What Governments Do
Unique data, generated from characteristics of humans, may be used to track and profile people across their lives.
Governments compel companies to store data on their customers and the data they generate through using communications services.
As digital communications grow, governments continue to seek new ways of getting access to content and metadata.
The global counter-terrorism agenda is driven by a group of powerful governments and industry with a vested political and economic interest in pushing for security solutions that increasingly rely on surveillance technologies at the expenses of human rights.
The long arm of governments now reach across their borders, and the safeguards rarely extend to data in other jurisdictions.
Protecting and defending individuals, devices and networks should form the basis of any cyber security strategy.
DNA holds the key to a person’s identity and as such must be protected with the utmost care.
Secret agreements allow secretive intelligence agencies in Australia, Canada, New Zealand, the United Kingdom, and the USA to spy on the world.
Covert manipulation of and interferences with peoples' devices and software creates significant surveillance capabilities.
As development and humanitarian organisations deploy new technologies and make use of data-intensive systems in their programmes, they must consider what their mandate of “Doing no harm” entails in the digital age.
Being able to assert who we are and what claims we have can be empowering. But identity checks are increasingly conducted and required, both with and without our knowledge.
Indiscriminate surveillance of non-suspects is a contravention of rights and a failure of the rule of law.
There are few places in the world where an individual is as vulnerable as at the border of a foreign country.
Advances in technology significantly advance the capabilities of police, with few safeguards and no transparency.
Wealthy governments increasingly push and enable other governments to deploy advanced surveillance capabilities without safeguards.
Surveillance cameras and facial recognition are used to monitor public and private spaces and to identify people, as is becoming both more pervasive and more invasive.