1

Almost 90% of Internet Users are Under Surveillance

Freedom House analysts have concluded that about 3 billion people – 89% of Internet users – are under some form of surveillance. Governments are using increasingly sophisticated technologies to monitor the behavior of their citizens on social media platforms. According to the report, the surveillance market has grown, providing intelligence and law enforcement agencies with new tools for analyzing huge amounts of information. At least 40 of the 65 countries that were analyzed in this report have implemented advanced social media monitoring programs.

China is a leader in the development, use, and export of social media surveillance tools. For example, the Chinese firm Semptian introduced its Aegis video surveillance system, which provides a “complete overview of the virtual world” with the ability to “store and analyze unlimited data”. The company claims that it monitors more than 200 million people in China, which is a quarter of the country’s Internet users.

Freedom House says that thanks to the development of tools that use artificial intelligence, governments now have more opportunities for cyberespionage than ever before.

Related Posts

card__image

New information security regulation for financial institutions – DORA

On January 17, 2025, the Digital Operational Resilience Act (Regulation (EU) 2022/2554) or DORA (Digital Operational Resilience Act) entered into force. The DORA focuses on information and communications technology (ICT) risk management by introducing strict rules for ICT risk management, incident reporting, operational resilience testing, and third-party ICT risk oversight.   Prior to the adoption […]

card__image

Secure by Design: From Concept to Cybersecurity Imperative in 2025

In a rapidly evolving digital landscape, the Secure by Design (SbD) philosophy is proving strategically essential and measurably effective. A report from Secure Code Warrior, analyzing data from 600 enterprise customers over nine years, found that large organizations that train developers in secure-by-design practices can reduce software vulnerabilities by over 50%. Companies with more than […]

card__image

Zero-Day Vulnerabilities: Unseen Threats and Their Impact

The ultimate guide to zero-day vulnerabilities and their effects in 2025 starts with a clear truth: zero-day vulnerabilities rank among the most severe dangers in the modern digital landscape.   A zero-day vulnerability  — flaws exploited before patches are available. This makes them incredibly challenging to detect and counter, leaving businesses exposed to substantial operational […]

Leave a Reply

Your email address will not be published. Required fields are marked *