Advanced Search
Content Type: Examples
The Kommersant reports that Russia's Rostec State Corporation is developing a new AI-powered anti-riot surveillance system that uses biometrics-powered cameras and can search social media networks and other publicly accessible data and intends to deploy the new system by the end of 2022. The behaviou analysis software is being developed as part of the Safe City project under the aegis of the Ministry of Emergency Situations, which intends to spend 97 billion rubles ($1.3 billion) deploying Safe…
Content Type: Examples
The energy company Cuadrilla used Facebook to surveil anti-fracking protesters in Blackpool and forwarded the gathered intelligence to Lancashire Police, which arrested more than 450 protesters at Cuadrilla's Preston New Road site over a period of three years in a policing operation that cost more than £12 million. Legal experts have called the relationship between fracking companies and the police "increasingly unhealthy" and called on the ICO and the Independent Office for Police Conduct to…
Content Type: Examples
Environmental campaigners wrote to Scottish first minister Nicola Sturgeon asking her to intervene to ensure the right to protest was upheld during COP26, when as many as 10,000 police officers from all over the UK were deployed per day on the streets of Glasgow. The letter said the police were reportedly filming campaigners, eavesdropping on conversations, unlawfully demanding personal details, and in one case followed a group to where they were staying even though no protest was in progress.…
Content Type: Examples
Emails obtained by EFF show that the Los Angeles Police Department contacted Amazon Ring owners specifically asking for footage of protests against racist police violence that took place across the US in the summer of 2020. LAPD signed a formal partnership with Ring and its associated "Neighbors" app in May 2019. Requests for Ring footage typically include the name of the detective, a description of the incident under investigation, and a time period. If enough people in a neighbourhood…
Content Type: Examples
Since the May 2020 murder of George Floyd, Minnesota law enforcement agencies have carried out a secretive, long-running surveillance programme targeting journalists and civil rights activists known as Operation Safety Net, a complex surveillance engine that has expanded to include collecting detailed facial images, scouring social media, and tracking mobile phones. Documents obtained via public records requests show that the police continued using the powers granted under OSN to monitor…
Content Type: Examples
After the January 6 insurrection at the US Capitol, the Department of Homeland Security expanded its monitoring of online activity and set up a new intelligence branch to counter domestic terrorism, including tracking platforms that have been linked to threats and “narratives known to provoke violence”. The agency warned law enforcement partners when appropriate when it saw upticks in activity on platforms linked to white supremacists and neo-Nazis. The Brennan Center for Justice warns in a new…
Content Type: Examples
According to internal documents obtained by the Brennan Center, the Polish “strategic communications” specialist Edge NPD, whose business is helping companies with market research, provided the Los Angeles Police Department with a free 40-day trial in which it collected nearly 2 million tweets, including thousands relating to six topics, including Black Lives Matter and “defund the police”. LAPD did not ultimately enter into a contract with the company; the documents do not say what the agency…
Content Type: Examples
According to internal documents, the San Francisco Police Department illegally spied on thousands of Bay Area residents protesting in 2020 against the murder of George Floyd and racist police violence. To conduct its surveillance, the SFPD used a network of more than 300 video cameras in downtown’s Union Square even though the city had passed an ordinance in 2019 that banned SFPD and other city agencies from using facial recognition and requiring them to get approval before using other…
Content Type: Examples
Internal documents show that local police coordinated with Enbridge, the oil company building the Line 3 pipeline through northern Minnesota, to track and crack down on indigenous opposition to the development in an initiative known as Opposition Driven Operational Threats (ODOT). Enbridge designed ODOT to spot emerging outside threats to its business, defining “threat!” as anything from reputational harm to property damage. In 2021, ODOT tracked more than a dozen “threat actors”, including…
Content Type: Examples
At his 2021 trial, prosecutors used previously-unseen infrared footage from FBI airplane surveillance at 9,000 feet to attempt to show that 18-year-old Kyle Rittenhouse chased one of the two people he later claimed to have shot in self-defence. Rittenhouse travelled from his home in Illinois to Wisconsin to join a protest following the 2020 police shooting of Jacob Blake. Aerial surveillance of people in public places is legal in the US, but illegal if directed at a single person for an…
Content Type: Press release
Meta, the largest provider of social media sites and display advertising in the UK, acquired GIPHY, the largest provider of GIFs. In its report of 30 November 2021 the CMA found that the completed merger between Meta and GIPHY will give rise to a substantial lessening of competition.
The CAT confirmed the CMA's assessment and dismissed all but one of Meta’s appeal grounds, paving the way for Meta to sell GIPHY, as demanded by the CMA.
PI was granted permission to intervene in this case, one of…
Content Type: Advocacy
Despite repeated recommendations by the UN Human Rights Council and the UN General Assembly to review, amend or enact national laws to ensure respect and protection of the right to privacy, national laws are often inadequate and do not regulate, limit or prohibit surveillance powers of government agencies as well as data exploitative practices of companies.
Even when laws are in place, they are seldom enforced. In fact PI notes how it is often only following legal challenges in national or…
Content Type: Long Read
Imagine your performance at work was assessed directly from the amount of e-mails sent, the amount of time consumed editing a document, or the time spent in meetings or even moving your mouse. This may sound ludicrous but your boss might be doing exactly that. There are more and more stories emerging of people being called into meetings to justify gaps in their work only to find out their boss had been watching them work without their knowledge.
The Covid-19 global pandemic has reshuffled the…
Content Type: Press release
To mark 10 years of the Home Office's hostile environment, a coalition of charities last night projected a vast message on the Home Office's Lunar House building in South London, to draw attention to Home Secretary Priti Patel's plans to GPS ankle tag thousands of migrants - a coercive, costly, and dehumanising measure.
As part of a week of events to mark 10 years of the "hostile environment", a set of policies designed to make life difficult for what…
Content Type: News & Analysis
Last night, PI, Migrants Organise and Bail For Immigration Detainees joined forces to shine a light on the enduring plight of migrants in the UK who are subject to hardline and dehumanising Home Office policies.
Our joint light projection marked the 10 year anniversary of former Home Secretary Theresa’s May’s infamous 'hostile environment', a policy purposefully cruel that includes indefinite detention of migrants and refugees.
The past decade has also seen the steady creep of data sharing…
Content Type: Video
Links
A resource for teachers we've been working with Ina on (consultation draft at the moment so please get in touch if you have thoughts!)
More about critical data literacy
The database of resources for teaching about big data and algorithmic systems Ina mentioned
PI's guides to help you and your loved ones protect yourselves online
Content Type: People
Sarah has a particular interest in upholding human rights and the rule of law with the increasing use of new technologies in policing and counter-terrorism measures and their wider implications on society and enjoyment of human rights. As well as maintaining privacy in relation to emerging digital health technologies and access to reproductive rights.
Sarah holds a BA Politics and LL.M Business and Human Rights from Queens University Belfast. Sarah is from Northern Ireland and has experience…
Content Type: Advocacy
The proposal seeks to impose mandatory environmental and human rights due diligence on companies of a certain size that operate in certain sectors.
Our submissions address the very limited personal and material scope of the current draft of the Directive, which is unlikely to subject the most problematic technology and surveillance companies to the new due diligence obligations.
Content Type: Key Resources
A. Risks to consider
Defamation: The law of defamation protects a person’s reputation against unjustified interference. You may get sued for defamation by a private actor you make allegations against. Defamation laws differ between jurisdictions and the burden of proof might be entirely on you.
Unlawful obtention of information: Depending on your jurisdiction, certain types of investigations might be in contravention of the law (such as publishing leaked information or hacking).…
Content Type: Key Resources
The first step when looking at technology is to find basic information about it - to define and categorise it. Looking at the Wikipedia page of a given technology is often a good starting point and will help you clarify what is implied within a technology (for example for Facial recognition). This is particularly useful when there is no specific technology that is mentioned in the partnership or when you are looking at a tender. You might also want to check the company’s marketing materials to…
Content Type: Key Resources
Obtaining adequate information about a public-private partnership is often difficult, especially when sensitive areas of government are involved, such as intelligence and law enforcement. Information about such activities is often purposefully withheld from the public and guarded by excessive laws and punishments.
But if it is safe to access them, there are many methods and resources out there which can help. Many of these sources are already readily available online, while others require desk…
Content Type: Key Resources
The UN Guiding Principles are a set of guidelines for states and companies to prevent, address and remedy human rights abuses committed in business operations. The UN Human Rights Council unanimously endorsed the UN Guiding Principles in its resolution 17/4 of 16 June 2011.
The UN Guiding Principles provide the authoritative global standard for action to safeguard human rights in a business context. As such, in the course of an investigation, they can be used to assess the compliance of a…
Content Type: Key Resources
There are no universally recognised data protection standards, but regional and international bodies have created internationally-agreed-upon codes, practices, decisions, recommendations, and policy instruments. The most significant instruments are:
The Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (No. 108), 1981 as amended in 2018;
The Organization for Economic Co-operation and Development Guidelines on the Protection…
Content Type: Key Resources
Public-private partnerships might very well involve a technology that is well-known and already widely deployed in other contexts, but it might also be a ground for innovation and novelty.
We can identify two main types of innovation:
A new technology that isn’t widely used or hasn’t been deployed in real world context (outside of a lab or a research paper);
A new set of features added to an existing technology which greatly expand its performances and capabilities.
Another type of “…
Content Type: Key Resources
You should check that certain documents and processes are in place so that the contracting state and company are accountable, that there is proper oversight, and adequate redress mechanisms. Note that you should consider the entire life cycle of the partnership. First at the procurement stage, has the procurement process for this contract followed local or international procurement rules? And are those procurement rules adequate? Has there been adequate transparency throughout the procurement…
Content Type: Key Resources
i. Added Literature review
There are several resources available that simplify and popularise complex technologies, starting with Wikipedia. Other resources can be tremendously useful even with little to no technical background, such as semi-specialised press. See for example:
MIT Technology review (e.g. quantum computing)
ArsTechnica, (e.g. on NFTS)
PC Mag (e.g. on 5G Mag)
Academic papers are also an avenue to find information although the language might be less accessible without…