Ethical Innovations: Embracing Ethics in Technology

Ethical Innovations: Embracing Ethics in Technology

Menu

FBI Buying Americans’ Location Data — Who's Watching?

The FBI has resumed purchasing commercially available location and other personal data on people in the United States, Director Kash Patel told the Senate Select Committee on Intelligence. Patel said the agency acquires commercially available information when it deems it lawful and useful for intelligence and investigative purposes and described those purchases as consistent with the Constitution and the Electronic Communications Privacy Act. He said the information has produced useful intelligence.

Senators pressed Patel about whether the purchases occur without judicial oversight. Senator Ron Wyden said buying location data without a warrant would circumvent Fourth Amendment protections and questioned the absence of judicial review; he contrasted Patel’s testimony with earlier testimony by former Director Christopher Wray, who in 2023 said the FBI had bought location data in the past but had stopped buying location data derived from internet advertising and had no plans to resume at that time. Patel’s remarks did not replicate that earlier assurance. Wyden and Representative Warren Davidson cited and support legislative proposals — including a bipartisan, bicameral Government Surveillance Reform Act and other bills — that would require a court-authorized warrant before federal agencies can purchase Americans’ information from data brokers or otherwise bar such purchases without a warrant or a Foreign Intelligence Surveillance Act order.

Senator Tom Cotton defended the FBI’s practice, noting that commercially available data can be obtained by anyone and likening its use to searching discarded items that no longer carry an expectation of privacy. Cotton expressed support for reauthorizing Section 702 of FISA without changes. Intelligence officials and other agency leaders acknowledged similar practices: the Defense Intelligence Agency said its purchases of commercially available information are conducted through legal channels and comply with applicable laws; a representative speaking for U.S. Cyber Command and the National Security Agency said a recent statutory expansion gave the agencies additional collection ability for foreign intelligence but declined to provide operational specifics publicly. Department of Homeland Security and other agencies have also been reported to use commercially obtained location data; an inspector general report cited in testimony or reporting has been said to have found some past purchases unlawful and to have led to a program shutdown.

Lawmakers noted a legal distinction between obtaining location data directly from telecommunications providers, which normally requires a judge-authorized warrant, and acquiring similar information from private data brokers, which federal agencies have obtained without the same judicial process. Privacy advocates and some senators raised concerns about large-scale automated analysis, including the use of artificial intelligence to analyze aggregated commercial datasets.

Senators also debated a 2024 expansion of FISA authorities that broadened the category of service providers who can be compelled to assist government surveillance. Critics, including Wyden, warned the language could apply to operators of equipment such as data centers, cable boxes, and Wi‑Fi routers and said the expansion did not appear to produce demonstrable intelligence in the public testimony; intelligence officials maintained that collection under the statute targets foreign intelligence and does not authorize targeting of Americans’ household devices.

The FBI declined to provide detailed public information about how often it acquires location data or which brokers it uses. Lawmakers pursuing reform have proposed requiring warrants for purchases from data brokers and otherwise restricting agency access to commercially sourced location, browsing, search, and communications-content information without judicial or FISA oversight. Consumer‑facing privacy guidance mentioned in testimony urged individuals to limit app location permissions, disable precise location and mobile advertising identifiers, and review apps with access to location data, while noting such measures may be difficult for many people.

Overall, the principal development in the hearing was the FBI director’s confirmation that the bureau buys commercially available location data on Americans and the ensuing congressional dispute over whether those acquisitions require warrants or statutory reform to protect privacy.

Original Sources: 1, 2, 3, 4, 5, 6, 7, 8 (fbi)

Real Value Analysis

Summary judgment: the article reports an important policy development — the FBI has resumed buying commercially available location data about Americans and other agencies confirm similar practices — but it gives almost no usable, practical help to an ordinary reader. Below I break that judgment down point by point and then add concrete, realistic steps and reasoning the article omitted.

Actionable information The article contains no clear, practical steps a reader can take. It reports who said what in congressional testimony and notes a policy dispute about warrants and FISA authorities, but it does not tell a person how to check whether their data is being sold, how to opt out of commercial location-data markets, how to challenge government access, or where to find legal help. References to “commercial sources” and legal channels are vague; there are no names of vendors, platforms, or consumer-facing mechanisms mentioned that a regular person could use immediately. In short, it informs but does not equip the reader with actions they can take right away.

Educational depth The article conveys surface facts: the FBI buys location data, some senators object, others defend the practice, and FISA changes are contested. It does not dig into the technical or legal mechanics that would help a reader understand cause and effect. It does not explain how commercial location data is collected, aggregated, sold, or matched to individuals; it does not outline the legal standards the FBI asserts allow such purchases; it does not explain differences between buying commercial data versus obtaining data via a warrant, or how Section 702 or the recent FISA expansion actually work. No data, statistics, or sourcing methodology are explained. Therefore the piece lacks depth needed to teach someone why this matters beyond the political disagreement.

Personal relevance The topic is potentially relevant to almost every person who carries a smartphone or uses location-enabled devices, because commercially available location data is commonly generated by apps and devices. However, the article fails to connect the policy dispute to concrete personal impacts. It does not explain scenarios where a person’s movements might be disclosed, whether typical everyday data brokers can identify individuals or only anonymous aggregates, or what risk levels are associated with different behaviors. For most readers, the report signals a potential privacy concern but gives no guidance on how seriously they should react or what specific behaviors increase risk.

Public service function As public-interest reporting, the article has value: it alerts readers to an ongoing policy controversy and surveillance practice. But it does not provide warnings, safety guidance, or emergency information that helps people act responsibly now. It neither describes consumer protection options nor points to advocacy, legal, or regulatory resources where citizens could seek redress or follow-up. The public-service function is therefore limited to awareness rather than practical assistance.

Practical advice quality There is no practical advice in the article to evaluate. Because it offers no tips or step-by-step measures, an ordinary reader cannot follow anything. Any implicit takeaway — “this is concerning” — is not turned into actionable guidance like how to reduce data collection, check device settings, or contact representatives.

Long-term impact The article documents a development with potential long-term consequences for privacy and law enforcement practices, and it reports debate over statutory changes. But it does not help readers plan long-term responses such as how to protect their privacy, how to support legislative change, or how to prepare for possible future legal shifts. Thus the long-term usefulness is mainly informational and political, not practical.

Emotional and psychological impact Because the article reports governmental purchases of Americans’ location data without providing mitigation steps, it can produce anxiety or helplessness for readers. It does not contextualize the level of risk or present constructive coping measures, so the emotional effect is likely to be concern without clear paths forward.

Clickbait or sensationalism The article does not appear to rely on sensational phrasing; it reports testimony and reactions from named senators and officials. However, it emphasizes controversy without offering balance in the form of operational detail or consumer-oriented context, which can leave readers feeling the piece is more political theater than useful reporting.

Missed opportunities to teach or guide The article missed several chances to educate readers: it did not explain how commercial location data is generated and sold, how to find whether an app shares location data with brokers, how to limit such sharing in device or app settings, what legal avenues exist for challenging data purchases, how to contact representatives, or what consumer-regulatory protections (if any) apply. It also missed an opportunity to present realistic mitigations and to direct readers to authoritative resources for privacy advice.

What the article failed to provide and practical steps readers can actually use Below are realistic, widely applicable steps and general reasoning readers can use now to reduce exposure to location-data collection, assess risk, and take responsible next steps. These are general principles and do not require outside data or specific legal claims.

Review and tighten device privacy settings. Open your phone’s privacy and location settings and restrict location access for apps to “While Using” or turn it off entirely for apps that don’t clearly need location. Disable background location access. Turn off location history features in operating-system settings where available.

Audit app permissions and installed apps. Periodically check which apps have permission to access location, microphone, camera, and background data. Remove apps you don’t use or that request excessive permissions. Prefer apps from reputable developers and consider whether a function truly needs continuous location.

Limit app data sharing in-app. Many apps have settings to limit data sharing or advertising personalization. Turn off ad personalization, limit sharing with third-party analytics, and opt out of targeted ads where offered inside app settings.

Reduce exposure from browsers and trackers. Use privacy-respecting browser settings: disable location sharing for websites, block third-party cookies, clear browsing data regularly, and consider using tracking-blocker extensions. Use private or incognito modes when appropriate, remembering they are not complete anonymity tools.

Be cautious with “free” apps and services. Understand that many free apps monetize by sharing data with brokers. Before installing, check the privacy policy and recent reviews for complaints about data practices. If a service is critical, consider paid alternatives that explicitly state they do not sell data.

Limit Bluetooth and Wi‑Fi exposures. Turn off Bluetooth and Wi‑Fi when not in use, and avoid joining public networks without using a trusted VPN. Public Wi‑Fi can be used to infer presence patterns.

Check and use in-app or vendor opt-outs where available. Some apps and device ecosystems provide options to opt out of data selling or targeted advertising. Exercise those options and document the choices.

Use layered defenses, not single fixes. No single setting guarantees privacy. Combine steps: restrict permissions, remove unused apps, manage browser privacy, and be cautious about account linkages that could make it easier to re-identify anonymous data.

Engage politically and legally in realistic ways. If you’re concerned about government purchases of commercial data, contact your elected representatives to express your views, follow reputable privacy advocacy groups for updates, and consider supporting legislation or campaigns that match your stance. Public pressure and legislative advocacy are the realistic routes to systemic change.

Document and preserve privacy-relevant records. If you suspect misuse of your data, keep records: screenshots of settings, app lists, receipts for subscriptions, and any communications with companies. These can be useful if filing complaints with regulators or seeking legal advice.

Seek professional help when appropriate. For serious concerns (for example, stalking, targeted harassment, or suspected unlawful surveillance), consult a lawyer who specializes in privacy or civil liberties and consider contacting law enforcement or victim-services organizations as appropriate.

How to evaluate similar reporting in the future When you read articles about surveillance or data sales, look for the following to judge usefulness: specific vendor names or marketplaces referenced, concrete descriptions of how data is collected and matched to people, legal standards cited (statutes, warrants, court decisions), practical remedies or opt-out mechanisms, links to consumer resources or regulators, and independent data or statistics explaining scope. If those are missing, treat the report as informative but not actionable.

Closing The article is valuable as a political and policy update but provides little actionable or educational help to an ordinary person. Use the practical steps above to reduce everyday exposure to location-data collection and pursue longer-term change through advocacy and legal channels if that aligns with your priorities.

Bias analysis

"FBI Director Kash Patel confirmed that the FBI is purchasing commercially available location data about people in the United States, reversing a prior public statement that such purchases had stopped." This sentence highlights a reversal but does not name when or who made the prior public statement, which hides context. By not quoting the earlier statement, it makes the reversal look more abrupt and possibly improper. This helps readers view the FBI as inconsistent without showing full timeline or reasons. It benefits critics of the FBI by focusing on contradiction.

"Testimony before the Senate Select Committee on Intelligence indicated that the FBI acquires location information from commercial sources when the agency considers it lawful and useful for intelligence and investigative purposes." The phrase "when the agency considers it lawful" shifts judgment to the FBI and avoids independent oversight; it softens the question of legal review. This wording frames legality as the FBI's internal view, which hides whether outside review or court orders were involved. It favors the agency's authority by presenting legality as their determination.

"Senator Ron Wyden questioned whether the purchases occur without judicial oversight and argued that acquiring location data without a warrant would circumvent Fourth Amendment protections." Using "questioned" and "argued" frames Wyden as raising concerns rather than stating facts, which can minimize urgency. The block presents his constitutional claim but does not include any counter-evidence or responses here, so it favors highlighting the constitutional risk without showing rebuttal. It helps readers sympathize with privacy concerns while omitting balancing details.

"Senator Ron Wyden also called for legislation that would bar federal agencies from buying location information, web browsing history, internet search history, and communications content without a warrant or a Foreign Intelligence Surveillance Act order." The list groups many kinds of data together, creating a broad image of invasive collection. The phrase "bar federal agencies" is absolute and presents a single remedy without noting trade-offs or alternative positions. This pushes a strong privacy-preserving stance and omits discussion of national security exceptions, which skews toward privacy advocacy.

"Senator Tom Cotton defended the FBI’s practice, noting that commercially available data can be obtained by anyone and arguing that its use by law enforcement is comparable to searching discarded items that no longer carry an expectation of privacy." Comparing data to "discarded items" is an analogy that reframes digital location data as nonprivate. This is a rhetorical move that simplifies complex legal privacy debates into a physical metaphor. It helps justify law enforcement but hides the differences between digital traces and physical trash, favoring the pro-surveillance view.

"Cotton expressed support for reauthorizing Section 702 of FISA without changes." This short sentence states a clear policy preference without explaining what Section 702 does. Omitting context about Section 702's scope or controversies makes the support appear straightforward and unproblematic. It benefits the pro-FISA position by not showing opposing details.

"Officials from other agencies acknowledged similar practices." This passive phrasing hides who specifically acknowledged what and when. It compresses different agencies into a single vague statement, making the practice seem widespread without precise attribution. It supports the narrative that the practice is common, which could normalize it.

"Defense Intelligence Agency leadership said DIA purchases of commercially available information are conducted through legal channels and comply with applicable laws." The phrase "conducted through legal channels and comply with applicable laws" is a broad assurance that relies on the agency's claim. It frames legality as settled by the agency's statement and does not specify oversight or evidence. This deflects scrutiny by presenting compliance as an uncontested fact.

"An acting leader representing US Cyber Command and the National Security Agency said a recent statutory expansion gave the agencies additional collection ability for foreign intelligence but declined to provide operational specifics in public." "Declined to provide operational specifics in public" uses refusal-to-disclose as a normalizing phrase. It presents secrecy as routine without examining reasons or consequences. This wording shields operational details and frames nondisclosure as acceptable, which favors agencies' secrecy.

"Senators debated a 2024 expansion of FISA authorities that broadened the category of service providers who can be compelled to assist government surveillance, with concerns raised that the language could apply to operators of equipment such as data centers, cable boxes, and Wi-Fi routers." The phrase "could apply" introduces speculation that stretches the statute's reach, which raises alarm without showing concrete examples. Listing domestic devices like "cable boxes, and Wi-Fi routers" evokes household intrusion. This choice of examples amplifies fear of overbreadth and helps the argument for repeal.

"Senator Wyden said the expansion did not appear to produce demonstrable intelligence in the public testimony and urged repeal of the change, while intelligence officials maintained that collection under the statute targets foreign intelligence and does not authorize targeting of Americans’ household devices." This sentence sets up a direct contrast but gives equal weight to Wyden's claim of no demonstrable intelligence and the officials' assurance. Without evidence, presenting both as balanced may create a false equivalence if one side had factual support and the other did not. The structure favors appearing neutral while leaving the factual dispute unresolved.

"The main development presented is the FBI’s resumed purchase of Americans’ location data from commercial sources and the resulting congressional dispute over whether such acquisitions require warrants or statutory reform to protect privacy." Calling this "the main development" frames the story as centered on privacy controversy, directing the reader to prioritize that angle. The wording "require warrants or statutory reform" narrows solutions to legal restraints and omits other possible responses, such as industry self-regulation or transparency measures. This focuses attention on legal reform and supports privacy-centered framing.

Emotion Resonance Analysis

The text conveys several clear emotions through its choice of words and the positions attributed to different figures. Concern appears in Senator Ron Wyden’s lines about purchases occurring “without judicial oversight” and that acquiring location data “would circumvent Fourth Amendment protections.” This concern is strong, framed as a constitutional risk, and serves to warn readers that civil liberties may be at stake. The word “circumvent” and the appeal to the Fourth Amendment heighten the sense of danger and urgency, encouraging readers to view the practice as a potential threat to privacy and legal norms. Defensiveness and justification show through the statements of Senator Tom Cotton and officials who defend the agencies’ practices. Cotton’s comparison of commercially available data to “discarded items that no longer carry an expectation of privacy” and his support for reauthorizing Section 702 express a confident, assertive tone. This emotion is moderate to strong; it aims to reassure readers that the practice is lawful and ordinary, thereby calming worry and building trust in the agencies’ judgments. A restrained, procedural confidence is also present in the agency officials’ language—phrases like “conducted through legal channels” and “comply with applicable laws” convey a calm, procedural assurance intended to legitimize the activity and reduce skepticism. Skepticism and doubt appear in the critique of the 2024 FISA expansion, where concerns that the language “could apply to operators of equipment such as data centers, cable boxes, and Wi‑Fi routers” and Senator Wyden’s statement that the expansion “did not appear to produce demonstrable intelligence” express unease about scope creep and effectiveness. This skepticism is moderate and serves to prompt readers to question whether the change was necessary or beneficial. Urgency and advocacy are implied in Wyden’s call for legislation to bar federal agencies from buying sensitive data without warrants or FISA orders; the call-to-action tone is purposeful and stronger than mere concern, aiming to motivate legal reform and public support for privacy protections. The overall emotional contour of the text shifts between warning (privacy threats), reassurance (lawfulness and normalcy), and critical questioning (doubts about statutory changes), producing a balanced but tense atmosphere that encourages readers to weigh privacy risks against claimed legal justifications. These emotions guide the reader by framing the issue as contested and consequential: concern and urgency push toward protective measures, while defensiveness and procedural language aim to calm and justify current practices. The writer uses several rhetorical tools to shape emotional response. Constitutional reference and the use of terms like “warrant,” “Fourth Amendment,” and “Foreign Intelligence Surveillance Act” lend moral and legal weight that heightens worry and seriousness beyond a technical debate. Comparisons, such as equating commercially available data to “discarded items,” simplify the issue and make the practice seem ordinary and nonthreatening, which supports reassurance. Repetition of legal and procedural phrases (for example, multiple mentions that purchases are “commercially available” and that activities are “lawful” or “comply with applicable laws”) reinforces legitimacy and aims to diminish alarm. Selective emphasis—highlighting that agencies “declined to provide operational specifics in public”—introduces a note of opacity that increases suspicion and fuels calls for oversight. Together, these choices amplify particular emotions: invoking rights stokes concern and urgency, analogies and legalized language foster trust and normalization, and pointed notes of secrecy encourage skepticism, steering the reader’s attention toward questions of privacy, legality, and the need for possible reform.

Cookie settings
X
This site uses cookies to offer you a better browsing experience.
You can accept them all, or choose the kinds of cookies you are happy to allow.
Privacy settings
Choose which cookies you wish to allow while you browse this website. Please note that some cookies cannot be turned off, because without them the website would not function.
Essential
To prevent spam this site uses Google Recaptcha in its contact forms.

This site may also use cookies for ecommerce and payment systems which are essential for the website to function properly.
Google Services
This site uses cookies from Google to access data such as the pages you visit and your IP address. Google services on this website may include:

- Google Maps
Data Driven
This site may use cookies to record visitor behavior, monitor ad conversions, and create audiences, including from:

- Google Analytics
- Google Ads conversion tracking
- Facebook (Meta Pixel)