I warned Carol. I warned everyone. For twenty-three years, I’ve been warning people.
At 11:58 PM on December 31st, while you were pouring champagne and hugging your loved ones, your smart TV surveillance system activated. At midnight, as you shouted your resolutions into the air—lose weight, save money, call your mother more—every syllable was captured, timestamped, and transmitted. I know this because I spent twenty-two years in IT. I know how these systems work. I knew how they worked in 2012, which is when they perfected the architecture. Everything since then has just been refinement.
Carol says I need to “let it go.” She made that face again—the one she’s been making since 1999, when I spent $14,000 preparing for Y2K. She still brings up the Y2K supplies. We still have some of them. The freeze-dried beef stroganoff is technically still good until 2027.
What Your Smart TV Heard At Midnight
When the ball dropped, your television wasn’t just displaying the broadcast. Its microphone was active. Its camera—if you haven’t covered it with tape like I have—was recording. The average American smart TV captures approximately 4.7 hours of ambient audio per day. I calculated this myself using information I found online. The methodology isn’t important. What’s important is that I’m right.
My brother-in-law asked me to “prove it” at Thanksgiving. I showed him my research binder—forty-seven pages of printed articles, highlighted in three colors. He said he “had to go check on the kids.” The kids are twenty-three and twenty-six. They weren’t even there.
My Countermeasures Were Effective
While others celebrated carelessly, my household was secure. I unplugged the smart TV at 6 PM and placed it in the garage, wrapped in a Faraday blanket I constructed from materials that cost $340. Carol wanted to watch the broadcast. I explained that we could listen on my shortwave radio, which cannot be compromised because it only receives signals. She went to bed at 9:30.
I stayed up monitoring the situation on my laptop—a 2009 ThinkPad running a Linux distribution that I’ve personally hardened. It takes eleven minutes to boot. That’s not a flaw. That’s security.
The Real-Time Data Harvest
Here’s what they collected from homes that weren’t protected: your voice, your conversations, the names of everyone present, the ambient sounds of your celebration. My former colleague Derek—who still works in IT and therefore cannot speak freely—sent me a text that said “Earl, please stop texting me.” That’s exactly what someone would say if they knew too much and were afraid to confirm my suspicions.
I texted back: “I understand. Stay safe.” He hasn’t responded in fourteen months. That tells me everything.
What You Should Do Now
It may be too late for New Year’s, but it’s not too late to protect yourself going forward. Unplug all smart devices. Cover all cameras. Pay in cash. Use a flip phone—mine is a Samsung from 2008 that has never failed me, except for the part where Carol says she “can’t reach me” because I keep it in a signal-blocking pouch.
My grandson asked why I don’t have “normal” technology. He’s eight. He’s already been compromised. I tried to explain, but his mother—my daughter—said I was “scaring him.” I wasn’t scaring him. I was preparing him. There’s a difference.
The difference is that I’ll be ready when the system collapses. I’ve been ready since 1999. Any day now.