Saltar al contenido principal

Democratic and authoritarian countries are competing to see which of them can carry out mass surveillance most and best (worst).

State mass surveillance

USA and their friends in the surveillance alliance Fourteen Eyes have demonstrated that they have the capacity, the desire and the experience to monitor who they want, when they want, anywhere in the world.

There are two types of mass surveillance. Commercial, which you can read about here. And mass surveillance carried out by states and rulers. Both are reprehensible, and our attitude is well-established: mass surveillance infringes individuals’ human rights, invades the personal privacy free societies are built on, and is also ineffective against the problems it’s claimed to solve. This is the ultimate core of our business. Our company was founded in 2009 because the surveillance laws were going in the wrong direction, and our message to those in power all over the world is the same now as it was then: there’s a difference between surveillance and mass surveillance. Don’t get involved with the latter: don’t carry out mass surveillance on your population or that of other countries. Use targeted surveillance if there’s a suspicion of a crime, in a proportional way and via independent court decisions.

We think human rights are worth preserving and defending. And it’s important to remember that they’re there to protect people against the state. They are a landmark to cling to, to prevent the worst parts of human history repeating themselves. They are there because people and those in power take bad decisions. Because governments change. Because no state should have total and uncontrollable power. Ultimately, the state should be there for the people and not the other way round

Even if a large part of today’s mass surveillance is global, it originates in different countries and changes depending on what country you live in. You can read about the consequences of mass surveillance here. But in this article, we’re going to take a look at some of the clearest examples of how widespread it has become in large parts of the world.

USA: with the capacity and experience of monitoring the entire population of the world.

There’s a problem with reporting the mass surveillance carried out by countries like the USA (at least if you want to stick to proven facts): they aren’t very happy about you talking about it. Of course there are exceptions. Like when self-satisfied managers like the CIA’s chief technology officer Ira ‘Gus’ Hunt give presentations and boast to journalists about how “we try to collect everything and hang onto it forever”. Or when a senior Defense Department official explains that not even the Pentagon’s employees can expect to have their privacy respected: “We want our people to understand: they should make no assumptions about anonymity. You are not anonymous on this planet at this point in our existence. Everyone is trackable, traceable, discoverable to some degree”.

And sometimes a building says more than a thousand words, like when the NSA constructs enormous server halls out in the Utah desert to store data.

But to get mass surveillance down in black-and-white, to produce hard facts and figures, it requires brave whistleblowers like Edward Snowden. It’s only through this type of hero that we get an insight into what’s actually going on. Even now we still don’t have better answers than what Snowden gave us in 2013. We’d hoped for change in the wake of his revelations, but unfortunately they’re still relevant today, so that’s where we’ll start.

Snowden's revelations showed that American authorities were monitoring hundreds of millions of people all over the world – every day.

American mass surveillance is possible thanks to Section 702 of the Foreign Intelligence Surveillance Act (FISA), a law that the USA renews every five years. Section 702 is the key to why American authorities need no court decisions to monitor people. The law came into being on the pretext that terrorists were being tracked after the 9/11 attacks, and would ‘only’ refer to eavesdropping on non-American citizens, but as the law is written and as the internet is constructed, in practice it means surveillance of both foreign and American citizens. When Snowden’s revelations emerged, it also turned out that it wasn’t just being used against people suspected of a crime, but that the American administration was carrying out mass surveillance of millions of people. Other documents that Snowden leaked demonstrated how the National Security Agency (NSA) had the capacity to monitor essentially every person on the planet, and that they weren’t saving their powder: the documents showed, amongst other things that they collected 200 million text messages from different parts of the world – every day.

Using the program Xkeyscore, the NSA’s analysts had access to a database covering “nearly everything a typical user does on the internet”. This included both direct data like emails in people’s inboxes, chat conversations and private messages on Facebook. But also things categorized as metadata; search histories and exactly what sites millions of people were visiting. Using XKeyscore the analysts could also do searches on people’s internet behavior – entirely without judgments from either a court or even a superior inside the NSA. Either via a hard search: for example through an IP address or email address, which could give them access to virtually everything a specific person did online. Or via a soft search: a search for a keyword or phrase, which could give them lists of people with a particular internet behavior. Snowden showed the world how easy it was for the NSA to search in XKeyscore and how much they could get out from the program. But where did all the data come from?

Section 702 contains two parts that give American authorities such as the FBI, CIA and NSA access to enormous quantities of data, and they go by the names of PRISM (downstream) and Upstream.

PRISM means that they have the right to demand data from American companies without a court decision. When the authorities have free rein to request information from the world’s biggest tech companies, it’s not surprising that it ends in mass surveillance. But Snowden revealed that the situation was even worse. The leaked documents revealed that the authorities didn’t even need to request the material, but that they more or less had direct access to the tech companies’ systems and servers. As Snowden wrote in his book Permanent Record: _”_PRISM enabled the NSA to routinely collect data from Microsoft, Yahoo!, Google, Facebook, Paltalk, YouTube, Skype, AOL, and Apple, including email, photos, video and audio chats, Web-browsing content, search engine queries, and all other data stored on their clouds.”

Of course all the tech companies on the list denied that the FBI, CIA and NSA had direct access to systems and servers. Which maybe wasn’t all that strange, because the law can actually mean that it’s illegal for the companies to admit their involvement.

The systems reacted to keywords such as 'anonymous internet proxy' or 'protest'. There, algorithms decide which of the agency's exploits – malware programs – to use against you. Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.

Edward Snowden

While PRISM gave the NSA the right to demand data from American companies such as Microsoft, Facebook and Google, Upstream gave them the right to directly connect to the backbone used by American telephone and internet service providers. This involved major American telecoms companies such as AT&T but also the world’s biggest router manufacturers, who built monitoring for the NSA into their products. Snowden again:

“Upstream collection, meanwhile, was arguably even more invasive. It enabled the routine capturing of data directly from private-sector internet infrastructure – the switches and routers that shunt internet traffic worldwide, via the satellites in orbit and the high-capacity fiber-optic cables that run under the ocean.”

It would take a lot to prevent global internet traffic from traveling via American servers, cables and services. That’s how the digital infrastructure and power relationships are constructed. In principle, PRISM and Upstream therefore gave the American authorities the possibility of monitoring every person on the globe. Snowden showed that they could search people’s history, but also monitor them in real time. Handling that quantity of data required sorting, which was done via the TURMOIL and TURBINE programs. In Permanent Record, Snowden wrote:

“You can think of TURMOIL as a guard positioned at an invisible firewall through which internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as ‘anonymous internet proxy’ or ‘protest’. If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits – malware programs – to use against you. Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.”

Snowdens whistleblowing revealed that the American authorities were eavesdropping on people’s conversations, reading their messages and even looking right into their homes via cameras in computers and mobile phones. And yet it’s common for states carrying out mass surveillance to deny it and try to hide behind the phrase ‘we only collect metadata’. As if that wasn’t enough. American cryptographer and security expert Bruce Schneier describes it as follows in his book Data and Goliath:

“In a text message system, the messages themselves are data, but the accounts that sent and received the message, and the date and time of the message, are all metadata. An e-mail system is similar: the text of the e-mail is data, but the sender, receiver, routing data, and message size are all metadata. Metadata may sound uninteresting, but it’s anything but. Collecting metadata on people means putting them under surveillance. Eavesdropping gets you the conversations. Surveillance gets you everything else. Metadata reveals our intimate friends, business associations. It reveals what and who we’re interested in and what’s important for us, no matter how private.”

Metadata includes all the websites you visit and your entire search history, and when you realize that, the ‘we only collect metadata’ defense suddenly becomes very thin. Stewart Baker, former general counsel for the NSA, expressed this clearly: “Metadata absolutely tells you everything about somebody’s life. If you have enough metadata you don’t really need content.” You can read more about metadata here.

For example, metadata can be used to identify journalists critical of the American mass surveillance apparatus. Two of them are Laura Poitras and Glenn Greenwald, the journalists Snowden reached out to when he decided to blow the whistle. Snowden chose them because they had already criticized the NSA and had suffered personal consequences as a result. When he handed over the documents to them, in that Hong Kong hotel room, it was revealed that the NSA partner GCHQ had been monitoring journalists from the New York Times, Le Monde, and the Washington Post, among others, and classified investigative journalists as a threat equal to terrorists and hackers.

The fact that the NSA was monitoring journalists wasn’t particularly surprising. The American surveillance apparatus wasn’t merely eavesdropping on terrorists and criminals. They were also carrying out industrial espionage and monitoring human rights organizations like Amnesty and Human Rights Watch. They weren’t simply listening to hundreds of millions of Americans, but for example also captured 70 million French phone calls per month. And of course the system was used to monitor politicians and world leaders.

We haven’t been able to get as good an insight into how the American authorities work since Snowden’s revelations. We don’t know exactly how they carry out mass surveillance today. But Section 702 has been extended. And every year since 2013, more and more information has emerged about how the NSA, CIA and FBI are sticking to their tactics of not merely monitoring suspects, but carrying out mass surveillance of the entire population.

End-to-end-encryption was a pipe dream in 2013. An enormous fraction of global internet traffic traveled electronically naked. Now, it is a rare sight. But the capabilities governments had in 2013 seem like child's play compared to today.

Edward Snowden

In 2017, we all got a new insight into the American mass surveillance apparatus. The leak was far from as comprehensive as Edward Snowden’s, but it was clear that these activities were still continuing when Wikileaks revealed that the CIA had hacked into people’s phones, computers and TVs to carry out mass surveillance. And this time, not even the commercial partners denied it: “If your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition”, as Samsung expressed it.

The quote could have come directly from George Orwell’s 1984 dystopia, with its telescreens that both sent out propaganda and listened to the population.

In 2023, Snowden gave his picture of how the world had changed, ten years after he had become a whistleblower. He spoke about how his revelations had made the tech companies introduce end-to-end encryption and that in many ways it’s no longer as easy for authorities to simply eavesdrop on all internet communication. At the same time, the technical skill and development have advanced enormously, even on the other side. As Snowden expressed it:

“If we think about what we saw in 2013 and the capabilities of governments today, 2013 seems like child’s play. The idea that after the revelations in 2013 there would be rainbows and unicorns the next day is not realistic. It is an ongoing process. And we will have to be working at it for the rest of our lives and our children’s lives and beyond.”

The tenth anniversary of Snowden’s revelations received widespread attention, and the majority of sources were in agreement that global mass surveillance has certainly not ceased, merely found different approaches.

It has emerged that organizations including the FBI and other three-letter agencies have purchased collected data from data brokers. But why do American agencies, who already have an exemption allowing them to monitor people without a court order, buy data from data brokers? Well, for a start, when they buy data, they needn’t claim that American citizens “happened to be caught up in surveillance of foreign threats”. It’s likely also true that commercial data collection has become so widespread and so invasive that it’s cheaper and more convenient for the agencies to simply purchase the data rather than doing the job themselves. As one consultant for the American government put it, in an article about how the American agencies used data collection via apps to track some of Putin’s closest entourage: “The advertising technology ecosystem is the largest information-gathering enterprise ever conceived by man.”
Or as Michael Morell, former director of the CIA, put it:
“The information that is available commercially would kind of knock your socks off. If we collected it using traditional intelligence methods, it would be top secret-sensitive. And you wouldn’t put it in a database, you’d keep it in a safe.”

The reason why the CIA had been forced to keep it secret, if they had collected it themselves, is obvious – the agency isn’t permitted to carry out this type of data collection according to the American Constitution (although they still do it anyway via the Section 702 exemption to the Foreign Intelligence Surveillance Act).

In recent years, the fact that American agencies have purchased large quantities of data from data brokers has contributed to an increasingly heated discussion about Section 702 – the law that the Americans extend every five years which makes it possible for their agencies to carry out mass surveillance without a court order. Senator Ron Wyden has been one of the most voluble critics and has urged the government that it “should not be funding and legitimizing a shady industry whose flagrant violations of Americans’ privacy are not just unethical but also illegal.”

The debate became a hot topic in 2023 when it was once again time to renew Section 702 for a further five years. The House of Representatives failed to pass the extension bill on three occasions and was forced to delay the decision until spring 2024. At the same time, amendments to the law were suggested. The biggest proposed amendment would force agencies to have court approval before they were able to monitor American citizens. Another proposal would prevent the NSA from carrying out ‘abouts collection’ – in other words monitoring aimed not just at people communicating with surveillance targets, but also involving communications where the target has merely been mentioned.

In other words, a minor storm erupted about the latest extension of Section 702, indicating deeper awareness of and broader skepticism to American mass surveillance. But how did it end? Well ultimately both the House of Representatives and the Senate still voted an extension through – but following the debate in the House of Representatives, the extension will only run for two years instead of the normal five. This shorter extension could have been seen as a step in the right direction if it wasn’t for the fact that an expansion of the law was also voted through at the same time. Because despite all the protests and debates in the House of Representatives, when the extension was passed the majority in both the House of Representatives and the Senate had no problem expanding the list of companies that, according to the law, can be forced to collaborate with government agencies and their mass surveillance of the population. The definition of organizations that must permit surveillance is now so broadly described that it could even include anyone with physical access to a target’s communications infrastructure, such as routers. Senator Ron Wyden called the expansion “dramatic and terrifying.” Edward Snowden commented on the issue by stating: The NSA is taking over the internet.” Instead of a step in the right direction, the exemption became more invasive than ever.

Europe: Countries in close collaboration with the USA. Sometimes even worse than Big Brother.**

But Edward Snowden’s whistleblowing didn’t expose only the actions of the American authorities. In the same way as the US Upstream system, the UK connects directly to the fiber optic network between the USA and Europe, and gives what it calls the Tempora program access to internet traffic between the two continents. With Tempora, the British intelligence organization GCHQ could, it claimed, “Master the internet”, and Snowden’s leak showed that it was a very apt description. In 2013, 300 GCHQ and 250 NSA employees worked full time to analyze the data that arrived via 40,000 different key triggers. In total, 850,000 NSA employees had access to the British system, which processed 600 million ‘telephone events’ and other traffic every day via 200 fiber cables. Snowden called Tempora “the largest program of suspicionless surveillance in human history”. But what did GCHQ have to say? When they trained new analysts in the tool, the presentation had the title “You are in an enviable position – have fun and make the most of it”. It suddenly doesn’t sound so unlikely that NSA employees would pass around naked pictures of the people they were monitoring.

And the USA and UK aren’t the only countries collaborating and sharing surveillance between them. Since the Second World War, the countries in the Five Eyes electronic eavesdropping alliance have shared data amongst themselves. From the outset, the members of the English-speaking Five Eyes pact were Australia, Canada, New Zealand, the UK and the USA. But Edward Snowden’s leaks revealed that the alliance had been expanded and that it now went by the name Fourteen Eyes, with the new members being Belgium, Denmark, France, Germany, Italy, the Netherlands, Norway, Spain and Sweden.

VPN actors who claim they are better because their business isn't in a Fourteen Eyes country are ignorant and dishonest. The internet is a global phenomenon, and your traffic crosses the borders of several Fourteen Eyes countries as soon as you start to surf, regardless of where your VPN company is based.

It’s important to emphasize: Mullvad VPN is a Swedish company, and our business is based in a Fourteen Eyes country. That has absolutely no impact on our users. The Fourteen Eyes agreement is based on collaboration between intelligence services and on the fact that they sometimes share the internet traffic that crosses their country borders in the physical cables that, for example, run under the Atlantic. As we’ve already observed, the internet is a global phenomenon and the majority of traffic is sooner or later routed via the USA, so it’s really not important where a VPN actor is based. Regardless of where their business is in the world, and regardless of where their servers are, their users will not be able to remain within those borders, because they will naturally visit websites and use services that are located elsewhere. In addition, these 14 countries were revealed more than 10 years ago. No VPN actor knows how high the figure is today and which countries are involved.

But fortunately, the whole idea of a VPN is to encrypt traffic, to make it impossible to read, for example if an authority has connected to a fiber cable. So when VPN actors claim they are better because their business is based ‘outside Fourteen Eyes countries’, it’s not only proof of a serious lack of knowledge, it’s also dishonest and misleading. When it comes to where your VPN actor is based, only the country’s laws are relevant. The laws that control how a VPN service must log and reveal data are crucial. Sweden is a good country from this perspective. You can read more about the laws relevant to Mullvad here.

It’s hardly news that the intelligence services in different countries collaborate, and nor is it a problem. The problem is that they do so via mass surveillance, despite the fact that it’s constantly being judged as horrifying and illegal. In 2018, the European Court of Human Rights stated that the Tempora program was illegal and incompatible with the conditions required for a democratic society and in 2020, an American court decided that the NSA surveillance of hundreds of millions of people was unlawful and unconstitutional. You might be forgiven for thinking that such repeated scandals would tip the world in another direction. But instead, it seems like mass surveillance is simply getting more and more extensive.

An intense tug-of-war is under way in the EU. At one end: the EU’s highest court, which over and over again rules that mass surveillance is illegal, plus the part of the EU trying to put legal pressure on tech companies via directives such as the GDPR. Up to now, the GDPR Directive has been largely ineffective, and has mostly succeeded in handing out symbolic (in the context) fines to the world’s richest companies while simultaneously making the internet experience a cookie nightmare for every user. But this type of regulation has actually started to put pressure on big tech companies like Meta and Google. Hopefully this will ultimately lead to something good, but there’s a risk that the tech companies will simply adapt, regroup and come up with new solutions to collect data. Read more about their techniques here. But we still applaud attempts from the EU and hope that this is the power in Brussels that gets the longest straw. Because there’s another side in this battle, that’s pulling in completely the opposite direction.

At the other end of the rope, for example, we find EU countries like France, which wants to introduce AI video surveillance and a Hungary installing black boxes allowing the state direct access to ISPs’ networks, and therefore to users’ internet behavior, without a court decision.

In the same sphere, we also find parts of the commission wanting to introduce a total prohibition on private communication with its proposed chat control law, which would mean mass surveillance on a level that would even make the NSA jealous. Needless to say, we’re closely following the battle between those who want to transform the EU into an authoritarian alliance and those who actually care about privacy and are attempting to provide a good example for the rest of the world.

In the UK too, there are powers that want to undermine the encrypted traffic that’s become more popular since the Snowden revelations, through the draft Online Safety Bill.

In both Europe and other parts of the world, we’ve also seen how Pegasus spyware is used by countries to target dissenters, political activists and journalists.

Governments and authorities in democratic countries have shown that they have no problem carrying out mass surveillance of entire populations and looking straight into law-abiding people’s homes via phone cameras and microphones, TVs and computers. And their authoritarianism shines through their ambitions, like when EU Commissioner Ylva Johansson thinks the EU’s experts and independent regulatory authorities make it difficult for Europol to do its work. It bears repeating: human rights are there to protect people against the state. And it’s also important to remember that rights are something you also have to fight for.

Authoritarian countries: don’t conceal their ambitions for their mass surveillance.

The fact that totalitarian countries also use mass surveillance scarcely needs saying. In the world, there are more than 4.5 billion internet users. 76% of them live in countries that imprison people for things they’ve written online about political, social or religious issues. Almost as many live in countries that block and censor online content. In other words, in authoritarian countries a VPN isn’t used only to reduce mass surveillance, but also as a tool to even be able to get out into a free, uncensored internet, so that people can gain free access to information.

Here are a couple of examples: in Iran, the state has become known for switching between completely shutting down the internet and allowing its surveillance program, SIAM, to control, filter and monitor how people use their phones (via the mobile network).

In Egypt the government monitors journalists, activists, and lawyers. In Morocco the authorities have used Pegasus to monitor human rights organizations.

In Russia, the Russian Federation’s federal security service (FSB) has long used the SORM system to eavesdrop on phone calls, and to read emails and messages. By combining this with censorship, blacklisted technology and other surveillance, Russia’s really cracking down hard on its citizens. In Moscow, the state has introduced a system that combines several hundred thousand surveillance cameras, facial recognition and monitoring of mobile data. The system has been used to track and imprison demonstrators, political opponents and journalists. They call both the program and the Moscow’s digital infrastructure ‘Safe City’.

Ironically, however, this massive mass surveillance system has begun to bite the hand that feeds it. On the digital black-market cyber bazaar known as Probiv, corrupt and/or poorly paid and dissatisfied officials have begun leaking data from the enormous databases resulting from mass surveillance. The problem for those in power in Russia is that they’re in the database too. For a very small sum, it became suddenly possible to buy information about Putin’s innermost circle, which the opposition, other countries and investigative journalists didn’t hesitate to exploit.

The Great Firewall of China controls and censors the internet for 750 million inhabitants. They are under total surveillance and the police system claims to be able to predict when someone is going to commit a crime, and where.

The list of countries using mass surveillance, censorship and persecution on their citizens is a long one. Here’s a good review of the situation in different countries and how the trends look (spoiler: the world has declined by this measure 12 years in a row). Many countries compete to be worst in the world, but regardless of how you count it’s very difficult not to think that China beats them all.

The Chinese state controls the country’s 750 million internet users in an “utterly mind-boggling way”, as Edward Snowden has put it. The state controls the sites users can access, blocks VPN services and requires inhabitants to register using their real name to be able to post content. Social media and messaging apps in the country are under state surveillance, foreign apps are prohibited and even TikTok, which was founded in China, has a special version that blocks international content. Internet service providers in the country are forced to collaborate with the state, and all of China’s mobile phones are under constant monitoring via location data. The Chinese people’s internet experience is completely controlled and censored under what’s known as The Great Firewall of China and even by 2013 there were 2 million ‘internet public opinion analysts’ working manually to censor citizens’ messages online.

But of course the country doesn’t work merely with manual monitoring. In what has been called ‘public opinion analysis software’, the state collects data and uses AI to react to ‘sensitive material’. The list of activists, journalists and perfectly ordinary people imprisoned for criticizing China online seems endless. You only have to insult ‘heroes and martyrs’ to risk spending three years behind bars.

In the Police Cloud, the state has also constructed a system based on big data which is said to be able to ‘visualize’ hidden trends and relationships between people. Using this system, the state draws up relationship maps and registers what it calls ‘extreme opinions’. Another part of the program is claimed to be able to predict crime and where it’s most likely to take place.

China also collect ‘voice prints’ from people, has installed more than half of the world’s 1 million surveillance cameras and has also introduced technology that not only contains face recognition but can even identify how you’re feeling. Overall, the image emerges of a surveillance society that’s not merely reminiscent of the dystopian societies we’ve read about in science fiction but in many ways goes well beyond them.

The documentary Total Trust describes how the Chinese Communist Party “solves problems at grassroots level” by allowing 4.5 million ‘grid officers’ to maintain records on how the inhabitants of different areas (grids) behave. If somebody is suspected of doing something ‘unsuitable’ they quickly receive a visit from the police. To help them, they have the ‘Sharp Eyes’ project, which takes the form of a large number of surveillance cameras used by the government to keep track of citizens, but which so-called ‘volunteers’ can also use to denounce their neighbors. “The People have sharp eyes,” as the government puts it. Together the many millions of surveillance cameras in the country create what they call ‘Skynet.’ The cameras are located not only out on the streets and outside the homes of those who have been classified as ‘unsuitable’, but also inside stairwells and at the front doors of those always ready to inform on their neighbors.

Through the hundreds of millions of surveillance cameras, biometric AI (such as facial recognition, eye recognition, and voice recognition) and total monitoring of people’s online behavior, they have managed to connect the digital world to the physical. When people who refuse to stand for the regime’s injustices get ready to leave their homes to meet a lawyer, complain about a government agency, or for any similar activist activity, the police already know about it and put staff in stairwells to carry out temporary house arrests.

But temporary house arrest or police custody is far from the worst that can happen. In 2015, hundreds of human rights lawyers were imprisoned and tortured in what is known as The 709 Crackdown. Those not imprisoned are monitored constantly. Journalists who have written about their experiences have had their phones tapped and have been imprisoned.

How does the Chinese government justify all this? By saying that they are creating safe communities and smart cities.

For authoritarian countries, mass surveillance is a tool of control, and significant resistance will be needed to improve the situation for the inhabitants of those countries. In totalitarian states, the technologies used to persecute dissenters, censor information and stifle protest movements. There’s no doubt about this – and this type of country isn’t exactly ashamed of it, either.

Democratic countries don’t boast about it as much and the consequences for those affected are not as severe. But we’ve already seen how mass surveillance is used to win free elections and how dissenters and journalists are monitored. There are several democratic countries on a slippery slope and the question is where they will end up when history is being written. Do they want to continue being democratic or not? Because that’s what mass surveillance is about. Mass surveillance equals control and is the opposite of freedom. And there’s a boundary somewhere. Somewhere, you finally lose your position as a free society. That’s why we fight for a free internet.

It’s obvious that state mass surveillance is widespread around the world. But what actually happens to the data collected?

State mass surveillance systems get a boost from commercial companies. Read more about how the tech giants map your life online.

Mass surveillance risks leading to the collapse of a free society. Here, researchers and experts explain how it’s slowly but surely sending democratic countries in the wrong direction.

When the state fails to uphold human rights, technology can step in. Read more about how a credible VPN and a privacy-focused web browser contribute to the fight.