR FOURTH AMENDMENT RIGHTS

      Dear Fourth Amendment, Happy 234th Birthday!

      12/15/2025

       
      Picture
      ​The Bill of Rights was ratified on this day in 1791 — guaranteeing that in addition to free speech, freedom of religious exercise, the right to due process, and other natural rights — that the government must obtain a probable cause warrant from a judge before it can search our persons, houses, papers, and effects. It established what the Founders hoped would be a bright line against unreasonable searches and seizures.
       
      Unfortunately, with the rise of surveillance technology, the Fourth Amendment is often observed today in the breach. But it is still a shield against police entry into Americans' home and unreasonable physical searches. Let this birthday remind us of the need to jealously guard our freedoms — and extend them to the digital world, as well as the physical. 

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US PROTECT YOUR FOURTH AMENDMENT RIGHTS

      Watching the Watchers: A “State of Our Privacy” Report

      12/15/2025

       
      Picture
      VICE recently interviewed privacy expert Jason Bassler about the many ways that surveillance has crept into our daily lives and become more or less normalized. Jason is the co-founder of the Free Thought Project, whose site you might not want to visit if you’re already paranoid about being watched.

      Among the observations that Jason offered VICE were the following. Think of them as a “State of Our Privacy” report:

      Smartphones are the well-connected spies in our hand:

      “Today’s mobile tech goes far beyond anything we saw even five years ago. Our phones constantly ping GPS satellites, Wi-Fi networks, and cell towers to triangulate our location, whether or not you’re using a map app. Apps quietly harvest this data and sell it to data brokers, who in turn sell it to agencies like ICE, the FBI, and even the U.S. military.”

      If it’s a border, it’s biometric:

      “TSA is expanding biometric surveillance across nearly all U.S. airports as part of a $5.5 billion modernization push. Airports nationwide will be utilizing facial recognition software, and over 250 airports will be accepting digital ID verification. It’s a similar situation with the U.S. Customs and Border Protection. Biometric data collected at borders is often retained indefinitely, and it’s increasingly shared with law enforcement and intelligence agencies, raising concerns about lack of oversight. Border control isn’t just about fences anymore. It’s about fingerprints, facial scans, and AI predictions.”

      License plate readers are nearly ubiquitous:

      “They’re designed to capture, analyze, and store vehicle data in real time. Think of them as a cop on the corner of your street, taking notes about every car that passes – its color, its make, its year, where it’s going, how often it goes there, how long it stays, and much more. Now, imagine an army of cops on every corner of your city doing that. This is what Flock [Safety brand] cameras are, except they are mounted on poles and traffic lights.”

      Bassler also recommends the following ways to fight back against what he calls the growing “ecosystem” of surveillance and its normalizing influence:

      • “Obscure your biometrics, especially if you’re at a protest or political event.
      ​
      • Opt for strong passwords and turn off biometric unlocking features on your phone and devices.
       
      • Disable GPS or Bluetooth when not in use, and avoid apps that demand location access.
       
      • Use privacy-first tools and tech. Encrypted messaging apps like Signal help; VPNs and privacy browsers like Brave all help move in a better direction.
       
      • Minimize your data trail – don’t overshare on social media, avoid posting real-time location or personal identifiers. Also, always opt out when possible. Decline facial scans at airports, stores, and events.”

      Finally, Bassler reminds us to push back politically and let our voices be heard. One way to do that is to remind Congress to finish passing the Fourth Amendment Is Not For Sale Act and send it to the president’s desk.
      ​
      For Vice’s interview with Bassler go here.

        STAY UP TO DATE

      Subscribe to Newsletter
      DONATE & HELP US DEFEND YOUR FOURTH AMENDMENT RIGHTS
      <<Previous

        Categories

        All
        2022 Year In Review
        2023 Year In Review
        2024 Year In Review
        Analysis
        Artificial Intelligence (AI)
        Biometric Data
        Call To Action
        Congress
        Congressional Hearings
        Congressional Unmasking
        Court Appeals
        Court Hearings
        Court Rulings
        Data Privacy
        Digital Privacy
        Domestic Surveillance
        Facial Recognition
        FISA
        FISA Reform
        FOIA Requests
        Foreign Surveillance
        Fourth Amendment
        Fourth Amendment Is Not For Sale Act
        Government Surveillance
        Government Surveillance Reform Act (GSRA)
        Insights
        In The Media
        Lawsuits
        Legal
        Legislation
        Letters To Congress
        NDO Fairness Act
        News
        Opinion
        Podcast
        PPSA Amicus Briefs
        Private Data Brokers
        Protect Liberty Act (PLEWSA)
        Saving Privacy Act
        SCOTUS
        SCOTUS Rulings
        Section 702
        Spyware
        Stingrays
        Surveillance Issues
        Surveillance Technology
        The GSRA
        The SAFE Act
        The White House
        Warrantless Searches
        Watching The Watchers

        RSS Feed

      FOLLOW PPSA: 
      © COPYRIGHT 2026. ALL RIGHTS RESERVED. | PRIVACY STATEMENT
      Photo from coffee-rank
      • Congressional Scorecard Rubric
      • Section 702 Reform
      • PRESS Act
      • DONATE