Advanced Search
Content Type: Long Read
Thursday, November 18, 2021
Zimbabwe has a history of state led surveillance that is carried out more for political gain than for the investigation of legitimate criminal activities. During former President Mugabe’s 37 year rule the government used laws and state security structures to carry out targeted surveillance of persons of political interest and more generalised mass surveillance of the population.
Specific laws such as the Interception of Communications Act as well as mandatory SIM-card registration regulations…
Content Type: Case Study
Thursday, September 17, 2020
Como is one of the most advanced cities in Italy in the use of facial recognition technology (FRT). An investigation for the Italian Wired magazine published in June 2020 exposed how the system had been bought, installed and tested for months with little transparency and despite the lack of a clear legal framework.
The investigation was entirely based on tools available to everyone, such as Freedom of Information requests (FOI requests. Similar to PI’s campaign 'Unmasking policing, inc', it…
Content Type: Case Study
Thursday, June 25, 2020
The Ugandan government has a running contract with the Chinese tech giant, Huawei, to supply and install CCTV cameras along major highways within the capital, Kampala, and other cities.
While details of the contract remain concealed from the public, the Uganda Police Force (UPF) released a statement, simply confirming its existing business partnership for telecommunication and surveillance hardware, and software between the security force and Huawei. However, it is not clear whether the…
Content Type: Case Study
Thursday, June 25, 2020
Well into the 21st century, Serbia still does not have a strong privacy culture, which has been left in the shadows of past regimes and widespread surveillance. Even today, direct police and security agencies’ access to communications metadata stored by mobile and internet operators makes mass surveillance possible.
However, a new threat to human rights and freedoms in Serbia has emerged. In early 2019, the Minister of Interior and the Police Director announced that Belgrade will receive “a…
Content Type: News & Analysis
Tuesday, January 7, 2020
Cloud extraction allows law enforcement agencies to take huge amounts of your data from the Cloud via a legal back door. If law enforcement seize your phone or take it from a victim of crime, they can extract tokens or passwords from the device which lets them get access to data from apps such as Uber, Instagram, Slack, Gmail, Alexa and WhatsApp.
In so doing, law enforcement agencies can avoid official channels through cloud companies such as Google, Apple and Microsoft. There is no check on…
Content Type: Long Read
Tuesday, July 23, 2019
image from portal gda (cc)
Many people are still confused by what is 5G and what it means for them. With cities like London, New York or San Francisco now plastered with ads, talks about national security, and the deployment of 5G protocols being treated like an arms race, what happens to our privacy and security?
5G is the next generation of mobile networks, which is meant to be an evolution of the current 4G protocols that mobile providers have deployed over the last decade, and there are…
Content Type: News & Analysis
Wednesday, March 7, 2018
Written by the Foundation for Media Alternatives
7:01: Naomi wakes up and gets ready for the day.
7:58: Naomi books an Uber ride to Bonifacio Global City (BGC), where she has a meeting. She pays with her credit card. While Naomi is waiting for her Uber, she googles restaurant options for her dinner meeting in Ortigas.
9:00: While her Uber ride is stuck in traffic on EDSA (a limited access highway circling Manilla), Naomi’s phone automatically connects to the free WiFi offered by the…
Content Type: Long Read
Thursday, October 15, 2015
We hate to say we told you so.
Privacy International has for years warned that powerful surveillance technologies are used to facilitate serious human rights abuses with insufficient technological and legal safeguards against abuse.
We now have the most solid evidence to date that we were right. Our latest investigation uncovers disturbing evidence that substantiates our long held concerns.
Today Privacy International publishes an investigation (PDF) into communications surveillance in…
Content Type: News & Analysis
Thursday, January 8, 2015
The right to privacy is on the frontline of a struggle that has seen a number of other constitutionally protected rights threatened during the last few bloody months of Kenya's ongoing security crisis.
After at least 64 people were killed in two attacks by Al Shabaab militants in late 2014, members of the ruling Jubilee Coalition swiftly moved to introduce an omnibus bill, the Security Laws (Amendment) Bill 2014. The bill, which was hastily enacted into law despite street protests and…
Content Type: News & Analysis
Friday, October 25, 2013
When a product line becomes engulfed in controversy, the PR team's first move is to distance the corporation from the damage. The surveillance market is not immune to this approach, so when companies products are found to be in use by repressive regimes, the decision many boards make is simply to sell off that technology. This increasingly repetitive narrative is failing to solve any of the problems inherent with the sale of surveillance technology and in fact, is creating more.
The recent…
Content Type: News & Analysis
Monday, March 4, 2013
In order to lawfully conduct communications surveillance (“lawful interception”) in the U.S. and Western Europe, a law enforcement agency must seek authorisation from a court and produce an order to a network operator or internet service provider, which is then obliged to intercept and then to deliver the requested information. In contrast, Russian Federal Security Service operatives (FSB) can conduct surveillance directly by utilising lawful interception equipment called SORM.
SORM
SORM is…
Content Type: News & Analysis
Thursday, November 1, 2012
On the surface, it’s all about protecting Russian kids from internet pedophiles. In reality, the Kremlin’s new “Single Register” of banned websites, which goes into effect today, will wind up blocking all kinds of online political speech. And, thanks to the spread of new internet-monitoring technologies, the Register could well become a tool for spying on millions of Russians.
Signed into law by Vladimir Putin on July 28, the internet-filtering measure contains a single, innocuous-sounding…