CybersecurityApril 19, 2026

Bar‑Based Cybersecurity Workshops Address U.S. Privacy Gaps Amid ICE Surveillance Funding

Learn how bar-hosted privacy workshops help Americans protect data amid rising surveillance, ICE budget increases, and contracts with Palantir and Paragon.

Peter Olaleru/3 min/GB

Cybersecurity Editor

TweetLinkedIn
Bar‑Based Cybersecurity Workshops Address U.S. Privacy Gaps Amid ICE Surveillance Funding
Source: The GuardianOriginal source

**TL;DR:** Cybersecurity-themed parties in bars are helping Americans learn practical privacy steps amid growing surveillance worries. A December YouGov poll shows 61% fear data exposure but only 33% act, while Congress boosted ICE’s budget to $85 billion, funding contracts with Palantir and the spyware firm Paragon.

**Context** Imani Thompson, a 26‑year‑old cybersecurity organizer, hosts “Break Up With Google” events at venues like Wonderville Bar in Brooklyn. The gatherings mix music, drinks, and hands‑on workshops that teach attendees how to strip personal data from search engines, tighten phone privacy settings, and adopt open‑source tools. Similar parties have sprung up in Los Angeles, Seattle, Atlanta, and Pittsburgh, reflecting a grassroots push to reclaim agency over digital lives without abandoning everyday technology.

**Key Facts** - The YouGov survey from December found 61% of Americans rate limiting personal data access as very important, yet only 33% report taking active protective measures. - Congress approved an $85 billion budget increase for Immigration and Customs Enforcement, earmarking portions for contracts with Palantir and the Israeli spyware company Paragon. - Thompson reframes the conversation, saying digital security is about “protecting what you have” rather than the notion of “having nothing to hide.” - Surveillance concerns are amplified by real‑time bidding ecosystems that expose user profiles to thousands of advertisers daily, and by federal agencies purchasing data from brokers, as admitted by FBI Director Kash Patel.

**What It Means** The disparity between concern and action highlights a gap in accessible privacy education; bar‑based workshops lower the psychological barrier by placing learning in a familiar, social setting. Increased ICE spending on Palantir and Paragon signals expanded government capacity for data‑driven surveillance, which may intensify scrutiny of activist networks. Meanwhile, the real‑time bidding model continues to leak granular personal attributes—such as health status or financial standing—to ad tech firms, reinforcing the need for both individual vigilance and regulatory oversight. Participants leave events with concrete steps: auditing app permissions, enabling device‑level encryption, using signal‑based messaging, and opting out of data‑broker lists via services like DeleteMe or OptOutPrescreen.

**Mitigations** Individuals should: review and restrict location sharing in smartphone settings; install privacy‑focused browsers (e.g., Firefox with Tracking Protection); employ end‑to‑end encrypted apps for messaging and calls; regularly purge old accounts and use password managers to generate unique credentials; subscribe to broker‑opt‑out lists and monitor credit reports for unauthorized data sales. Organizations can deploy network‑level controls that block known RTB endpoints (MITRE ATT&CK T1071.001) and enforce least‑privilege access to internal data stores.

Legislative proposals targeting data‑broker transparency and potential limits on government contracts with surveillance vendors will shape the next phase of public privacy defenses.

TweetLinkedIn

Reader notes

Loading comments...