Advanced Search
Content Type: Report
This briefing takes a look at the private intelligence industry, a collection of private detectives, corporate intel firms, and PR agencies working for clients around the world that have made London their hub.
Often staffed by ex-spooks, and promising complete secrecy, little is known about them. But reports over the years have exposed their operations, including things like hacking and targeting of anti-corruption officials, spying on peaceful environment activists, and running fake '…
Content Type: Explainer
The ‘Guide to Digital Safety and Privacy at Peaceful Protests’ has been produced by 7amleh - The Arab Center for the Advancement of Social Media.
7amleh has adapted the content of PI's UK Free to Protest guide to fit the Palestinian context. The guide is organized in three sub-guides: (1) a guide to digital safety and privacy at peaceful protests; (2) a guide to surveillance of protesters’ faces and bodies; and (3) a guide to policing databases and predictive policing tools.
This guide was…
Content Type: Explainer
Bluetooth
The majority of apps settled on using Bluetooth for proximity tracing.
Just what is Bluetooth?
Named after the 10th Century King Harald "Bluetooth" Gormsson who unified Scandinavia — and whose runic initials comprise the logo — Bluetooth is a wireless, low-power, and therefore short-distance, set of protocols used primarily to connect devices directly to each other in order to transfer data, such as video and audio.
Bluetooth for tracking?
Most of us who've encountered Bluetooth use…
Content Type: Explainer
Introduction/Background
Electronic tags have been a key part of criminal justice offender management for over 20 years, being used in the United States since the mid 1980’s and in the UK and some other commonwealth countries since 2003. In 2021 the UK introduced GPS tagging for immigration bail.
The tag is predominantly used to curtail the liberties of individuals. For those on criminal bail its intended use includes managing return into communities while deterring reoffending.
As we explore…
Content Type: Long Read
In a roundtable available on YouTube, co-hosted with Garden Court Chambers, Privacy International brought together immigration law practitioners to discuss how they’ve used privacy and data protection law to seek information or redress for their clients.
Index:
1. UK Border 2025
2. Super-complaint and judicial review challenge to data sharing
3. Mobile phone seizure and extraction
4. Freedom of Information Act requests
The dystopian future: UK Border 2025
To set the scene on how the…
Content Type: Video
Watch Part 1 of our videos on How to use the Data Interception Environment (DIE). It goes through downloading the DIE from PI's GitHub, setting up a virtual phone, and changing network settings to allow data to be intercepted.
Watch Part 2 of our videos on How to use the DIE. It goes through fixing the certificates for the virtual phone, and how to start using the DIE to view and analyse data being sent from the phone.
PI has made this tool available to assist individuals, researchers and…
Content Type: Explainer
With more and more connected devices around us, the chance that you've been hit by an update notification is high. But what do these software updates do? How do they actually work, and why are they important?
Hardware and Software
Modern electronic devices require two main parts to function: the hardware and the software. The hardware usually refers to physical electronic pieces inside a device (usually a collection of microchips, logic gates and specialised processing chips, such as those to…
Content Type: Long Read
Governments around the world are increasingly making registration in national digital ID systems mandatory for populations, justifying its need on a range of issues from facilitating access to services, to national security and fighting against corruption. This is an attempt to create a "foundational identity" for an individual, or "a single source of truth" about who someone is, according to a government agency. These identity systems are run by governments, sometimes by private companies, or…
Content Type: News & Analysis
Our relationship with ‘public space’ is being redefined, not just by a global pandemic, but also by a new era of biometric surveillance technologies. Biometric mass surveillance enables companies and authorities to track us based on unique personal data and identify us whenever, wherever we go.The increasing use of facial recognition and other biometric surveillance technologies – on our streets, in train stations, at protests, at sports matches and even in our global ‘town square’, Facebook –…
Content Type: News & Analysis
As Amnesty International and Forbidden Stories continue to publish crucial information about the potential targets of NSO Group’s spyware, we know this much already: something needs to be done.
But what exactly needs to be done is less obvious. Even though this is not the first time that the world has learned about major abuses by the surveillance industry (indeed, it’s not even the first time this month), it’s difficult to know what needs to change.
So how can the proliferation and use of…
Content Type: News & Analysis
A new industry is offering border agencies around the world access to advanced space-based surveillance capabilities once reserved for the most advanced intelligence agencies. Using satellites able to track signals from satellite phones and other emitters, these companies are then selling access to the data obtained to anyone willing to pay, including UK and EU border agencies.
While such surveillance can and is being used to save lives, it can also be used for illegal ‘pull backs’ in…
Content Type: Explainer
An array of digital technologies are being deployed in the context of border enforcement. Satellite and aerial surveillance are part of the surveillance toolkit and yet, they are also used by organisations seeking to hold government actions to account and improve efficacy of their own work. To effectively critique state use and delve into potential benefits of satellite and aerial surveillance, we must first understand it.
In this explainer we dig into a technology which many are aware of for…
Content Type: Explainer
‘Free to Protest: The protestor’s guide to police surveillance and how to avoid it’ (UK edition) is a collection of bite-sized guides about high-tech police surveillance capabilities at protests, including tips and strategies about how you can protect yourself from being identified, tracked and monitored. Each guide is self-contained so you don’t need to read the whole thing, or read it any particular order. You can access each separate section of the guide from the campaign homepage, but if…
Content Type: Examples
After developing software that automatically recognises cookie banners that do not comply with the GDPR (usually because they do not provide a clear one-click option to reject all non-essential cookies), noyb has sent over 500 complaints to companies they consider non-compliant and given them a one-month grace period to change their practices. Along with the complaints, noyb provides a step-by-step guide on how to comply. They intend on generating over 10,000 complaints in this way in the…
Content Type: Examples
The Irish Council for Civil Liberties (ICCL) has filed a lawsuit in Hamburg against three AdTech industry trade bodies including the Interactive Avertising Bureau (IAB). Members of the IAB include big tech companies (Google, Facebook, Amazon, Twitter...), data brokers (Equifax, Experian, Acxiom...) and advertising agencies (Groupm, Publicis, IPG...).
The lawsuit follows the filing in 2018 of complaints with the Irish Data Protection Commission (DPC) and UK Information Commissioner (ICO), which…
Content Type: Examples
While traditional media sought to criminalize the widespread November 2020 protests in Peru following the Congressional ouster of President Vizcarra, witnesses disseminated videos and photographs of police abuse on social networks. In the fear and uncertainty, many myths also circulated. In Peru, citizens have the right to refuse to allow police to check their cellphones unless they have a court order; slowed or absent wireless connections may simply be due to overload; as public officials,…
Content Type: Examples
In December 2020 Myanmar authorities began rolling out its $1.2 million "Safe City" system of 335 Huawei AI-equipped surveillance cameras in eight townships in the capital, Naypyidaw. The system, whose purpose was originally presented by the Myanmar government as fighting crime, automatically scans faces and vehicle licence plates in public places and alerts authorities to the presence of those on a wanted list. The Safe City plan calls for installing similar systems in Mandalay by mid-2021 and…
Content Type: Examples
Hundreds of pages of Myanmar government budgets for the last two fiscal years obtained by the New York Times show that the Myanmar military who staged a coup in February 2021 had new and sophisticated tools at their disposal: Israeli-made, military-grade surveillance drones, European iPhone cracking devices, and US software that can hack into computers and extract their contents. Purchases of sensitive dual-use cybersecurity and defence technology continued during the five years in which the…
Content Type: Examples
The internet, mobile, and social media shutdown in Myanmar left protesters vulnerable to rumours and at a disadvantage in organising opposition to the 2021 military coup. Coordination was done via phone, word of mouth, and the Bluetooth-based messaging app Bridgefy, which was downloaded more than 1 million times in Myanmar in the days after the coup. All plans include both online and offline contingency arrangements; a second disruptive possibility is intermittent interruptions and throttling…
Content Type: Examples
The Belarusian government is using the "Kipod" facial recognition software developed by the local software company LLCC Synesis to track and identify dissidents. Synesis was previously sanctioned by the EU for providing authorities with an AI surveillance platform capable of tracking individuals. Kipod uses biometrics machine learning algorithms to analyse material. Synesis has denied that the technology could be used to identify protesters, but the Belarusian government decreed the…
Content Type: Examples
In August 2020, controversial Belarusian president Alexander Lukashenko cut off most of the nation's access to the internet in hopes of disrupting the protests against the vote-rigging that saw him installed as president. Online news sites were left largely offline from election day onward, and demonstrators had to scramble to find wifi connections and working VPNs or proxies in order to share whatever news they could find. Protests therefore relied on popular bloggers on Telegram channels to…
Content Type: Examples
Despite its indications of support for the pro-democracy protesters, in October 2020 the EU bought the Belarusian authorities 15 surveillance drones, raising concerns that the video equipment they carry would be used to identify and arrest individual pro-democracy protesters. The EU foreign service paid for them out of an €850,000 neighbourhood project handled by Latvia and Lithuania, and denied that they could be used to identify individuals. The drones were intended for use to patrol EU…
Content Type: Examples
The 2020 Belarus protests were the largest in the country's history and brought an unprecedented crackdown, in which protesters nationwide were tortured and criminally prosecuted as a means of repressing peaceful assembly. A report finds that these cases became political as the government violated the presumption of innocence and meted out disproportionately harsh sentences. The report found no reports of disciplinary action taken against law enforcement officers who exceeded their authority by…
Content Type: Examples
In 2019, interviews with Hong Kong protesters destroying smart lampposts revealed that many distrusted the government's claim that they would only take air quality measurements and help with traffic control, largely because of the comprehensive surveillance net the Chinese government was using to control and oppress the minority Uighur population in the Xinjiang region. As part of their response to this threat, the protesters wore masks, carried umbrellas, and travelled on foot, using online…
Content Type: Examples
In 2019 Hong Kong protesters cut down 20 of the city's smart lampposts, which are streetlights equipped with sensors and cameras, in order to counter the threat that they were vectors for surveillance technologies such as facial and licence plate recognition. TickTack Technology, which provided the lampposts, terminated its contract with the Hong Kong government because of the property damage and threats to its employees. Protesters uploaded pictures of the lampposts' inner workings to Facebook…
Content Type: Examples
During 2019, Hong Kong law enforcement authorities had access to AI facial recognition software provided by Sydney-based iOmniscient that can match faces and licence plates from video footage to police databases, but chief executive Carrie Lam's administration and police did not confirm whether they were using it to quash the pro-democracy protests. IOmniscient is also used to find lost children and manage traffic and has users in more than 50 countries. Under Hong Kong's privacy laws, members…
Content Type: Examples
As police began treating every 2019 Hong Kong protest as an illegal assembly attracting sentences of up to ten years in jail, facial recognition offered increased risk of being on the streets, as protesters could be identified and arrested later even if they were in too large a crowd to be picked up at the time. By October, more than 2,000 people had been arrested, and countless others had been targeted with violence, doxxing, and online harassment. On the street, protesters began using…
Content Type: Examples
Both protesters and police during the 2019 Hong Kong protests used technical tools including facial recognition to counter each other's tactics. Police tracked protest leaders online and sought to gain access to their phones on a set of Telegram channels. When police stopped wearing identification badges, protesters began to expose their identities online on another. The removal of identification badges has led many to suspect that surveillance techniques are being brought in from mainland…
Content Type: Examples
UK police have used unmanned drones to monitor political protests for animal rights, by Extinction Rebellion, and against HS2, an extreme-right demonstration, and those held peacefully by Black Lives Matter, according to the campaign group Drone Watch. The Surrey, Cleveland, Staffordshire, Gloucestershire, and West Midlands forces all admitted to using drones at BLM events. Others admitting to using drones include Devon and Cornwall and Avon and Somerset.
https://www.theguardian.com/uk-news/…