The architecture of mass surveillance
We trace the modern surveillance state back to the 2013 leaks from Edward Snowden. His disclosures, as reported by Glenn Greenwald in The Guardian and by Laura Poitras, revealed bulk collection and intrusive practices inside intelligence agencies. Those documents are the foundation for many later investigations. Reports from Privacy International and the Electronic Frontier Foundation show how metadata harvesting and bulk intercept programmes enable profiling at scale. We do not invent these facts. We cite the original reporting so readers can assess the evidence themselves.
Corporate tracking and the data supply chain
We also examine how commercial systems feed surveillance. The Cambridge Analytica scandal, exposed by Carole Cadwalladr in The Observer and The Guardian, demonstrated how harvested social data can shape political targeting. Privacy International and researchers like Prof. Helen Nissenbaum explored how data brokers aggregate personal details and sell them to unknown buyers. These are documented findings and not our assertions. The concern is that corporate datasets can merge with state tools to create a seamless view of an individual s life.
Targeted spyware and cross border abuse
We point readers to the 2021 investigations by Forbidden Stories and Amnesty International that exposed Pegasus spyware. Journalists including Laurent Richard and researchers at Amnesty detailed how private companies sell spyware to regimes that use it against activists and journalists. These investigations list victims and methods. Our team highlights that the technical capacity to infiltrate phones is becoming widely available and poorly regulated.
Facial recognition and policing
We follow work by Big Brother Watch and Liberty that documents police use of facial recognition in public spaces. Studies by the Ada Lovelace Institute and the UK Information Commissioner s Office show high error rates and biased outcomes for minority groups. We rely on these analyses to argue that such systems present civil liberties risks when deployed without robust oversight.
What we can do
We recommend practical steps based on expert advice from the Electronic Frontier Foundation and Amnesty. Use end to end encrypted messaging where possible, audit app permissions, use privacy focused browsers and consider lawful challenges through civil society groups. Collective action and litigation have forced transparency in the past, as seen in legal pushes against unlawful retention laws in the UK.
We encourage readers to follow primary sources and named investigators when assessing claims. Our team compiles and explains, but we do not claim original ownership of leaked documents or investigative findings. Sign up to our newsletter for daily briefs.