"But also from facial recognition facebook, cell phones, web cameras, firewall holes, and other technologies." . . . . .