ICE seeks industry input on ad tech location data for investigative use
Ad Tech, Tracking, and Personal Defenses
- Many argue adblocking is now a core security control, not just a convenience, protecting against both malware and state misuse of ad data.
- Focus is less on blocking ads than blocking tracking; users note pervasive tracking via CDNs, device fingerprinting, and timing metrics even without obvious trackers.
- Some recommend tools that generate fake ad interactions; others counter that this just produces richer tracking profiles.
- A minority view is that privacy paranoia was previously overstated; most replies say adtech’s weaponization proves earlier concerns were justified.
- Several advocate designing systems that store no identifiable data at all, plus degoogling, strong sandboxing, and FOSS-based stacks.
Ethics and Responsibility of Technologists
- One camp says this should be a wake-up call for adtech and data workers: the abuse is no longer hypothetical, so continuing to build these systems is complicity.
- Others argue many engineers know the harms and do not care, or actively identify with law enforcement/intelligence goals.
- There is tension between “don’t hate the player, blame the law” and the view that relying on employee ethics is naive; legislation and regulation are framed as the only durable constraints.
- Some describe quitting high-paying roles over ethical concerns; others emphasize mortgages, visas, dependents, and job market pressure as real barriers to principled exits.
- Debate over whether working for US law enforcement/natsec is inherently unethical ranges from “4th Reich” analogies to arguments that some policing is necessary and beneficial.
ICE, Civil Liberties, and Historical Parallels
- Widespread distrust that ICE will respect warrants, constitutional limits, or “privacy expectations”; past behavior is cited as evidence.
- Strong comparisons are made to Gestapo/Stasi and early Nazi deportation policies; others call this historically sloppy and insist deporting illegal entrants is normal state behavior.
- Some promote low-level internal “sabotage” (delay, bureaucracy) to hinder cooperation with ICE; others warn this can be criminal obstruction and is easily detected.
Big Tech, Surveillance Capitalism, and Data Hoards
- Commenters link this to PRISM and longstanding big-tech collaboration with intelligence agencies, calling major US platforms fundamentally untrustworthy.
- Suggested responses include open source OSes, self‑hosting, and privacy‑centric mobile stacks; others question practicality and note continued reliance on these ecosystems.
- Some hope ICE’s move will finally make mass tracking visible enough to spur regulation; others predict states worldwide will instead rush to build their own data hoards.