Advanced Search
Content Type: Explainer
What is an IMSI catcher?
‘IMSI’ stands for ‘international mobile subscriber identity’, a number unique to your SIM card. IMSI catchers are also known as ‘Stingrays’.
An ‘IMSI catcher’ is a device that locates and then tracks all mobile phones that are connected to a phone network in its vicinity, by ‘catching’ the unique IMSI number.
It does this by pretending to be a mobile phone tower, tricking mobile phones nearby to connect to it, enabling it to then intercept the data from that phone…
Content Type: Explainer
What are ‘cloud extraction tools’ and what do they do?
Cloud extraction technology enables the police to access data stored in your ‘Cloud’ via your mobile phone or other devices.
The use of cloud extraction tools means the police can access data that you store online. Examples of apps that store data in the Cloud include Slack, Instagram, Telegram, Twitter, Facebook and Uber.
How might cloud extraction tools be used at a protest?
In order to extract your cloud data, the police would…
Content Type: Advocacy
This report is presented by TEDIC (Technology and Community Association) and Privacy International (PI). TEDIC is a non-governmental, non-profit organization, based in Asunción, that promotes and defends human rights on the Internet and extends its networking to Latin America. PI is a London based human rights organization that works globally at the intersection of modern technologies and rights.
TEDIC and PI wish to express some concerns about the protection and promotion of the right to…
Content Type: Video
Remember: sign our ECI! pvcy.org/banbiometrics
And you can find our survey here: pvcy.org/tpsurvey
Links
Facebook Leak
- Facebook Leak: https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4?r=US&IR=T
- Mark Zuckerburg on signal?: https://www.thesun.co.uk/tech/14595265/mark-zuckerberg-using-whatsapp-rival-signal/
- Irish DPA investigation: https://www.cnet.com/news/facebook-under-investigation-in-europe-over-massive-personal-data-leak…
Content Type: News & Analysis
Back in 2019, UK Health Secretary Matt Hancock announced a partnership between the NHS and Amazon Alexa. The goal of the partnership was for Alexa to be able to use the content of the NHS website when people asked health-related questions.
At the time, we expressed a number of concerns regarding this agreement: Amazon did not appear to be an actor that should be trusted with our health information, and seeing the Health Secretary publicly praising this new agreement appeared to give…
Content Type: Explainer
What do mobile phone extraction tools do?
Mobile phone extraction (MPE) tools are devices that allow the police to extract data from mobile phones, including:
contacts;
call data (i.e. who you call, when, and for how long);
text messages (including who you texted and when);
stored files (photos, videos, audio files, documents etc);
app data (including the data stored on these apps);
location information history;
wifi network connections (which can reveal the locations of any…
Content Type: News & Analysis
This article was written by Jamila Venturini from Derechos Digitales. The original version (in Spanish) is available here.
While at the international level there is a growing demand to ban the use of surveillance technologies until rigorous human rights standards are achieved, in Latin America we observe a new and silent tendency to acquire and use such systems to control access to social protection, i.e., to policies developed to reduce poverty, social vulnerability and exclusion…
Content Type: Video
Links
Useful info
Tech pill survey: pvcy.org/tpsurvey
How to minimise targeted ads: privacyinternational.org/act/minimise-targeted-ads
Protect yourself from online tracking: privacyinternational.org/act/protect-yourself-online-tracking
Social media account settings: privacyinternational.org/act/protect-yourself-social-media-monitoring
Our Onion address: privacyintyqcroe.onion
Episode Info
6:06 - reasons to delete apps you’re not using
8:00 - 4 things you should do first…
Content Type: Long Read
The role of the Human Rights Act in shaping UK jurisprudence has been discussed at length since the European Convention on Human Rights was brought into UK law. This ongoing discussion was recently fueled by former UK Supreme Court judge Jonathan Sumption’s Reith Lectures, where he voiced concerns in relation to European Court of Human Rights (ECtHR) jurisprudence specifically in relation to Article 8 and the right to privacy.
We disagree with this view. The Human Rights Act has led…
Content Type: News & Analysis
This blog post by Coding Rights was originally published in Portuguese at: https://tinyurl.com/mediumcodingrightsTransID. It was written by Mariah Rafaela Silva and Joana Varon and translated by Erly Guedes. Illustration was produced by Clarote.On the International Transgender Day of Visibility, Mariah Rafaela Silva and Joana Varon authors of the report “Facial recognition in the public sector and trans identities: techno-politics of control, surveillance and threats to gender diversity…
Content Type: Long Read
This piece was written by Joan López, researcher at Fundación Karisma, and originally posted on their website.
The uncertainty of this crisis has become an opportunity for the implementation of technological solutions to complex issues instead of coherent decision-making processes. During the social and economic crisis caused by Covid-19, the National Development Office (DNP in Spanish) in Colombia, in just two weeks, set up an unconditional cash transfer system for 3 million citizens. The…
Content Type: Long Read
This piece was last updated in June 2021.
In many countries, access to social protection (such as welfare programmes or healthcare) is made conditional on producing a form of identification (“ID”). But obtaining a recognised and accurate ID is often a process riddled with discriminatory designs, bureaucracy and technical failures that prevent individuals from accessing the services they are entitled to. Even when people eventually get an ID, it might not accurately reflect who they are,…
Content Type: News & Analysis
Uganda's Presidential election in January 2021 resulted in the incumbent President Museveni winning his sixth term in office, having held power for 35 years. The election took place amidst a global pandemic and the run up to election day was fraught. Violence left dozens dead and hundreds more arrested, including the opposition candidate Bobi Wine. Mass rallies and in person campaign meetings were banned due to Covid restrictions and political parties in Uganda were encouraged to conduct “…
Content Type: Report
Human rights defenders across the world have been facing increasing threats and harms as result of the use of digital and technological tools used by governments and companies which enable the surveillance, monitoring and tracking of individuals and communities. They are continuously at risk of violence, intimidation and surveillance as a direct consequence of the work they do. Such surveillance has been shown to lead to arbitrary detention, sometimes to torture and possibly to extrajudicial…
Content Type: Long Read
This article was written by Sameet Panda and Vipul Kumar.
Over the last couple of years, there has been a push towards digitising the PDS, which includes linkage with the Aadhaar (India’s biometric identification system) and maintenance of digital records at Fair Price Shops that distribute the ration, among other initiatives. Without taking into account the availability of appropriate digital infrastructure and access among beneficiaries, these initiatives have been unable to solve…
Content Type: Examples
Sidestepping the need to obtain a search warrant, the US Department of Homeland Security (DHS) has been accessing smartphone location data by buying it from private marketing that typically embed tracker in apps. This data, which maps the movement of millions of cellphones in America, was collected from ordinary cellphone apps, to which users gave access to their location. In this particular instance, it was used by the DHS to search for undocumented immigrants according to the Wall Street…
Content Type: Video
Content warning: this episode includes some disturbing stories of people who have died after having their benefits cut or withdrawn by the UK Department of Work and Pensions
Links
Find out more about the DWP's surveillance
Find out more about the DWP's alogrithim
You can find out more about each of the cases of people who died after their benefits withdrawn below:
Errol Graham
The 5,000
Jodey Whiting
Phillipa Day
David Clapson
If you're having problems navigating the UK's…
Content Type: News & Analysis
The Police, Crime, Sentencing and Courts (PCSC) Bill is currently being scrutinised by numerous civil society organisations such as Amnesty International UK and Liberty for its damaging impacts on peaceful protests, however it also contains important provisions regarding when, if and how the police and other governmental authorities can extract data from your phones and other electronic devices.
Chapter 3 of the PCSC Bill is a legislative response to the UK's Information Commissioner's Office…
Content Type: Examples
On March 17th, the Israeli Knesset (Parliament) approved a bill allowing the digital tracking of people arriving from abroad and who would have to go into quarantine. Travellers will be tracked using digital tracking bracelets, or other means like cell phone bracelet. According to Haaretz, Deputy Health Minister Yoav Kisch said 5,000 digital bracelets will be available for use the same week, and that 30,000 more will be acquired over the next three months.
Content Type: News & Analysis
We have set out our understanding of the NFI’s current functioning here.
The National Fraud Initiative is a data-matching exercise overseen by the Cabinet Office which allows a range of public and private sector entities to access personal data, exclusively for the purposes of preventing and detecting fraud. A current government consultation suggests expanding the NFI to include four new, wide-ranging purposes:
Data-matching to assist in the prevention and detection of crime (other than…
Content Type: Explainer
You can access PI’s response to the consultation here.
This explainer is based on PI’s analysis and understanding of:
The Consultation text
The Draft Code of Data Matching Practice
The Cabinet Office’s data specifications for the public and private sector
The Cabinet Office’s 2015 case-studies both for the public and private sector
The Data Protection Impact Assessment for the current iteration of the National Fraud…
Content Type: Advocacy
As part of a package of measures aimed at addressing the challenges posed by big tech companies, the European Commission proposed a Digital Markets Act, whose intended aim is “to allow end users and business users alike to reap the full benefits of the platform economy and the digital economy at large, in a contestable and fair environment.”
The proposal contains provisions that could benefit individuals as they engage with services provided by big tech companies ('gatekeepers' in the language…
Content Type: News & Analysis
Unwanted Witness’ research into Safeboda highlighted the company’s failure to comply with some of the law's core data protection principles, with a number of implications for the exercise of data subject rights. The enforcement action against Safeboda by National Information Technology Authority, Uganda (NITA-U) requires the company to make fundamental changes to how they handle people's personal data in order to comply with the Data Protection and Privacy Act, 2019.
This first landmark…
Content Type: News & Analysis
The College of Policing public consultation concerned the new Code of Practice in relation to the way information is managed and recorded in the Police National Computer (PNC), Police National Database (PND) and the forthcoming Law Enforcement Data Service (LEDS).
PI and Open Rights Group (ORG) believe that the way police records and information are managed, stored and disposed of can pose serious threats to privacy and other fundamental rights. Therefore they must not only be subject to strong…
Content Type: Video
Links
Find more of Dr Thompson's work and her book 'An Organ of Murder: Crime, Violence, and Phrenology in Nineteenth-Century America'
Or you can find her on twitter
You can see the 'Good and Bad heads' picture in her article 'Rediscovering “Good” and “Bad” Heads in the Phrenological Present'
Find out more about Physogs and Photofit in Courtney's article in Endeavour
You can listen to our podcast on Facial Recognition
And you can support us
You can listen and subscribe to…
Content Type: Advocacy
Background
Giphy is a searchable database for Graphic Interchange Format (‘GIF’) files, stickers, emojis, text, videos and Arcade (remixable video games). This database can be queried through the Giphy search engine, either via its main website (giphy.com), its API or its SDK. Content obtained can then be shared via their URL or be integrated in another service such as a website or an app. Well known integrations of Giphy include messaging services like Whatsapp, Slack,…