Ireland’s Simon Harris to Push EU-Wide Ban on Social Media Anonymity

Ireland’s next term leading the European Union will be used to promote a new agenda: an effort to end online anonymity and make verified identity the standard across social media platforms.

Tánaiste Simon Harris said the government plans to use Ireland’s presidency to push for EU-wide rules that would require users to confirm their identities before posting or interacting online.

Speaking to Extra.ie, Harris described the plan as part of a broader attempt to defend what he called “democracy” from anonymous abuse and digital manipulation.

He said the initiative will coincide with another policy being developed by Media Minister Patrick O’Donovan, aimed at preventing children from accessing social media.

O’Donovan’s proposal, modeled on Australian restrictions, is expected to be introduced while Ireland holds the EU presidency next year.

Both ideas would involve rewriting parts of the EU’s Digital Services Act, which already governs how online platforms operate within the bloc.

Expanding it to require verified identities would mark a major shift toward government involvement in online identity systems, a move that many privacy advocates believe could expose citizens to new forms of monitoring and limit open speech.

Harris said his motivation comes from concerns about the health of public life, not personal grievance.

Harris said he believes Ireland will find allies across Europe for the initiative.

He pointed to recent statements from French President Emmanuel Macron and UK Prime Minister Keir Starmer, who he said have shown interest in following Australia’s lead. “If you look at the comments of Emmanuel Macron…of Keir Starmer…recently, in terms of being open to considering what Australia have done…You know this is a global conversation Ireland will and should be a part of,” he said.

Technology companies based in Ireland, many of which already face scrutiny under existing EU rules, are likely to resist further regulation.

The United States government has also expressed growing hostility toward European efforts to regulate speech on its major tech firms, recently imposing visa bans on several EU officials connected to such laws.

Keep reading

As Mexico’s Biometric ID Draws Closer, Implementation Remains Uncertain

Looking toward 2026, Mexicans and foreigners residing in Mexico are preparing to navigate an uncertain future regarding new laws that require biometric identification for certain services.

In July 2025, several new laws took effect in Mexico that greatly increase opportunities for government surveillance and coerce the population into registering for a biometric program required to access many services, including banking, health programs, social welfare, education, cellphone service, and internet access.

While the laws are set to be phased into practice beginning in February and continuing throughout the spring of 2026, it remains unclear how the policies will be enforced in a country known for its weak federal government and rampant corruption. It is also uncertain how the infrastructure for such programs will be implemented in Mexico’s vast rural areas, where as much as one fifth of the population resides.

The biometric requirement relates to Mexico’s personal identity code for citizens and residents, known as the Clave Única de Registro de Población (Unique Population Registry Code), or CURP. The CURP typically consists of 18 characters derived from a person’s family names, date and place of birth, and gender. It functions similarly to the US Social Security number.

The new laws will require the CURP to include the holder’s photograph and a QR code embedding biometric data, including scans of both fingerprints and irises. The legislation mandates the creation of a “Unified Identity Platform,” managed by the Ministry of the Interior and the Digital Transformation Agency. This platform will integrate the biometric CURP with the healthcare system as well.

The biometric CURP would also be required for purchasing internet and cellular services. This would force businesses selling these services to check a customer’s CURP before purchase. Individuals who do not comply with the CURP requirement could see their internet or phone service interrupted.

Mexico’s civilian intelligence service, the Centro Nacional de Inteligencia (CNI), and the National Guard will have access to the biometric data.

The Mexican government says these new laws are aimed at fighting organized crime and drug trafficking, as well as helping with the search for missing people. The government has also argued that controversial changes to the nation’s telecommunications laws are designed to bridge the so-called “digital divide,” referring to the limited access to internet and cellular service in rural areas compared to urban environments.

Keep reading

Russia expands biometric ID system (again)

The commercial enterprise that controls Russians’ biometric data has introduced new ways to use your face as a form of ID, resulting in unprecedented levels of safety and convenience in the Russian Federation.

Russians young and old are already reaping the benefits of their country’s “digital transformation”—including very, very young Russians.

The Russian government is working on amending federal legislation to allow schools across the country to monitor and identify students using biometrics, Kommersant reported on December 3. Plans for a standardized “biometric turnstile system” for Russian schools are already being tested in Tatarstan.

Authorities have stressed that schools will be able to choose whether or not to switch to biometric identification, adding that parents must first consent before their childrens’ faces are scanned and entered into Russia’s Unified Biometric System (UBS).

Keep reading

Indian Supreme Court Judge Says Those With Nothing to Hide Shouldn’t Fear Surveillance

A courtroom drama over state surveillance in India took a striking turn when a Supreme Court judge suggested that people who live transparently should not be troubled by government monitoring.

The case involved allegations that Telangana’s state intelligence apparatus was used for political snooping, but the discussion soon widened into a philosophical clash over privacy and power.

Former Special Intelligence Bureau (SIB) chief T. Prabhakar Rao, accused of directing unlawful phone tapping during the previous BRS government, was before the bench as the State sought more time to keep him in police custody.

During the hearing, Justice B.V. Nagarathna questioned why citizens would object to being monitored at all, asking, “Now we live in an open world. Nobody is in a closed world. Nobody should be really bothered about surveillance. Why should anyone be bothered about surveillance unless they have something to hide?”

Her comment prompted Solicitor General Tushar Mehta to caution against normalizing government spying. He asked whether this meant “every government will have a free hand in putting people under surveillance,” warning that secret monitoring without authorization was unlawful and incompatible with basic freedoms.

Mehta reminded the bench that the Constitution, as affirmed in the landmark Puttaswamy ruling, enshrines privacy as part of human dignity and liberty.

“The Supreme Court knows the difference between an ‘open’ world and being under illegal surveillance. My personal communications with my wife… I have a right not to be under surveillance,” he said.

Keep reading

China bans sharing porn on messaging apps

China will expand a ban on sharing obscene materials to include content sent via phone and online messaging apps starting next year.

According to the revised law, anyone “disseminating obscene information using information networks, telephones, or other communication tools” will face up to 15 days in jail and a fine of up to 5,000 yuan ($711). Penalties will be higher if the content involves children.

The wording of the law has led to concerns from media and social networks as to whether it could be applied to private sexually explicit messages between adults, such as sexting.

However, according to multiple legal experts cited by Chinese state media, the legal changes will not affect one-on-one private communications. They argue that the revisions reflect technological development, increasing the maximum fines, while leaving detention periods unchanged.

“China has mature standards and procedures for identifying obscene materials. It is critical to clarify that ‘obscene’ does not equal ‘indecent’,” China Daily cited Ji Ying, an associate professor of law at the University of International Business and Economics in Beijing, as saying.

Keep reading

UK Police Pilot AI System to Track “Suspicious” Driver Journeys

Police forces across Britain are experimenting with artificial intelligence that can automatically monitor and categorize drivers’ movements using the country’s extensive number plate recognition network.

Internal records obtained by Liberty Investigates and The Telegraph reveal that three of England and Wales’s nine regional organized crime units are piloting a Faculty AI-built program designed to learn from vehicle movement data and detect journeys that algorithms label “suspicious.”

For years, the automatic number plate recognition (ANPR) system has logged more than 100 million vehicle sightings each day, mostly for confirming whether a specific registration has appeared in a certain area.

The new initiative changes that logic entirely. Instead of checking isolated plates, it teaches software to trace entire routes, looking for patterns of behavior that resemble the travel of criminal networks known for “county lines” drug trafficking.

The project, called Operation Ignition, represents a change in scale and ambition.

Unlike traditional alerts that depend on officers manually flagging “vehicles of interest,” the machine learning model learns from past data to generate its own list of potential targets.

Official papers admit that the process could involve “millions of [vehicle registrations],” and that the information gathered may guide future decisions about the ethical and operational use of such technologies.

What began as a Home Office-funded trial in the North West covering Merseyside, Greater Manchester, Cheshire, Cumbria, Lancashire, and North Wales has now expanded into three regional crime units.

Keep reading

The Surveillance State Is Making a Naughty List—and You’re On It

The Surveillance State is making a naughty list, and we’re all on it.

Unlike Santa’s naughty list, however, the consequences of landing on the government’s “naughty list” are far more severe than a stocking full of coal. They can include heightened surveillance, loss of privacy, travel restrictions, financial scrutiny, police encounters, or being flagged as a potential threat—often without notice, explanation, or recourse.

What was once dismissed as a joke—“Santa is watching”—has morphed into a chilling reality. Instead of elves, the watchers are data brokers, intelligence agencies, predictive algorithms, and fusion centers. Instead of a naughty-or-nice list, Americans are sorted into databases, risk profiles, and threat assessments—lists that never disappear.

The shift is subtle but profound.

Innocence is no longer presumed.

Everyone is watched. Everyone is scored. Everyone is a potential suspect.

This is the surveillance state in action.

Today’s surveillance state doesn’t require suspicion, a warrant, or probable cause. It is omnipresent, omniscient, and inescapable.

Your smartphone tracks your location. Your car records your movements. License plate readers log when and where you drive. Retail purchases create detailed consumer profiles. Smart speakers listen to everything you say. Home security cameras observe not just your property, but your neighbors, delivery drivers, and anyone who passes by.

In a dramatic expansion of surveillance reach, the Transportation Security Administration now shares airline passenger lists with Immigration and Customs Enforcement, enabling ICE to identify and arrest travelers at airports based on immigration status.

Keep reading

Governments Are Pushing Digital IDs. Are You Ready To Be Tracked?

Politicians push government IDs.

In a TSA announcement, Secretary of Homeland Security Kristi Noem sternly warns, “You will need a REAL ID to travel by air or visit federal buildings.”

European politicians go much further, reports Stossel TV producer Kristin Tokarev.

They’re pushing government-mandated digital IDs that tie your identity to nearly everything you do.

Spain’s prime minister promises “an end to anonymity” on social media!

Britain’s prime minister warns, “You will not be able to work in the United Kingdom if you do not have digital ID.”

Queen Maxima of the Netherlands enthusiastically told the World Economic Forum that digital IDs are good for knowing “who actually got a vaccination or not.”

Many American tech leaders also like digital IDs.

The second richest man in the world, Oracle founder Larry Ellison, says, “Citizens will be on their best behavior because we’re constantly recording and reporting everything.”

That’s a good thing?

“That is a recipe for disaster and totalitarianism,” says privacy specialist Naomi Brockwell. “Privacy is not about hiding. It’s about an individual’s right to decide for themselves who gets access to their data. A digital ID will strip individuals of that choice.”

“I already have a government-issued ID,” says Tokarev. “Why is a digital one worse?”

“It connects everything,” says Brockwell. “Your financial decisions, social media posts, your likes, things that you’re watching, places you’re going. You won’t be able to voice things anonymously online anymore. Everything you say will be tied back to who you are.”

Digital ID backers say the new ID will make life easier.

“You can access your own money, make payments so much more easily,” says the U.K.’s prime minister.

Yes, says Brockwell, “until those services start saying, ‘No, you can’t use our system.'”

Even without a digital ID, Canada froze the bank accounts of truckers who protested COVID-19 vaccine mandates.

With a digital ID, politicians could do that much more easily.

Keep reading

UK Lawmakers Propose Mandatory On-Device Surveillance and VPN Age Verification

Lawmakers in the United Kingdom are proposing amendments to the Children’s Wellbeing and Schools Bill that would require nearly all smartphones and tablets to include built-in, unremovable surveillance software.

The proposal appears under a section titled “Action to promote the well-being of children by combating child sexual abuse material (CSAM).”

We obtained a copy of the proposed amendments for you here.

The amendment text specifies that any “relevant device supplied for use in the UK must have installed tamper-proof system software which is highly effective at preventing the recording, transmitting (by any means, including livestreaming) and viewing of CSAM using that device.”

It further defines “relevant devices” as “smartphones or tablet computers which are either internet-connectable products or network-connectable products for the purposes of section 5 of the Product Security and Telecommunications Infrastructure Act 2022.”

Under this clause, manufacturers, importers, and distributors would be legally required to ensure that every internet-connected phone or tablet they sell in the UK meets this “CSAM requirement.”

Enforcement would occur “as if the CSAM requirement was a security requirement for the purposes of Part 1 of the Product Security and Telecommunications Infrastructure Act 2022.”

In practical terms, the only way for such software to “prevent the recording, transmitting (by any means, including livestreaming) and viewing of CSAM” would be for devices to continuously scan and analyze all photos, videos, and livestreams handled by the device.

That process would have to take place directly on users’ phones and tablets, examining both personal and encrypted material to determine whether any of it might be considered illegal content. Although the measure is presented as a child-safety protection, its operation would create a system of constant client-side scanning.

This means the software would inspect private communications, media, and files on personal devices without the user’s consent.

Such a mechanism would undermine end-to-end encryption and normalize pre-emptive surveillance built directly into consumer hardware.

The latest figures from German law enforcement offer a clear warning about the risks of expanding this type of surveillance: in 2024, nearly half of all CSAM scanning tips received by Germany were errors.

Keep reading

Privacy For The Powerful, Surveillance For The Rest: EU’s Proposed Tech Regulation Goes Too Far

Last month, we lamented California’s Frontier AI Act of 2025. The Act favors compliance over risk management, while shielding bureaucrats and lawmakers from responsibility. Mostly, it imposes top-down regulatory norms, instead of letting civil society and industry experts experiment and develop ethical standards from the bottom up.

Perhaps we could dismiss the Act as just another example of California’s interventionist penchant. But some American politicians and regulators are already calling for the Act to be a “template for harmonizing federal and state oversight.” The other source for that template would be the European Union (EU), so it’s worth keeping an eye on the regulations spewed out of Brussels.

The EU is already way ahead of California in imposing troubling, top-down regulation. Indeed, the EU Artificial Intelligence Act of 2024 follows the EU’s overall precautionary principle. As the EU Parliament’s internal think tank explains, “the precautionary principle enables decision-makers to adopt precautionary measures when scientific evidence about an environmental or human health hazard is uncertain and the stakes are high.” The precautionary principle gives immense power to the EU when it comes to regulating in the face of uncertainty — rather than allowing for experimentation with the guardrails of fines and tort law (as in the US). It stifles ethical learning and innovation. Because of the precautionary principle and associated regulation, the EU economy suffers from greater market concentration, higher regulatory compliance costs, and diminished innovation — compared to an environment that allows for experimentation and sensible risk management. It is small wonder that only four of the world’s top 50 tech companies are European.

From Stifled Innovation to Stifled Privacy

Along with the precautionary principle, the second driving force behind EU regulation is the advancement of rights — but cherry-picking from the EU Charter of Fundamental Rights of rights that often conflict with others. For example, the EU’s General Data Protection Regulation (GDPR) of 2016 was imposed with the idea of protecting a fundamental right to personal data protection (this is technically separate from the right to privacy, and gives the EU much more power to intervene — but that is the stuff of academic journals). The GDPR ended up curtailing the right to economic freedom.

This time, fundamental rights are being deployed to justify the EU’s fight against child sexual abuse. We all love fundamental rights, and we all hate child abuse. But, over the years, fundamental rights have been deployed as a blunt and powerful weapon to expand the EU’s regulatory powers. The proposed Child Sex Abuse regulation (CSA) is no exception. What is exceptional, is the extent of the intrusion: the EU is proposing to monitor communications among European citizens, lumping them all together as potential threats rather than as protected speech that enjoys a prima facie right to privacy.

As of 26 November 2025, the EU bureaucratic machine has been negotiating the details of the CSA. In the latest draft, mandatory scanning of private communications has thankfully been removed, at least formally. But there is a catch. Providers of hosting and interpersonal communication services must identify, analyze, and assess how their services might be used for online child sexual abuse, and then take “all reasonable mitigation measures.” Faced with such an open-ended mandate and the threat of liability, many providers may conclude that the safest — and most legally prudent — way to show they have complied with the EU directive is to deploy large-scale scanning of private communications.

The draft CSA insists that mitigation measures should, where possible, be limited to specific parts of the service or specific groups of users. But the incentive structure points in one direction. Widespread monitoring may end up as the only viable option for regulatory compliance. What is presented as voluntary today risks becoming a de facto obligation tomorrow.

In the words of Peter Hummelgaard, the Danish Minister of Justice: “Every year, millions of files are shared that depict the sexual abuse of children. And behind every single image and video, there is a child who has been subjected to the most horrific and terrible abuse. This is completely unacceptable.” No one disputes the gravity or turpitude of the problem. And yet, under this narrative, the telecommunications industry and European citizens are expected to absorb dangerous risk-mitigation measures that are likely to involve lost privacy for citizens and widespread monitoring powers for the state.

The cost, we are told, is nothing compared to the benefit.

After all, who wouldn’t want to fight child sexual abuse? It’s high time to take a deep breath. Child abusers should be punished severely. This does not dispense a free society from respecting other core values.

But, wait. There’s more…

Keep reading