Book cover of Privacy Is Power by Carissa Véliz

Carissa Véliz

Privacy Is Power Summary

Reading time icon13 min readRating icon4 (1,050 ratings)

“You are being surveilled at every moment of your day. Your habits, preferences, and vulnerabilities are the fuel for a powerful economy that infringes on your freedom and democracy.”

1. You’re Surveilled 24/7 – Often Without Your Knowledge

We live in an age where nearly every aspect of your life is monitored. From the moment you wake up and check your phone, data about your location, habits, and routines are being shared with numerous entities. The simple act of turning on your device notifies your phone manufacturer, app providers, and service providers of your activity and even details about who might be nearby.

Smart devices in your home, such as TVs and kettles, are another source of constant monitoring. They track your viewing habits, preferences, and any connected activities. A study revealed that one Samsung TV connected to over 700 internet addresses within 15 minutes of being turned on. This is how deeply integration exists in our everyday appliances.

Cars and work devices also add to this endless surveillance cycle. Cars monitor places you go, music choices, and even eye movements to feed data back to their systems. Meanwhile, emails often contain trackers that monitor your online moves. Surveillance is present in every corner of life, shaping the world we operate in.

Examples

  • Opening your phone alerts dozens of parties to your waking time and location.
  • Smart TVs connect to hundreds of internet addresses behind the scenes.
  • 40% of all emails contain activity trackers.

2. The Birth of Surveillance Capitalism

The shift into mass data collection was driven largely by corporate greed. In the 1990s, devices like TVs and cars served only the user, not the manufacturer. But by the early 2000s, Google discovered that personal data could be commodified for profit.

Google revolutionized the advertising industry by analyzing user search behavior to create targeted ads. This breakthrough turned user data into a lucrative resource, propelling Google’s profits by hundreds of millions. Soon, every industry was tapping into this new model, introducing “smart” devices to extract user data and integrate themselves deeper into people’s lives.

The move to an economy based on surveillance transformed people into products. As companies like Google led the charge, the commercial value of personal data surged. This turned citizens into data points, redefining capitalism.

Examples

  • Google used search data in 2000 to create targeted ads, skyrocketing its revenue.
  • Nike introduced smart shoes to participate in the data economy.
  • The concept of "data exhaust" turned digital behavior into a tradable commodity.

3. Data Provides Power Over Individuals

Whoever controls data controls people. Corporations manipulate this power by using insights about you not to help, but to exploit or control. Ads target vulnerabilities, sway opinions, and sometimes discriminate against individual characteristics.

Data-directed advertising goes beyond selling products. It finds precise pain points to offer "solutions" you may not know you need. For instance, an individual going through marital challenges might unintentionally be pushed ads for divorce lawyers. Beyond sales, this power extends to politics. Events like the 2016 US election demonstrated how Cambridge Analytica weaponized user data to steer voters' opinions through fake news targeting.

Data-fueled algorithms also implement unseen prejudice. Consumer score systems based on data determine call prioritization or return eligibility. These profiling systems create inequality invisibly but effectively, showing how pervasive data influence has become.

Examples

  • Cambridge Analytica used Facebook data to influence the 2016 US election.
  • Certain companies show ads based on sensitive data like relationship issues.
  • Consumer scores determine how long you're left waiting on customer service lines.

4. Personal Data Is a Digital Hazard Like Asbestos

Just as asbestos became notorious for its hidden dangers despite initial usefulness, personal data wields double-edged consequences. It’s an incredible resource for predictive insights but threatens privacy and safety when leaked.

Data breaches demonstrate the catastrophic damage such leaks can create. For instance, a 2015 data breach targeting Ashley Madison exposed over 30 million users. Many victims’ lives were shattered, with some even leading to self-harm. Another historical example highlights how census records at the time of WWII enabled targeted persecution during the Holocaust.

The toxic nature of data means it must be regulated carefully to avoid tragic outcomes. Otherwise, vulnerabilities exposed by personal records will continue to escalate dangers.

Examples

  • The 2015 Ashley Madison data breach left lives in ruins.
  • WWII census records facilitated Nazi targeting of Jewish citizens in occupied regions.
  • Criminals have exploited stolen data like stolen bank details to commit large-scale fraud.

5. Big Tech’s Narrative Manipulates Users

In an offline context, behaviors like stalking or snooping are clearly unacceptable. However, online surveillance has been normalized as part of modern digital interaction. Why is this double standard widely accepted?

Big Tech companies have masterfully controlled public narratives, portraying privacy concerns as outdated or unnecessary. They push the idea that resisting technological trends goes against progress itself. Yet, consumer resistance has countered this framing before. Google's controversial Google Glass faced backlash and was ultimately discontinued.

By challenging Big Tech’s constructed inevitability, we can reclaim decision-making power over how technology interferes in our lives. Ethical alternatives exist, and their adoption can shift industry behavior.

Examples

  • Google Glass was discontinued after it faced significant consumer backlash over privacy invasion.
  • Big Tech frames privacy as outdated to perpetuate surveillance capitalism.
  • Resistance to invasive apps proves that ethical development can be prioritized.

6. The Failures of Targeted Advertising

Originally, targeted advertising was promoted as mutually beneficial. But its implementation shows horror stories rather than benefits. Far from limiting irrelevant ads, targeted promotions rely on mass surveillance, profiting at the expense of personal freedom and communal trust.

Ironically, evidence suggests targeted advertising isn’t even as effective as once believed. Studies reveal that gains in targeted ad revenue compared to generic methods are marginal at best. Instead, targeted advertising distracts budgets while contributing to social polarization through reinforcement of biases and echo chambers.

Scrapping targeted advertising entirely could alleviate many privacy violations and support independent-minded technological developments.

Examples

  • Companies often waste money on ineffective targeted ads despite huge surveillance costs.
  • Fake news and echo chamber effects stem directly from ad-targeting methodologies.
  • Public trust nosedives due to the normalization of invasive digital advertising.

7. Selling Personal Data Creates Systemic Dangers

Treating personal data as a commodity has allowed companies to exploit individuals in deeply harmful ways. Buying and selling sensitive details—whether financial, behavioral, or personal—enables criminal misuse or exploitation.

In one chilling case, a man purchased stalking victim Amy Boyer’s address from a data broker, which led to her murder. Such events clearly highlight why regulations are needed to stop data resale markets. Individuals should be empowered to control how, or if, their data is utilized at all.

Examples

  • Amy Boyer’s murder based on purchased data illustrates fatal loopholes in privacy laws.
  • Companies profit off unethical data sales like information about abuse victims.
  • Regulation remains behind as the data trade explodes into diverse markets.

8. Simple Changes Can Protect Your Privacy Online

While large-scale regulation is necessary, you can take actionable steps today to protect your privacy. The way we interact with the internet contributes to surveillance systems, meaning behavior adjustments are impactful.

For starters, limit the information you post and remove older, unused digital accounts. Opt for privacy-friendly apps and encrypted services to minimize exposure. Performing periodic clean-ups—like tightening account settings—limits overall risk in case of breaches.

Examples

  • Privacy-focused search engines limit browsing information footprints.
  • Digital accounts you stop using are ideal targets for breaches unless deleted.
  • Social-media posts remain retrievable forever regardless of deletion attempts.

9. We Need Government Action to Regulate Data Practices

Governments lag behind the evolution of surveillance capitalism. Nevertheless, regulation is possible, and even modest changes could drastically weaken Big Tech’s hold. Advocacy has already achieved outcomes, including consumer pressure halting certain invasive projects.

By banning targeted ads, governments would instantly remove incentives for mass surveillance. Equally, preventing personal data from becoming tradable goods would counteract profit-driven exploitation. Public support drives productive governmental responses to monopolistic data exploitation.

Examples

  • Privacy laws already banned certain practices in regions like the EU.
  • Consumer resistance to Google Glass showed public pushback alters industries.
  • Research exposes minimal revenue yield from targeted ads versus traditional models.

Takeaways

  1. Protect yourself by periodically cleaning digital accounts and using private apps.
  2. Advocate for legislation banning targeted advertising and unregulated data sharing.
  3. Prioritize privacy daily by limiting personal content shared online or saving offline backups.

Books like Privacy Is Power