FTC: Vast Surveillance of Users by Social Media and Video Streaming Companies

Scope of FTC Report & Government “Cognitive Dissonance”

  • Many see tension between agencies pushing mass surveillance (intel/law enforcement) and the FTC condemning surveillance capitalism.
  • Others argue this isn’t hypocrisy: government isn’t monolithic, different parts legitimately disagree; hypocrisy lies more with voters who accept corporate tracking but oppose state surveillance.
  • Some call the report overdue by ~15–20 years but still welcome.

Corporate vs Government Surveillance

  • One side: governments are uniquely dangerous due to monopoly on violence and history of states turning on their own populations; corporate data hoards mainly matter because states can access or buy them.
  • Other side: corporations are not “just another actor”; their mass data collection is itself harmful and structurally enables state overreach.

Harms of Data Collection & Telemetry

  • Privacy advocates argue:
    • Privacy violations are harm per se; consent is often coerced or opaque.
    • Risks include behavioral manipulation, discriminatory pricing, stalking, identity theft, reduced security, and chilling effects.
    • Ad/RTB data is reportedly used in military/intelligence targeting.
  • Skeptics demand concrete consumer harms and claim:
    • Two decades of ad tracking haven’t produced obvious widespread damage.
    • Much telemetry improves security and subsidizes free, high‑quality services (Gmail, Chrome, YouTube).
    • People rationally choose “free + ads” when explicitly given the option.
  • Strong dispute over whether “I can opt out / don’t use the app” is realistic, given dark patterns and network effects.

Credit Bureaus, Data Breaches, and Liability

  • Deep resentment toward CRAs (Experian, Equifax, TransUnion, Innovis) for collecting data without consent, leaking it, then pushing spam and upsells.
  • Several anecdotes of breaches, spam, and even a small processor emailing an entire customer database to one client.
  • Proposed fixes:
    • Shift fraud losses from victims to lenders/credit reporters.
    • Statutory per‑record damages so breaches become existentially expensive.
    • Treat personal data as “radioactive”: collect only when absolutely necessary.
  • Counterpoints: hard to prove individual harm or trace which breach; concern about who exactly should be liable and under what standard of care.

Snowden, Culture, and Mass Surveillance

  • Some say Snowden marked a “last chance” moment; public mostly shrugged (“nothing to hide”), showing cultural acceptance or fatigue.
  • Others insist mass surveillance predates Snowden and was legislatively visible; see focus on him as overblown.
  • Broader sense that people either don’t understand the stakes or feel powerless, and that younger users grew up inside the system.

Ads, Business Models, and “Free” Services

  • One camp defends targeted advertising as a major economic achievement that efficiently matches buyers and sellers and funds free platforms.
  • Critics argue:
    • Effective targeting doesn’t require deep identity dossiers; context (e.g., topic groups) is enough.
    • Many FTC‑cited harms (e.g., sensitive inferences like pregnancy or sexuality) are non‑trivial, especially for vulnerable users.
    • True “privacy vs free” tradeoffs are rarely presented transparently; even paid tiers often don’t end tracking.

Policy & Regulatory Ideas

  • Calls for:
    • Stronger FTC enforcement and higher liability for mishandling data.
    • Treating shared secrets (SSNs, card numbers) as obsolete; move to architectures that don’t expose reusable tokens.
    • EU‑style opt‑out pricing or independent “tech FDA”-like oversight (some doubt psychiatry/mental‑health science is ready for being a regulatory basis).
  • Skepticism about meaningful reform due to lobbying and political tradeoffs; belief that “safety rules are written in blood” and change may follow a major catastrophe.

Practical User Defenses & Alternative Architectures

  • Advice: freeze (not just “lock”) credit at all major bureaus; consider ChexSystems; use ad blockers, YouTube downloaders, and extensions that strip recommendations/shorts.
  • Interest in end‑to‑end encrypted, decentralized social media designs where platforms can’t inspect content; others argue “E2EE social media” is conceptually hard or incomplete.
  • General sentiment that today’s mainstream platforms are structurally user‑hostile and addictive, but alternatives face huge adoption barriers.