Advanced Search
Content Type: Examples
In 2014, the UK suicide prevention group The Samaritans launched Radar, a Twitter-based service intended to leverage the social graph to identify people showing signs of suicidal intent on social media and alert their friends to reach out to offer them help. The app was quickly taken offline after widespread criticism and an online petition asking them to delete the app. Among the complaints: the high error rate, intrusiveness, and the Samaritans' response, which was to suggest that people…
Content Type: Examples
Mothers of black, male teenagers in Chicago, fear their children will be added to the Chicago Police Department's gang database. As of the end of 2017, the database contains the names of 130,000 people, 90% of them black or Latino, who are suspected of being gang members. Most have never been arrested for a violent offence or for a drug or weapons charge. The police are not required to notify those who are added to the database, and the reasons for inclusion may be as trivial as style of dress…
Content Type: Examples
Websites have long used third-party analytics scripts to collect information about how visitors use their sites. In November 2017, researchers at Princeton found that an increasing number of sites use "session replay" scripts that collect every action the user performs while on the site, including mouse movements, keystrokes, scrolling behaviour, and the complete contents of pages loaded. Users logically expect the sites to receive typed data only after they're pressed the "submit" button, but…
Content Type: Examples
In 2017, after protests from children's health and privacy advocates, Mattel cancelled its planned child-focused "Aristotle" smart hub. Aristotle was designed to adapt to and learn about the child as they grew while controlling devices from night lights to homework aids. However, Aristotle was only one of many tech devices being released onto the market to take over functions that have traditionally been part of the intimate relationship between children and their parents: a smart cradle that…
Content Type: Examples
In the wake of Tesla’s first recorded autopilot crash, automakers are reassessing the risk involved with rushing semi-autonomous driving technology into the hands of distractible drivers. But another aspect of autopilot—its ability to hoover up huge amounts of mapping and “fleet learning” data—is also accelerating the auto industry’s rush to add new sensors to showroom-bound vehicles. This may surprise some users: Tesla’s Terms of Use (TOU) does not explicitly state that the company will…
Content Type: Examples
Caucuses, which are used in some US states as a method of voting in presidential primaries, rely on voters indicating their support for a particulate candidate by travelling to the caucus location. In a 2016 Marketplace radio interview, Tom Phillips, the CEO of Dstillery, a big data intelligence company, said that his company had collected mobile device IDs at the location for each of the political party causes during the Iowa primaries. Dstillery paired caucus-goers with their online…
Content Type: Examples
In a presentation given at the Knowledge Discovery and Data Mining conference in 2016, researchers discussed a method of using the data generated by smart card public transport tickets to catch pickpockets. In a study of 6 million passenger movements in Beijing, the researchers used a classifier to pick out anomalous journeys - sudden variations in the patterns of ordinary travellers or routes that made no sense. A second classifier primed with information derived from police reports and social…
Content Type: Examples
As part of its Smart Nation programme, in 2016 Singapore launched the most extensive collection of data on everyday living ever attempted in a city. The programme involved deploying myriad sensors and cameras across the city-state to comprehensively monitor people, places, and things, including all locally registered vehicles. The platform into which all this data will be fed, Virtual Singapore, will give the government the ability to watch the country's functioning in real time. The government…
Content Type: Examples
A new generation of technology has given local law enforcement officers in some parts of the US unprecedented power to peer into the lives of citizens. In Fresno, California, the police department's $600,000 Real Time Crime Center is providing a model for other such centres that have opened in New York, Houston, and Seattle over the decade between 2006 and 2016. The group of technologies used in these centres includes ShotSpotter, which uses microphones around the city to triangulate the…
Content Type: Examples
By 2016, a logical direction for data-driven personalisation efforts to go was toward the "Internet of Emotions": equipping devices with facial, vocal, and biometric sensors that use affective computing to analyse and influence the feelings of device owners. Of particular concern is the potential for using subtle cues to manipulate people in a more nuanced way than is presently discussed. The beginnings of this are already visible in the example of an Amazon Echo that displayed the items a…
Content Type: Examples
Because banks often decline to give loans to those whose "thin" credit histories make it hard to assess the associated risk, in 2015 some financial technology startups began looking at the possibility of instead performing such assessments by using metadata collected by mobile phones or logged from internet activity. The algorithm under development by Brown University economist Daniel Björkegren for the credit-scoring company Enterpreneurial Finance Lab was built by examining the phone records…
Content Type: Examples
A new generation of technology has given local law enforcement officers in some parts of the US unprecedented power to peer into the lives of citizens. The police department of Frenso California uses a cutting-edge Real Time Crime Center that relies on software like Beware.
As officers respond to calls, Beware automatically runs the address. The program also scoures billions of data points, including arrest reports, property records, commercial databases, deep Web searches and the man’s social…
Content Type: Examples
At the Sixth Annual Conference on Social Media Within the Defence and Military Sector, held in London in 2016, senior military and intelligence officials made it clear that governments increasingly view social media as a tool for the Armed Forces and a "new front in warfare". Social media are also viewed as a source of intelligence on civilian populations and enemies and as a vector for propaganda. The conference was sponsored by Thales, which was working with the National Research Council of…
Content Type: Examples
In 2016, researchers at MIT's Computer Science and Artificial Intelligence Laboratory developed a new device that uses wireless signals that measure heartbeats by bouncing off a person's body. The researchers claim that this system is 87% accurate in recognising joy, pleasure, sadness, or anger based on the heart rate after first measuring how the individual's body reacts in various emotional states. Unlike a medical electrocardiogram, it does not require a sensor to be attached to the person's…
Content Type: Advocacy
On 6 March 2018, Privacy International participated in an interactive dialogue with the UN Special Rapporteur on the right to privacy at the 37th Ordinary Session of the Human Rights Council in Geneva. We highlighted the growing trend of governments embracing hacking to facilitate their surveillance activities, and recommended the development of a human rights analysis of government hacking for surveillance purposes, with the view to forming specific…
Content Type: Press release
26 March 2015
The UN's top human rights body, the Human Rights Council, today has passed a landmark resolution endorsing the appointment of an independent expert on the right to privacy. For the first time in the UN's history, an individual will be appointed to monitor, investigate and report on privacy issues and alleged violations in States across the world.
The resolution, which appoints a Special Rapporteur on the right to privacy for an initial period of three years, was spearheaded…
Content Type: Advocacy
In this submission, Privacy International provides the Committee with their observations to the written replies of the Pakistani government and with additional, up to date information to that contained in the brieing submitted to the Committee in advance of the adoption of the list of issues in 2016.
Content Type: News & Analysis
What do Honduras, Pakistan, and Switzerland have in common? They are all bound to respect and protect the right to privacy under Article 17 of the International Covenant on Civil and Political Rights. And in July 2017, they all also happened to be under the scrutiny of the UN Human Rights Committee, which found the countries’ human rights record wanting in many respects, including the scope of their surveillance legislation.
Intelligence sharing
Reviewing Pakistan, the Committee…
Content Type: Advocacy
Privacy International and the Italian Coalition for Civil Liberties' Joint Submission in Consideration of the Sixth Periodic Report of Italy Human Rights Committee 119th Session (6-29 March 2017).
The submission brings to the attention of the Committee the ongoing concern with Italian security agencies’ hacking capabilities and intelligence sharing arrangement, with Italian data retention procedures, and its export control regime as it relates to its robust…
Content Type: Report
This stakeholder report is a submission by Privacy International (PI). PI is a human rights organisation that works to advance and promote the right to privacy and ght surveillance around the world. Privacy International wishes to bring concerns about the protection and promotion of the right to privacy for consideration in Pakistan’s upcoming review at the 28th session of the Working Group on the Universal Periodic Review.
Content Type: Long Read
This briefing highlights opportunities for NGOs to raise issues related to the right to privacy before some selected UN human rights bodies that have the mandate and the capacity to monitor and provide recommendations and redress.
The briefing provides some examples based on Privacy International’s experience and points at additional resources and guides. While this guide focuses on the work of NGOs, information to UN human rights mechanisms can be sent by other civil society actors…
Content Type: Advocacy
This stakeholder report is a submission by Privacy International (PI). PI is a human rights organisation that works to advance and promote the right to privacy and fight surveillance around the world. PI wishes to bring concerns about the protection and promotion of the right to privacy in Uzbekistan before the Human Rights Committee for consideration in Uzbekistan's upcoming review.
Content Type: Advocacy
La Asociación por los Derechos Civiles (ADC) y Privacy International toman nota de las respuestas del gobierno de Argentina a la lista de cuestiones antes de la presentación del informe, en particular en relación a la legislación, políticas y prácticas relacionadas con la vigilancia y la protección de los datos personales.
Privacy International es una organización de derechos humanos que trabaja para favorecer y promover el derecho a la privacidad y la lucha contra la vigilancia en todo el…
Content Type: Advocacy
Asociación por los Derechos Civiles (ADC) and Privacy International note the replies by the government of Argentina to the list of issues prior to the submission of the report, in particular in relation to the laws, policies and practices related to surveillance and protection of personal data.
Privacy International is a human rights organisation that works to advance and promote the right to privacy and fight surveillance around the world. The Asociación por los Derechos Civiles (ADC) is a…
Content Type: Advocacy
La Asociación por los Derechos Civiles (ADC) y Privacy International toman nota de las respuestas del gobierno de Argentina a la lista de cuestiones antes de la presentación del informe, en particular en relación a la legislación, políticas y prácticas relacionadas con la vigilancia y la protección de los datos personales.
Privacy International es una organización de derechos humanos que trabaja para favorecer y promover el derecho a la privacidad y la lucha contra la vigilancia en todo el…
Content Type: Advocacy
Article 17 of the International Covenant on Civil and Political Rights (ICCPR) provides for the right of every person to be protected against arbitrary or unlawful interference with his privacy, family, home or correspondence as well as against unlawful attacks on his honour or reputation. Any interference with the right to privacy can only be justified if it is in accordance with the law, has a legitimate objective and is conducted in a way that is necessary and proportionate. Surveillance…
Content Type: Advocacy
Article 17 of the International Covenant on Civil and Political Rights (ICCPR) provides for the right of every person to be protected against arbitrary or unlawful interference with his privacy, family, home or correspondence as well as against unlawful attacks on his honour or reputation. Any interference with the right to privacy can only be justified if it is in accordance with the law, has a legitimate objective and is conducted in a way that is necessary and proportionate. Surveillance…