In military planning, understanding the human terrain used to mean studying tribes, loyalties, customs, and fault lines. Now, it means studying your digital footprint—where you eat, how fast you drive, what time you wake up, who you text, and what you binge-watch after a long day at the SCIF. And the twist? You volunteered all of it.

Welcome to surveillance capitalism—the only intelligence collection program you willingly subscribe to, pay for, and carry in your pocket.

What used to require a hostile intelligence officer, a compromising agent, and a brush pass in Vienna can now be done by buying data from an ad exchange. Want to track a battalion’s movements? Pull location pings from delivery apps. Want to identify cleared personnel by face? Scrape public-facing photos, run them through facial recognition, and cross-reference with breach data. This isn’t a theoretical threat. It’s a thriving industry.

The adversary didn’t need to build it. We did. They’re just cashing in.

Surveillance Capitalism: A Commercial SIGINT Platform

At its core, surveillance capitalism is the economic system built on extracting, analyzing, and monetizing behavioral data. Your clicks, swipes, routes, and rhythms are turned into predictions—and those predictions are sold. Mostly to marketers. Sometimes to anyone with a credit card and fewer scruples.

You are not the customer. You are the product.

And if you’re in the national security space, you’re a high-value product.

The problem is that while we’ve trained people to protect classified data, we haven’t trained them to protect behavioral data. But guess what? The adversary doesn’t need a copy of your brief—they need to know how you behave, what influences you, and where your vulnerabilities lie. They want your rhythms, not your reports.

In CI terms, this is a targeting dossier at scale, with no need to task a case officer. The metadata is the message.

The New MICE: Monetization, Influence, Correlation, Exploitation

The old MICE acronym—Money, Ideology, Coercion, Ego—still applies. But in a surveillance capitalist landscape, it’s time to modernize:

  • Monetization: Your data is for sale—and adversaries can buy it wholesale.
  • Influence: Targeted messaging based on personality profiles isn’t just persuasion—it’s manipulation at machine speed.
  • Correlation: You may keep work and home separate. Your apps don’t. Triangulation of behavior makes compartmentation obsolete.
  • Exploitation: Location data, keystrokes, purchase history—all mined to identify weaknesses and habits. Blackmail doesn’t start with a secret affair anymore. It starts with a fitness tracker.

Counterintelligence in the Age of Consumer Surveillance

Counterintelligence must evolve. We can’t just guard secure facilities and monitor foreign nationals. We must treat surveillance capitalism as a hostile collection platform and adapt accordingly:

  • CI Training for the Digital Terrain: Most national security professionals don’t need to be hackers—but they do need to understand how they’re exposed. Training must shift from “don’t talk on social media” to “understand how your car shares your location while it’s parked.”
  • Red Teaming with Commercial Data: We conduct insider threat audits and penetration tests—but do we ever simulate adversarial targeting using commercially available data? We should.
  • Behavioral Signature Management: Just as we train physical signature reduction in deployed environments, we need behavioral signature reduction online. Spoofed accounts, randomized behavior, and metadata obfuscation should be standard kit.
  • Partnerships with Industry: Adtech built the problem, but that doesn’t mean it can’t help solve it. Intelligence and defense sectors should be demanding privacy-preserving infrastructure in everything from fitness trackers to procurement platforms.

Surveillance Capitalism Is a CI Blind Spot

We’ve built a digital ecosystem that assumes the user is benign and the adversary is foreign. That assumption is outdated. In truth, the adversary now operates within the system—using the commercial layer as a collection platform.

And if that sounds familiar, it should. Because this is what CI is designed to detect, deny, and disrupt.

Only now, the battlefield is everywhere. Your phone. Your home. Your kid’s school. The mall near your base.

The enemy isn’t at the gates. The enemy is buying your data from a pop-up ad.

Related News

Shane McNeil is a doctoral student at the Institute of World Politics, specializing in statesmanship and national security. As the Counterintelligence Policy Advisor on the Joint Staff, Mr. McNeil brings a wealth of expertise to the forefront of national defense strategies. In addition to his advisory role, Mr. McNeil is a prolific freelance and academic writer, contributing insightful articles on data privacy, national security, and creative counterintelligence. He also shares his knowledge as a guest lecturer at the University of Maryland, focusing on data privacy and secure communications. Mr. McNeil is also the founding director of the Sentinel Research Society (SRS) - a university think tank dedicated to developing creative, unconventional, and non-governmental solutions to counterintelligence challenges. At SRS, Mr. McNeil hosts the Common Ground podcast and serves as the Editor-in-Chief of the Sentinel Journal. All articles written by Mr. McNeil are done in his personal capacity. The opinions expressed in this article are the author’s own and do not reflect the view of the Department of Defense, the Defense Intelligence Agency, or the United States government.