Who’s Snooping On Us?
In today’s digital world, surveillance isn’t just something governments do — it’s a booming business model. Every time we sign up for a new app, make a purchase online, or browse a website, we’re likely giving away our data. But why? And to whom?
Why Do We Have to Create an Account for Everything?
You used to be able to browse, shop, or access basic services without having to give up your entire identity. Not anymore. Almost every website or app demands you “create an account.” Creating an account isn’t for your convenience—it’s for theirs. Your name, email, location, browsing habits, and even how long you hover over a button are gold to these platforms. All of our information is stored, analyzed, and often sold.
The Biggest Information Harvesters in the World
Let’s call out the top players:
- Google – Search history, emails, location data, voice recordings
- Meta (Facebook/Instagram) – Likes, shares, facial recognition, friend networks
- Amazon – Purchase history, browsing habits, Alexa voice commands
- Apple – App usage, Siri commands, location (less aggressive but still collecting)
- Microsoft – Cortana, Office telemetry, Xbox behavior
- TikTok – Location, device fingerprinting, content interaction, biometrics
Who Sells Your Information?
Many of the companies above share or sell data to:
- Data brokers like Acxiom, Oracle Data Cloud, and Experian
- Advertisers and ad networks like Google Ads and Meta Ads
- Insurance companies, recruiters, political campaigns — yes, even them
What Do These Companies Do With Our Info?
They:
- Build behavioral profiles for advertising
- Sell access to your demographics to 3rd parties
- Use your data to influence elections, policy, and even stock predictions
- Train AI models using your interactions without your consent
How Is This Legal?
Because the law hasn’t caught up. In many countries, including the United States, most data privacy legislation is outdated or inadequate. There’s no federal law requiring companies to:
- Get meaningful consent
- Delete your data after use
- Inform you when they sell your information
The GDPR in Europe and the CCPA in California are steps in the right direction; however, enforcement is weak, and most people are unaware of their rights.
When There’s a Data Breach, We Get Pennies
If your data gets breached — and it will — companies usually:
- Offer you “free credit monitoring” for a year
- Maybe pay a few cents per victim in a class action
- Admit no guilt, face no jail time, and carry on collecting more
Why Do They Need So Much Data?
Because data = power.
- It allows better targeting (read: manipulation)
- It creates psychological profiles to keep you engaged and buying
- It’s a trillion-dollar industry that turns you into a product
Where’s the Opt-Out?
Why don’t we have a button that says:
“After my return window, delete my data from your servers permanently.”
That should be the law. And it should be:
- Simple
- Transparent
- Legally enforceable with actual fines for non-compliance
What We’re Not Being Told
- Many companies store your data unencrypted
- Employees at some tech firms have been spying on users
- Your smartphone is tracking your movements, even when “off.”
- Data collection is increasingly linked to facial recognition, biometric tracking, and AI model training, all of which occur without consent.
- Look at Apple. That requires facial recognition; I find that insane.
Final Thought
We’re not just being snooped on, profiled, packaged, and sold. These practices will only worsen until there is a cultural shift and a legislative backbone strong enough to protect personal data as a human right.
The solution? Demand transparency, support digital rights organizations, and use services that respect your privacy; never assume your data is safe.
The internet was supposed to free us. Instead, it’s becoming the most sophisticated surveillance system in human history — and we signed up for it.
Food for thought: Do you know that most of our home security cameras are manufactured in China, and they have access to your internal network? What if there is code on these devices that monitors everything?
Leave a Reply