Advanced Search
Content Type: News & Analysis
Last week, Privacy International intervened in an important and long overdue Judicial Review into the UK Home Office’s secret and blanket policy of seizing mobile phones of all migrants who arrived to the UK by small boat between April 2020 and November 2020.
The case revealed that migrants were searched on arrival at Tug Haven in Dover and compelled to hand over their mobile phones and provide their PIN numbers. During the course of proceedings it came to light that the Home Office had self-…
Content Type: News & Analysis
In a ruling handed down on 14 October 2021 by the High Court of Kenya in relation to an application filed by Katiba Institute calling for a halt to the rollout of the Huduma card in the absence of a data impact assessment, the Kenyan High Court found that the Data Protection Act applied retrospectively.
Background to the case
Huduma Namba as initially proposed
In January 2019, the Kenyan Statute Law (Miscellaneous Amendment) Act No. 18 of 2018 came into effect, introducing a raft of amendments…
Content Type: Advocacy
The role that personal data plays in political campaigns https://privacyinternational.org/learn/data-and-elections and the risks of data abuse and exploitation only entered into the public discourse a few years ago, when Cambridge Analytica became a household name thanks to several scandals over the course of 2017 and 2018.
Since then, we have seen a flurry of initiatives that have helped shed light on the otherwise very opaque practices of digital campaigning. There have been public…
Content Type: Guide step
The information you (consciously or not) share with Telegram can be very revealing. It can also be (mis)interpreted by government agencies and used to profile individuals. Once installed on a device, depending on your settings, the Telegram app may have access to information such as your location, contact information and media stored on the same device. All of this data can be potentially be accessed remotely using cloud extraction technology.
Your Telegram app generates a lot of data that can…
Content Type: Guide step
The information you (consciously or not) share with Facebook can be very revealing. It can also be (mis)interpreted by government agencies and used to profile individuals. Once installed on a device, depending on your settings, the Facebook app may have access to information such as your location, contact information and media stored on the same device. All of this data can be potentially be accessed remotely using cloud extraction technology.
Your Facebook app generates a lot of data that can…
Content Type: Guide step
The information you share on WhatsApp can be very revealing. Once installed on a device, the app potentially has access to information such as your location, contact information, and media stored on the same device.
Your WhatsApp app generates a lot of data that can also be stored on your device and elsewhere. It’s important for you to be able to understand the types of data that apps like WhatsApp generate. Government agencies may seek access to this data through at least two routes: they…
Content Type: Guide step
The information you (consciously or not) share with X can be very revealing. It can also be (mis)interpreted by government agencies and used to profile individuals. Once installed on a device, depending on your settings, the X app may have access to information such as your location, contact information and media stored on the same device. All of this data can be potentially be accessed remotely using cloud extraction technology.
This guide shows you how to obtain the data X stores about you…
Content Type: Advocacy
Privacy International (PI) welcomes the aim of the Digital Markets Act (DMA) to address some of the challenges posed by the way the current digital markets operate. As we noted in our preliminary assessment, the proposal put forward by the European Commission in December 2020 contains some shortcomings that need to be addressed, if the DMA were to be effective in tackling these challenges. Some of these shortcomings have been addressed, particularly by the European Parliament in its resolution…
Content Type: Guide step
Your Uber app generates a lot of data that is stored in the app and shared with Uber.
It’s important for you to be able to understand the types of data that apps like Uber’s generate. Government agencies may seek access to this data through at least two routes: they could directly access your device and then analyse the data stored in the app and data your app shares and can access on Uber’s servers (and potentially data backed-up to your cloud provider) using ‘cloud extraction’ techniques, or…
Content Type: News & Analysis
2022 will see a raft of high tech surveillance tools emerging in the UK government’s arsenal, which will further entrench a ‘hostile environment’ for migrants. Compounding this further, immigration officers will increasingly be using digital forensic tools such as 'mobile phone extraction' under a veil of secrecy. This raises serious concerns about overreach, misuse and abuse of power, the actual quality and integrity of the data they gather, and independent oversight of these powers. But it…
Content Type: Case Study
Overview
Estonia is widely considered one of the most digitally advanced countries in the world. Its e-ID is the gateway through which e-citizens are able to access most public services. Estonia's e-ID is both designed and operated by a collection of private companies, and overseen by the Police and Border Guard agency.
X-Road® (implemented in Estonia as X-tee) is the free and open-source data exchange layer which provides a standardised method for transferring information between the data…
Content Type: Long Read
This piece is a part of a collection of research that demonstrates how data-intensive systems that are built to deliver reproductive and maternal healthcare are not adequately prioritising equality and privacy.
What are they?
Short Message Services (SMS) are being used in mobile health (MHealth) initiatives which aim to deliver crucial information to expecting and new mothers. These initiatives are being implemented in developing countries experiencing a large percentage of maternal and…
Content Type: Video
In Kenya, if you don’t have an ID, life can be extremely difficult. But for thousands of people across the country, getting an ID can be nigh on impossible. Some Kenyan citizens can’t obtain a national ID because they are registered in the Kenyan refugee database. Often referred to as victims of double registration, their predicaments reveal a deeper problem with ID itself.
Now Haki na Sheria - a Kenyan organisation advocating for and supporting the victims of double registration - and three…
Content Type: Video
Links
Donate to PI and get your facemask
Mozilla's *privacy not included project
US PIRG's Trouble in Toyland
Roomba home maps and concerns from 2017 about Roomba sharing that information
ICO advice
Our guides for protecting yourself from online tracking
Our Amazon Ring report "One Ring to Watch Them All"
Find out more about our legal work
Extra audio credit details in order of appearance:
acclivity (sleigh bells)
dj997 (additional bells)
Marta Tsvettsikh (fire sound)
waxsocks…
Content Type: Video
Watch Part 1 of our videos on How to use the Data Interception Environment (DIE). It goes through downloading the DIE from PI's GitHub, setting up a virtual phone, and changing network settings to allow data to be intercepted.
Watch Part 2 of our videos on How to use the DIE. It goes through fixing the certificates for the virtual phone, and how to start using the DIE to view and analyse data being sent from the phone.
PI has made this tool available to assist individuals, researchers and…
Content Type: News & Analysis
The notorious Clearview AI first rose to prominence in January 2020, following a New York Times report. Put simply, Clearview AI is a facial recognition company that uses an “automated image scraper”, a tool that searches the web and collects any images that it detects as containing human faces. All these faces are then run through its proprietary facial recognition software, to build a gigantic biometrics database.
What this means is that without your knowledge, your face could be stored…
Content Type: Video
Links
You can read more about the DIE, including some of the research we've done that's used it here: https://privacyinternational.org/learn/data-interception-environment
You can find our work about apps sharing data with Facebook here: https://privacyinternational.org/appdata
You can download the DIE to have a go with it yourself here: https://github.com/privacyint/appdata-environment-desktop/tree/update-3
Content Type: Explainer
Following sustained reporting by researchers, journalists and activists around the world, including recent disclosures exposed by the PegasusProject, the surveillance industry is facing scrutiny like never before.
In the latest move, eighteen U.S. lawmakers have today demanded that the U.S. government imposes sanctions on four non-US surveillance companies for, as they mention in their letter, facilitating “disappearance, torture and murder of human rights activists and journalists”.
The move…
Content Type: Video
Please note the views expressed in the video are the interviewee's own and do not necessarily reflect the views of PI.
In his interview, Alexandru told us that he started to work for Uber in 2018. Despite being aware of negative experiences of others, he felt that everything was running smoothly, and for a while, Uber met his expectations.
However, in 2021, he received a notice from Uber that they had noticed fraudulent activity associated with his account. He went on social media and…
Content Type: Video
Please note the views expressed in the video are the interviewee's own and do not necessarily reflect the views of PI.
Driver X (he wishes to remain anonymous) has been working for Uber for five years. After working for Uber for two and half years, he suddenly received a message telling him that his account had been temporarily suspended and asking him not to call Uber while the investigation was pending. He was baffled, as he had an excellent record and rating, with plenty of positive…
Content Type: Long Read
What if your boss was an algorithm? What would you do if your employer suddenly fired you or reduced your pay without telling you why? And without being willing to give you a reason when you ask for one?
This is not science fiction or some far-fetched reality. Millions of people worldwide are working in the gig economy sector for companies like Uber, Deliveroo, Bolt, Just Eat… And this could be the future of work for people working outside the gig economy, as surveillance technologies are…
Content Type: News & Analysis
To add your voice to the letter below, which we'll be sending to gig economy companies like Uber, Deliveroo, Bolt, Amazon Flex, Just Eat, Free Now, and Ola, sign the Managed by Bots petition. (PETITION IS NOW CLOSED, SEE UBER'S RESPONSE TO OUR CAMPAIGN LETTER. SEE DELIVEROO'S RESPONSE.
Worker Info Exchange (WIE), the App Drivers and Couriers Union (ADCU), Privacy International (PI) and other civil society organisations* are today writing to you with urgent questions about the exploitation of…
Content Type: Video
Update: Pa has since won a settlement from UberPlease note the views expressed in the video are interviewee's own and do not necessarily reflect the views of PI.Pa used to work for Uber. After some time, Uber started asking him to submit a picture of himself to the platform to confirm it was indeed him who had completed the job. However, with time, the frequency of the requests increased. In the beginning, the requests for a picture only happened once a week, but as time went by Pa told us that…
Content Type: Explainer
Before you get started
It would be useful to have:
Oracle Virtualbox (version 6.1 or later)
Genymotion, a virtual phone or a physical device
Unarchival software (7Zip, Peazip, Keka, Ark etc)
Android Developer Bridge (adb) (You can also install Android Debug Bridge, which is adb without the full Android SDK platform)
Web Browser
A small amount of linux/unix knowledge will help!
Setting up the Data Interception Environment
Download the latest release of the Data Interception…
Content Type: News & Analysis
What if we told you that every photo of you, your family, and your friends posted on your social media or even your blog could be copied and saved indefinitely in a database with billions of images of other people, by a company you've never heard of? And what if we told you that this mass surveillance database was pitched to law enforcement and private companies across the world?
This is more or less the business model and aspiration of Clearview AI, a company that only received worldwide…