Advanced Search
Content Type: Examples
A startling amount of the internet is fake in one way or another, studies found in 2018. Less than 60% of web traffic is human; a 2013 study found that at least half of YouTube traffic was bots masquerading as people; in November 2018 the US Justice Department revealed that eight people were accused of stealing $36 million in digital advertising fraud that involved sending fake traffic to spoofed websites which were made to look to advertisers like premium publishers. Also fake in at least some…
Content Type: Examples
In 2014, when the the far-right party of French politician Marine Le Pen needed cash, the loan of €9.4 million came from First Czech-Russian Bank, which was founded in the early 2000s as a joint venture between a Czech state bank and a Russian lender and went on to come under the personal ownership of Russian financier Roman Popov and obtain a European license via a subsidiary in the Czech Republic. Two and a half months after the Le Pen loan was signed, a Mediapart investigative journalist…
Content Type: Examples
In 2015, officials within the US Treasury Department Office of Terrorist Financing and Financial Crimes unit used a network of private Gmail and Hotmail accounts set up by the Russians with the stated goal of jointly defeating ISIS. Soon, however, instead the Russian financial crimes agency was using the back channel to seek sensitive information on enemies in the US and elsewhere - individuals such as the newspaper publisher Alexander Lebedev, a company tied to the Panama Papers, and nearly…
Content Type: Examples
As part of the digital campaign to win re-election, in mid-2018 the BJP, which controls the Indian national government as well as that of the state of Chhattisbarh, handed out $71 million worth of free phones and subsidised data plans to 2.9 million of the state's voters and then used the phones to target prospective voters. The plan's stated purpose was to bridge the digital divide in the state, which has a population of 26 million; hundreds of cellphone towers are supposed to be added to…
Content Type: Examples
A December 2018 analysis found that Facebook's measures for improving election security and discouraging anonymous political messages were poorly executed and inconsistently applied, and placed an unfair burden on charitable organisations and small businesses while simultaneously being easy for organised and well-funded actors to bypass. Facebook blocked non-profits such as New York's Nuyorican Poets Cafe, Arts Japan 2020, and the Boston Museum of Fine Arts from promoting "harmless" postings.…
Content Type: Examples
During the campaign leading up to the 2018 US midterm elections, the email accounts of four senior aides at the National Republican Congressional Committee were surveilled for several months. The intrusion was detected in April 2018 by an NRCC vendor, who alerted the committee and its cybersecurity contractor; the NRCC then began an internal investigation and alerted the FBI. House Republicans did not learn of the incident until Politico called the NRCC with questions about the attack in…
Content Type: Examples
In November 2018, the Spanish senate approved 220-21 an online data protection law intended to ensure compliance with the General Data Protection Regulation with an added amendment that allowed political parties to use personal data obtained from web pages and other publicly accessible sources for political purposes during campaign periods. Spain's Platform for the Defence of Freedom of Information criticised the law's potential to allow parties to create ideological profiles and emulate the…
Content Type: Examples
A December 2018 report prepared by the Oxford Internet Institute's Computational propaganda Research Project and the network analysis firm Graphika for the US Senate Intelligence Committee found that the campaign conducted by Russia's Internet Research Agency during the 2016 US presidential election used every major social media platform to deliver messages in words, images, and videos to help elect Donald Trump - and stepped up efforts to support him once he assumed office. The report relied…
Content Type: Examples
In the run-up to the May 2019 European Parliament elections, Google announced it would launch a new set of transparency tools to combat voter manipulation. Before being allowed to buy advertising on Google platforms, campaigns will be required to verify their identity, and approved ads will be required to display the identity of their purchaser. Google will build a real-time searchable database of all political ads and show their purchasers, costs, and demographics. Facebook announced similar…
Content Type: Examples
A 2018 study found that Twitter bots played a disproportionate role in spreading the false claim, made by US President Donald Trump shortly after winning the election but losing the popular vote in November 2016, that 3 million illegal immigrants had voted for Democratic opponent Hillary Clinton. After examining 14 million messages shared on Twitter between May 2016 and May 2017, Indiana University researchers found that just 6% of Twitter accounts identified as bots spread 31% of "low-…
Content Type: Examples
Facebook's latest tool for inspecting political ads showed that in the run-up to the US mid-term elections in November 2018, many of the same politicians who had been questioning Facebook about privacy and leaked user data were spending campaign funds on advertisements on the service. Between 2014 and 2018, the digital percentage of political spending rose from 1% to 22% (or about $1.9 billion); between May and November 2018 political spending on Facebook and its subsidiaries came to nearly $…
Content Type: Examples
In November 2018, the UK government announced that 11 local authorities across England would participate in Voter ID pilots in the interest of gaining "further insight into how best to ensure the security of the voting process and reduce the risk of voter fraud". Five local authorities participated in pilots in the 2017 general election. The new pilots will test four models of identification checks: photo ID (Pendle, East Staffordshire, Woking), photo and non-photo ID (Ribble Valley, Broxtowe,…
Content Type: News & Analysis
According to the International Organization for Migration, an estimated 258 million people are international migrants – that is, someone who changes their country of usual residence, That’s one in every 30 people on earth.
These unprecedented movements levels show no sign of slowing down. It is predicted that by 2050, there will be 450 million migrants across the world.
Nowadays, it is politically acceptable to demonise migrants, and countless leaders have spewed divisive and xenophobic…
Content Type: Long Read
(In order to click the hyperlinks in the explainer below, please download the pdf version at the bottom of the page).
Content Type: Long Read
The UK border authority is using money ring-fenced for aid to train, finance, and provide equipment to foreign border control agencies in a bid to “export the border” to countries around the world.
Under the UK Border Force’s “Project Hunter”, the agency works with foreign security authorities to bolster their “border intelligence and targeting” capabilities with UK know-how and equipment.
As well as the provision of equipment and training, the Border Force is also advising countries on…
Content Type: Advocacy
Cases of female and gender diverse public figures being targeted with online harassment have become sadly common in the news. Female politicians are particularly affected – although journalists and in particular sports commentators are also frequently targeted as well. In some cases, the harassment goes as far death and rape threat for women and gender diverse people who dare speaking publicly. Beyond the freedom of speech implications – as we risk seeing women and gender diverse people being…
Content Type: News & Analysis
PI has today written to Google, Instagram, Snapchat, TicTok, Twitter, YouTube, and WhatsApp to ask for more information about their steps to tell people why they are seeing ads. Facebook recently announced expanding the company's ad transparency measures to include more information about why an ad or content appears in a user's newsfeed. While Facebook has a lot more to do, it is important that all technology companies provide advertising transparency.
Recently, we have seen how platforms…
Content Type: Long Read
Cellebrite, a surveillance firm marketing itself as the “global leader in digital intelligence”, is marketing its digital extraction devices at a new target: authorities interrogating people seeking asylum.
Israel-based Cellebrite, a subsidiary of Japan’s Sun Corporation, markets forensic tools which empower authorities to bypass passwords on digital devices, allowing them to download, analyse, and visualise data.
Its products are in wide use across the world: a 2019 marketing…
Content Type: Explainer graphic
You can also read a more detailed explainer about police hacking here.
Content Type: News & Analysis
The Committee on Foreign Investment in the United States (CFIUS) is trying to force the Chinese owner of the gay dating app Grindr to sell the app because of national security concerns. This is the first time the committee has considered the national security implications of a foreign social media app.
Early last year, the Chinese company Beijing Kunlun Tech purchased the Californian-based dating app. Kulun had already owned 60 per cent of Grindr since 2016. Yet, it is only now – with an…
Content Type: News & Analysis
Today, the Kenyan Government is starting their biometric registration exercise known as NIIMS, leading to the issuing of Huduma Namba ID numbers. Along with our colleagues and partners in the human rights community in Kenya, we are very worried about the ramifications of this system for people in Kenya, and particularly for marginalised communities.
Thanks to the hard work and timely action of civil society in Kenya, the judiciary has intervened at the last minute. A court ruling on…
Content Type: News & Analysis
This past weekend, in an Op-Ed in the Washington Post, Mark Zuckerberg called for new regulations to address harmful content, electoral integrity, privacy and data portability.
Nine years since he proclaimed that privacy is no longer a social norm, four years since Facebook noticed broadscale harvesting and exploitation of their users' data by third party companies and chose not to tell us about it, two years since he denied there were any abuses of data in political campaigns, and…
Content Type: Long Read
(In order to click the hyperlinks in the explainer below, please download the pdf version at the bottom of the page).
Content Type: People
Eliot is Director for our Corporate Exploitation Programme, challenging Big Tech companies, data exploitative practices and the deployment of algorithmic management and surveillance systems.
Before joining PI has worked at the International Telecommunication Union (ITU), the UNEP and as a web developer. He has led our work on AdTech, algorithmic management and is responsible for our technical research on data exploitation. Eliot also takes part in the development of PI's public facing…
Content Type: People
Antonio is a lawyer who specialises in international employment and employee benefits law, including HR privacy matters.
Antonio is a senior associate at Covington & Burling, where he regularly provides multinational clients with advice on the application of both UK and international employment and data protection laws, in addition to managing international HR-legal compliance projects in these areas.
Content Type: News & Analysis
Planning and participating in peaceful protests against governments or non-state actors’ policies and practices requires the capacity of individuals to communicate confidentially without unlawful interference. From protests in support of LGBTI rights to protests against specific projects that undermine local communities’ wellbeing, these movements would not have been possible without the ability to exchange ideas and develop plans in private spaces.
Unlawful interference with…
Content Type: Long Read
(In order to click the hyperlinks in the explainer below, please download the pdf version at the bottom of the page).
Content Type: Advocacy
Privacy International's submission to the Human Rights Committee on a future General Comment on Article 21 of the International Covenant on Civil and Political Rights (ICCPR).
In this submission, Privacy International aims to provide the Committee with information on how surveillance technologies are affecting the right to peaceful assembly in new and often unregulated ways.
Based on Privacy International’s research, we provide the following observations:
the relationship between right…
Content Type: State of Privacy
Introduction
Acknowledgment
The State of Surveillance in Tunisia is the result of an ongoing collaboration by Privacy International and partners.
On 14 February 2023, the United Nations High Commissioner for Human Rights voiced concern over the deepening crackdown in Tunisia targeting perceived political opponents of President Kais Saied as well as civil society.
We have updated this page to reflect important changes in the state of surveillance in Tunisia.
Key privacy facts
1.…
Content Type: News & Analysis
We found this image here.
Today, a panel of competition experts, headed by Professor Jason Furman, the former chief economic adviser of in the Obama administration, confirmed that tech giants, like Facebook, Amazon, Google, Apple and Microsoft, do not face enough competition.
Significantly, the report finds that control over personal data by tech giants is one of the main causes preventing competition and ultimately innovation.
Privacy International's research has shown clear examples of…