FTC: Vast Surveillance of Users by Social Media and Video Streaming Companies
Scope of FTC Report & Government “Cognitive Dissonance”
- Many see tension between agencies pushing mass surveillance (intel/law enforcement) and the FTC condemning surveillance capitalism.
- Others argue this isn’t hypocrisy: government isn’t monolithic, different parts legitimately disagree; hypocrisy lies more with voters who accept corporate tracking but oppose state surveillance.
- Some call the report overdue by ~15–20 years but still welcome.
Corporate vs Government Surveillance
- One side: governments are uniquely dangerous due to monopoly on violence and history of states turning on their own populations; corporate data hoards mainly matter because states can access or buy them.
- Other side: corporations are not “just another actor”; their mass data collection is itself harmful and structurally enables state overreach.
Harms of Data Collection & Telemetry
- Privacy advocates argue:
- Privacy violations are harm per se; consent is often coerced or opaque.
- Risks include behavioral manipulation, discriminatory pricing, stalking, identity theft, reduced security, and chilling effects.
- Ad/RTB data is reportedly used in military/intelligence targeting.
- Skeptics demand concrete consumer harms and claim:
- Two decades of ad tracking haven’t produced obvious widespread damage.
- Much telemetry improves security and subsidizes free, high‑quality services (Gmail, Chrome, YouTube).
- People rationally choose “free + ads” when explicitly given the option.
- Strong dispute over whether “I can opt out / don’t use the app” is realistic, given dark patterns and network effects.
Credit Bureaus, Data Breaches, and Liability
- Deep resentment toward CRAs (Experian, Equifax, TransUnion, Innovis) for collecting data without consent, leaking it, then pushing spam and upsells.
- Several anecdotes of breaches, spam, and even a small processor emailing an entire customer database to one client.
- Proposed fixes:
- Shift fraud losses from victims to lenders/credit reporters.
- Statutory per‑record damages so breaches become existentially expensive.
- Treat personal data as “radioactive”: collect only when absolutely necessary.
- Counterpoints: hard to prove individual harm or trace which breach; concern about who exactly should be liable and under what standard of care.
Snowden, Culture, and Mass Surveillance
- Some say Snowden marked a “last chance” moment; public mostly shrugged (“nothing to hide”), showing cultural acceptance or fatigue.
- Others insist mass surveillance predates Snowden and was legislatively visible; see focus on him as overblown.
- Broader sense that people either don’t understand the stakes or feel powerless, and that younger users grew up inside the system.
Ads, Business Models, and “Free” Services
- One camp defends targeted advertising as a major economic achievement that efficiently matches buyers and sellers and funds free platforms.
- Critics argue:
- Effective targeting doesn’t require deep identity dossiers; context (e.g., topic groups) is enough.
- Many FTC‑cited harms (e.g., sensitive inferences like pregnancy or sexuality) are non‑trivial, especially for vulnerable users.
- True “privacy vs free” tradeoffs are rarely presented transparently; even paid tiers often don’t end tracking.
Policy & Regulatory Ideas
- Calls for:
- Stronger FTC enforcement and higher liability for mishandling data.
- Treating shared secrets (SSNs, card numbers) as obsolete; move to architectures that don’t expose reusable tokens.
- EU‑style opt‑out pricing or independent “tech FDA”-like oversight (some doubt psychiatry/mental‑health science is ready for being a regulatory basis).
- Skepticism about meaningful reform due to lobbying and political tradeoffs; belief that “safety rules are written in blood” and change may follow a major catastrophe.
Practical User Defenses & Alternative Architectures
- Advice: freeze (not just “lock”) credit at all major bureaus; consider ChexSystems; use ad blockers, YouTube downloaders, and extensions that strip recommendations/shorts.
- Interest in end‑to‑end encrypted, decentralized social media designs where platforms can’t inspect content; others argue “E2EE social media” is conceptually hard or incomplete.
- General sentiment that today’s mainstream platforms are structurally user‑hostile and addictive, but alternatives face huge adoption barriers.