Internet Privacy in the Age of Surveillance


Pew Research Center reports that “91% of adults agree or strongly agree that consumers have lost control of how personal information is collected.”

That incredibly-high statistic must describe victims under authoritarian governments like China, Russia, or North Korea, right?


That study was about US citizens. You know, the land of the free.

That’s the percentage of adults living in the US who agree that consumers have lost control of how personal information is collected and used by companies.

The sad truth is that governments of every shape and size are ramping up mass surveillance with little-to-no objection.

We live on the internet. But does that interconnection work in their favor, providing more opportunities to pierce our online privacy?

The simplest way to settle that score is to compare how the espionage efforts of the United States and their allies compare to other oppressive regimes.

How do we measure up to our closest friends and worst enemies? Let’s find out.

State Surveillance and the Right to Privacy in Foreign Countries


The Chinese government has an annual domestic security budget of more than $197 billion.

That’s 13% higher than their allocated budget for external defense.

What does this mean?

China is more concerned with threats coming from inside its borders than with those coming from external forces.

The Chinese government is notorious for limiting what websites its people can access through the use of what has come to be known as the Great Firewall of China. (Which also sounds like a new Michael Bay film.)

The Great Firewall blocks a large number of foreign websites, including everyday Western platforms like Facebook, Twitter, and YouTube and also banned VPN providers. China also routinely blocks any content that contradicts the stance of its communist government.

Communists have thin skin, apparently.

You heard it here first.

China ups-the-spying ante by actively encouraging civilian-to-civilian surveillance. They utilize government-controlled whistleblower phone applications that allow citizens to report on any violations that they see. Buzzkill.

The state is also developing a social credit system which assigns a grade to each citizen based on the government’s assessment of their trustworthiness. No, this is not a joke.

It creates this ranking based on social behaviors, government data, and financial information. At the moment, this program is not nation-wide, but enrollment will be mandatory by 2020 for all of China’s 1.379 billion people.

This is nothing, though.

The Chinese government will also impose strict control over entire geographic areas. For example, in the region of Tibet, mobile phone and internet users must identify themselves by name.

The Chinese government cites an attempt to “curb the spread of detrimental information” as the primary catalyst behind this decision.

One group of Chinese citizens have security cameras installed within their homes.

Uh huh.

In response to this mandate, more than 100 Tibetans have chosen to self-immolate themselves (a fancy way for saying 🔥), while others opt to live completely “unplugged” to avoid government oversight.

These dissidents continue to demand more freedom, more rights, and the return of the Tibetan spiritual leader, the Dalai Lama, who has been living in permanent exile since 1959.

In Xinjiang, the Chinese government forces the Uyghurs, a Muslim Turkic ethnic group, to install an application on their phone that monitors all of its content. The government is well known for its poor treatment of this group, going so far as to install security cameras in the homes of these citizens.

When the government feels that it has gathered sufficient evidence of wrongdoing on the part of an Uhgyur, they take them to re-education camps that work to change their political and religious beliefs, effectively erasing their identities.

Nope. Still not making this up.

Throughout the rest of the country, the Chinese government employs the use of more than 20 million security cameras to keep an eye on its citizens. It is the government’s goal to build a massive surveillance network spanning the entirety of China by 2020.

This network would use both public cameras and private ones to accomplish its goals.

The Chinese government proudly touts its success at using mass surveillance techniques to curb the spread of crime throughout the country.

While critics of the government have decried these practices, claiming that it is nothing more than a heavy-handed way to snuff out political foes.

You be the judge.


Can you believe that Russia spies on their own people?

Said no one ever.

The System of Operational-Investigatory Measures (SORM) is a division of the Russian government created, for the most part, to literally just spy on their own people.

Telecom companies throughout the country have been forced by SORM to install hardware designed by the Federal Security Service throughout its systems. This is done to monitor all metadata and content pertaining to communication throughout Russia.

ISPs who refuse to install SORM spying software can be poisoned get in serious legal trouble with the Russian government.

The government collects everything from email correspondence to web browsing activities, and telephone calls.

Take this as a friendly reminder to wipe that browser history from last night real quick.

The Federal Security Service, also known as the FSB, requires a post-collection court warrant to access the records of ordinary citizens, but they can begin surveillance efforts before they request the warrant.

It’s also important to note that the agency does not need a court order to comb through metadata. It is only necessary to access the collected communications information.

SORM has been a regular target of the European Court for Human Rights. This group has declared the Russian agency to be in violation of the European Convention on Human Rights, but this has not halted domestic espionage in the least. They heard the case in 2015 before the European Convention in Zakharov v. Russia.

The international court unanimously agreed that Russia’s surveillance legislation was in stark violation of the convention. However, on that same day, the Russian government passed a law which allows them to overrule any rulings set down by an international court. They cited a need to “protect the interests of Russia” in the event that such orders contradicted the Russian constitution.

They’re nothing if not crafty.

The Russian government can access citizens’ communication records at any time without a court order.

The FSB saw to the upgrading of SORM equipment within Sochi before the start of the 2014 Sochi Olympic Games. This upgrade ensured that the government could capture all internet traffic within that location throughout the event when many foreign visitors and dignitaries were in attendance.

Another problematic surveillance law within Russia is what has come to be known as “Bloggers Law.” This 2014 law states that all bloggers who have more than 3,000 daily readers cannot be anonymous.

The government must confirm their identities. Any organization that provides a platform to these bloggers has to maintain six months of computer records. These platforms include Google, Facebook, Twitter, and Skype, among other heavy hitters.

As it turns out, 2014 was a rough year for internet surveillance, as that was the year in which the government also decreed that anyone connecting to a public wi-fi network had to do so using their official government ID. They then stored that information for up to six months.

There are no signs of things slowing down either.

In 2016 Russian President Vladimir Putin signed the Yarovaya Law into existence. This law requires telecom companies and ISPs throughout Russia to keep a record of all user communications for up to three years.

At any time, the government can demand access to these records without a court order.

And as recently as July 2018, the government demanded that all messaging, social media, and email services that use encryption to protect its data must give the government access on demand without a court order.

North Korea

If you like having any fun online, you should definitely not vacation in North Korea anytime soon.

That’s because every aspect of a North Korean’s existence is monitored by the oppressive government of North Korean dictator Kim Jong Un.

For starters, outdoor microphones are used to monitor conversations on the street. Someone is always listening when you’re out in public.

Computers, for those lucky enough to have them, must be registered with the government and are subject to random monitoring by the authorities.

Most North Korean computers are only able to access a national intranet called the Kwangmyong. They restrict external sources of the internet to government officials, elite students, and military leaders.

Internet surveillance in North Korea extends beyond the country’s borders. Officials that are stationed abroad have their internet access monitored by staff members.

North Korea is another country that encourages its people to spy on other citizens. The country has even incentivized the process, rewarding informants with gifts.

Freedom is not one of them.

All telephone conversations in North Korea are subject to monitoring by the Ministry of Public Service, one of three major surveillance organizations within the government. The other two are the State Security Department and the Military Security Command.

United Kingdom

Ah, the UK.

Home of good football and terrible food.

It turns out, your late night run to that awful kebab shop down the street wasn’t quite as secretive as you thought.

Because despite being a relatively small area, they have over 1.5 million CCTV cameras that watch your every move.

That’s not even the worst part, though.

Many different legislations outline the legal framework for what the UK considers ‘lawful interception of communications data’ and how they store it.

This is all spelled out in the Regulation of Investigatory Powers Act of 2000, and then crystallized in the Data Retention and Investigatory Powers Act of 2014, which allows security services to access phone and internet records of private citizens.

The act swept through parliament at breakneck speed, drawing criticism from some. It cleared the lower chamber in just one day, which was described as “entirely improper” by Conservative MP David Davis.

The UK is a part of the Five Eyes Surveillance Alliance, which is an agreement between the United States, Canada, Australia, and New Zealand to pool their collective intelligence information.

These five nations agree to share espionage data collected, so if one government has information on you, it is accessible to the other four (and possibly ten more).

The UK government has the ability to intercept targeted communications. It can collect this data in bulk and store it. A judge is required to review any warrants signed by a minister as it pertains to the interception of information.

In 2016, the government passed the Investigatory Powers Act of 2016, which shone some light on the mass surveillance techniques it once kept secret. It also created an Investigatory Powers Commission that oversees the use of all investigations which utilize mass surveillance tactics.

This commission is made up of serving and former senior judges.

The 2016 act also gave police and intelligence agencies the right to engage in targeted equipment interference, which boils down to hacking into devices remotely to collect data.

When it’s a matter of a ‘foreign investigation,’ police can use bulk equipment interference.

The UK maintains a long list of authorities that are allowed to access internet connection records without first obtaining a warrant. These records show what websites a person visited, but not the particular pages they saw or the full browsing history.

The 2016 act mandated that all communication service providers keep this information for one year.

In 2019 the Digital Economy Act 2017 has been approved, sanctioning the beginning of the porn ban in UK.

Mass Surveillance in the United States

The September 11th terrorist attacks unfortunately opened the floodgates of mass surveillance in the US.

After that horrific event, the federal government began tracking the calls of hundreds of millions of Americans, spying on international calls, text messages, email correspondence, and web browsing activity.

All of this was made possible thanks to a number of key laws, including the FISA Amendments Act of 2008, the Patriot Act, and Executive Order 12,333.

FISA passed through the US House of Representatives in 2008 with a vote of 293 to 129. It was momentarily delayed in the Senate thanks to a filibuster by Senators Russ Feingold and Chris Dodd.

Feingold stated that the bill threatened civil liberties, while Dodd argued against a provision that granted retroactive immunity, stating that it would undermine the rule of law.

Dodd requested that they strike the immunity provision, but the Senate soundly rejected him. The bill cleared the Senate with a vote of 69 to 28. It was subsequently signed into law by President George W. Bush on July 10, 2008.

Originally, FISA was set to expire in 2012, but the House and Senate voted to extend the law for another five years. That passed approval from President Barack Obama on December 30, 2012.

In January of 2018, the Senate approved another six-year extension from FISA Section 702, which gives intelligence organizations the right to monitor the communications of non-US citizens abroad.

This decision has come under fire as it can also be used to eavesdrop on the private communications of American citizens.

The phrase “warrantless wiretapping” became a household term in 2005, thanks to an article published by the New York Times. The piece shed light on the government’s actions, including the unwarranted spying on phone communications of American citizens. They supposedly discontinued the practice in 2007.

Yup. Suuuuuuuure.

Following the Times article, more than 40 Americans attempted to fight back against telecom companies, claiming that the Bush administration was illegally monitoring their calls and emails.

The largest single revelation regarding mass surveillance by the US government came from former CIA employee Edward Snowden who leaked classified information detailing the surveillance programs run by the NSA in 2013.

Snowden released over 1.7 million US intelligence files, and thousands from Australian and British agencies as well, which he obtained through the Five Eyes Surveillance Alliance.

Snowden’s revelation detailed an advanced spying program undertaken by the NSA that monitors internet and telephone conversations from over a billion people throughout the world.

We also learned that an automated program for suspicious keywords scans just about every email that is sent from the US overseas.

“They (the NSA) can use the system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with, and attack you on that basis to sort of derive suspicion from an innocent life and paint anyone in the context of a wrongdoer. I cannot imagine a more indiscriminate and arbitrary invasion than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval. Surely such a program infringes on that degree of privacy that the founders enshrined in the Fourth Amendment. Indeed I have little doubt that the author of our Constitution, James Madison, who cautioned us to beware ‘the abridgement of freedom of the people by gradual and silent encroachments by those in power,’ would be aghast.”
Edward Snowden

You’d think after the Snowden leak that US intelligence agencies would lie low for a while.

Unfortunately, you couldn’t be further from the truth.

Since then, the US has lightened the intensity of its data collection efforts. In 2015, the USA Freedom Act ended the bulk collection of phone metadata by the NSA but called for the retention of data by phone companies, which the government could obtain on a case by case basis if need be.

The frightening thing about US mass surveillance is how incredibly advanced it is.

I bet you laughed earlier at North Korea, rolling old school with a bunch of microphones everywhere.

Well, you’ll wish a junky Radio Shack mic was the worst thing to watch out for.

Speech to text programs allow computers to monitor phone correspondence instead of human beings, which allows for a far higher volume.

Facial recognition software can identify an individual through their facial features and their walking gait.

Magic Lantern and CIPV systems can be used to remotely monitor a person’s computer activity.

Like, real James Bond crap.

They even use social networks in their espionage efforts. Facebook alone has turned over the private information of almost 19,000 users to law enforcement.

This doesn’t appear to be changing anytime soon. By 2020, it is expected that there will be 300,000 unmanned drones deployed throughout the US for the purposes of surveillance.

Mass Surveillance on a City Level

Not all mass surveillance comes from large, shadowy government organizations.

The birth of “smart cities” throughout the world opens us up to more threats against our right to privacy.

In a smart city, governments can monitor citizens using a series of sensors. Data gathered there can then be transmitted and analyzed by law enforcement of government agencies. This leads to a rise in what’s known as predictive policing, wherein crime prevention information is analyzed to make a police force more effective.

Also, the cheesy plot to Minority Report.

Data collected within a smart city can have other uses as well, such as management of traffic issues, use of energy, and the reduction of waste products.

But all of this data transmission has people worried that “big brother” is getting a lot bigger.

City governments are continuing to use advanced technology to gather intel on citizens. Take an instance in Memphis TN, for example. The Memphis Police Department was creating fictitious social media accounts to spy on the whereabouts and private posts of noted Black Lives Matter activists.

The California DMV, without a doubt the least likely place for any tech innovation, is unveiling digital Driver’s Licenses and digital license plates. You couldn’t think of a better GPS to track your whereabouts.

And this is not a uniquely American issue, either.

Smart city advances in Amsterdam compile vast amounts of data. With more than 70 smart city projects collecting information throughout the city, the local government has a massive collection of data stored on its common IP infrastructure.

While this data is being used to improve city life, many are worried that it could also be a threat to their personal privacy. That’s why many Canadian citizens are opposing Google plans to build a smart city in Toronto.

But this question ultimately boils down to the trade-off.

The Big Question
Do the benefits of such advanced technology outweigh the potential for privacy invasion?

One example on US soil dates back to 1996 in Montgomery County, Maryland. At that time, they were looking to integrate their health and human services departments by sharing data between them. This would make the departments far more efficient, as patients would no longer have to waste time writing out the same information from scratch.

Despite privacy laws initially preventing them from sharing this data, they were eventually able to find a solution by basing their goals on four criteria to preserve the privacy of citizens.

  1. The use of shared data was for the purposes of treatment only.
  2. The use of data was limited to only what is necessary for treatment.
  3. Only specific people could access shared data.
  4. No one involved could be asked to violate their rules of professional ethics.

Whether or not that happens on a large scale is up for debate. And unfortunately, the signs aren’t encouraging.


Our interconnected world is both good and bad.

It only takes a few keystrokes to holler at ‘Ye.

But those same tweets are being gathered and compiled by just about every big corporation and government, every single day.

The only thing we do know about mass surveillance, based on where the last few years have been trending, is that it’s only going to get worse.

A lot worse.

When governments and corporations are actively working against you, doing everything in their power to steal your private data, you can only trust yourself.

And that starts by locking down your internet connection before they ever get a chance, and it is always recommended the use of a Virtual Private Network to protect your digital privacy.

Leave a comment

Kimberly M. Moore

Posted on 28/03/2022 at 23:24

Please stop withdrawing monthly payments from my checking account! I canceled your service in October!!! Where is an e-mail address or number I can call to tell you this? Please! Credit my account back and stop!!! I do not use your service!


Hi Kimberly. Sorry to hear you are encountering issues. You can contact our customer support team through 24/7 live chat or email for them to check your account and advise further.

This app is really cool


Glad to hear you enjoy our service, Ruby. 🙂

Hi as a new ghosting, how many devices can I connect to?


Hi, Domonique! You can use CyberGhost VPN on up to seven devices at the same time. 🙂

New customer… Informative read…
But one mistake/error… Food in UK is NOT terrible!
Looks like you have not explore enough many of great British dishes/food (English, Scottish, Welish etc) on offer.
Maybe just your own taste & view from based on how many trips to UK and what kind of places (probably not the right ones) have to you been to?
Keep trying.


De gustibus non est disputandum. 😅

Thats what you get from this????food goodness or ass-skinkedness is subjective

Can I connect cyber ghost to my Roku.or my Android box?


Hi, John! Yes, we support both Roku TVs and Android TV boxes.

super enjoy vpn


Enjoy your online anonymity and security, Ghostie!

Thank you so much for this higly important imformation.


Glad to hear you enjoyed reading, Ghostie!

Muchas gracias por darnos la información para poder estar seguros!!
Son una bendición!!
Un placer!!


Thank you so much for the protection


Yep redhot guys. I’ve been with CG now for 3 years and trust you guys implicitly. I like your style, always have. Keep up the absolutely EXCELLENT work!!


That was very interesting. My phone has been hacked for two years apps showing up from nowhere and I have no control over them


Kurz und bündig! Großes Kompliment an Dich, Tom.
Echt haarsträubende Szenarien mit denen wir auf unserer schönen Welt tag-täglich leben und ungefragter Weise vorlieb nehmen müssen!
Ich begrüße den Informationsbereitstellung in diesem Artikel sehr. Denn das Ausmass der Spionagetätigkeiten weltweit, ob in privater oder kommerzieller Hinsicht, hatte ich lange Zeit unterschätzt .
Allgemeine Aufklärung wäre dringend notwendig und so wichtig, schon alleine für das weitere Fortbestehen unserer so bekannten Freiheit!

Grüße an Dich und Dein Team.


Cyber ghost I have been using for 3 years now.
It is far


love that article.. it all begins now . not for them , but for us. to unite and take it all back .


Thank you, Tom! I am a student studying online and was in awe when I receieved an email saying that my account could be shut off due to downloading a movie. I will admit my guilt and I am not doing anything that I care to tell but if they know that, I feel like they know everything. I can’t get on the internet without getting dressed as I would if I were going to a brick and mortar college. I felt like there are strangers in my own home! I feel much better about things now that I’m a ghostie and I appreciate your service! Now, I can get up and study in my PJ’s without worrying about the cable guy (internet provider) watching my every move! Who knows! I may just study bare-butt naked now! Lol!


Very informative article.


This is beyond useful. Thank you for existing!


Eye-opening indeed! Thanks!




Is there a way I can find out what internet cyber software my state is using? They already made a law to give them the right to watch our internet interaction with our facial recognition and our medical records. I have already lost my out going emails. Been blocked from Watching a lot of videos on YouTube.


Thore Werner wærås

Posted on 23/10/2019 at 20:13

I have had this program on my server , laptop, router and phone, never had virus or trouble


Thore Werner Wærås

Posted on 21/11/2021 at 03:44

Its like a but-plug, install it and enjoy

Its pretty good


This article really opened my US of A eyes to how far we have come and it is scary. Glad to have a solution like yours to feel we have some privacy online. Even if we are just browsing to make Brownies. Thanks again!


Wow how awesome


All I want is to have the freedom to visit some proper adult sites without the possibilities of being hacked or spied upon. How best can I achieve this with cyber ghost vpn?


Jason Kendall of Newcastle N.S.W , Australia

Posted on 02/09/2019 at 18:24

What is the world coming to, pretty soon we won’t be able to take a crap unless there is survialance cameras installed in the toilet cubical where big brother can watch if we are a wiper or a scruncher, I hate cameras and they are everywhere we go, come on society, we didn’t need video survialance in the 40’s, 50’s, 60’s,70’s, and they only had just started thinking about it around the 80’s , everyone managed back then so WTF????


Pas de wifi, suis je sécurisé, chez moi ,sur mon smartphone ? Merci.


i recently came under attack by some people who got control of my mouse curser and put a blue screen on my computer, and tried to get me to pay them 200 dollers to remove it.


Google are responsible for helping the Chinese Government censor its internet. Google should be the most hated and despised company in the world, for not only what they have done to China but also how they have helped the US government and other world governments spy on their own citizens and stifle free speech. on an open internet. Google should not be allowed to have the monopoly that they have but they get away with it because of their usefulness to world governments.

I live in hope that someone will take on Google in the courts for unfair monopolistic practices. If Google were any other company, say selling computers, they would have to face the courts. This should not be allowed and tolerated and people everywhere need to drink a cup of “Wake-the-fuck-up” and realize that Google is not their friend. Disable all Google services that you possible can on your mobile phone. Use DuckDuckGo as an internet search, and never miss an opportunity to take back the power to where it should be.


Thanks for your comment, Neil!

Many of the big online giants engage in some questionable-at-best practices. As you say, Google in particular stands out due to the power they hold. While they do get hit with various fines, these are like drops in the ocean. So yes, until more serious action is taken, users deciding to go with more privacy-friendly services is one way (among many) to fight back against digital surveillance.

I attempted to rid myself of all Google tenticles on my machine. One result was the loss of Internet connection.
Has anyone published a How-to column regarding the way to completely purge Google ?

Would be interesting to know who the manufacturers are which made the equipment for those surveillances.; also, which companies marketed that equipment to China, Russia, and N. Korea.

I would not be surprised in those companies are directly based out of the United States of America, especially because of how Google, Facebook, Amazon, and their related or subsidiaries operate these days.


Hi Sal,

I agree, it would definitely be interesting to know all of that. And while you may think non-US companies are more likely to be complicit, a recent article in The Intercept highlighted the extent IBM was involved in the Philippines.

It just goes to show, you can’t take anything for granted when it comes to this stuff!

You’ve noted Facebook above, but I think you should’ve mentioned Oculus which is also in their family. In Google’s family is DragonFly. The two bastardised family members aforenoted are projects, to their “respective” parent companies, in communist China.


Hi Sal, thanks for the suggestions.

I’ll see if I can address these projects somewhere in a future article. 🙂

Illuminating article, no doubt. Thanks Tom.


Thanks! 🙂 Glad you enjoyed.

Excellent article Tom. I like your light style combined with the heavy, important information. Love what you guys are doing over at Cyberghost. Keep it up and thank you!


Thanks Mac! 🙂

Write a comment

Your email address will not be published. Required fields are marked*