Advanced Search
Content Type: Examples
In May 2015, the US Department of Justice and the FBI submitted a declaration to an Oregon federal judge stating that the US government's no-fly lists and broader watchlisting system relied on predictive judgements of individuals rather than records of actual offences. The documents were filed as part of a longstanding case brought by the American Civil Liberties Union, which claimed that the government did not provide steps individuals could take to get off the blacklists and that the process…
Content Type: Examples
As GPS began being increasingly incorporated into smartphones, satnav manufacturers like the Dutch company TomTom were forced to search for new revenue streams. In 2011, TomTom was forced to apologise when the Dutch newspaper AD reported that the company had sold driving data collected from customers to police, which used it to site speed cameras in locations where speeding was common. TomTom said that any information it shares had been anonymised; however, in response to the newspaper story…
Content Type: Examples
In 2014, India's newly elected prime minister, Narendra Modi, allocated INR70.6 billion (upwards of £750 million) to a plan called "100 Smart Cities". Although a year later the funding dropped to INR1.4 billion, smart city-themed conference continued to take place in Delhi and Mumbai, and urban development minister Venkaiah Naidu expected imminent roll-out of cities with infrastructure comparable to any developed European city. However, the earliest of these cities - such as Palava City, built…
Content Type: Examples
In 2015, Boston advertising executive John Flynn, CEO of Copley Advertising, began developing a system that uses standard online advertising and tracking techniques, coupled with geofencing, to send advertisements to women's smartphones when they are sitting inside Planned Parenthood clinics and other abortion facilities. The system was soon adopted by the northern California-based crisis pregnancy centres network RealOptions and the evangelical adoption agency Bethany Christian Services. The…
Content Type: Examples
In 2015, The Intercept obtained documents showing that the Mall of America in Bloomington, Minnesota used a fake Facebook account to friend and monitor local Black Lives Matter activists, and collect their personal information and photographs without their knowledge. The account was discovered in a cache of files the Mall of America provided to Bloomington officials after a large BLM protest against police brutality that was held at the mall. After the protest, the city charged 11 protesters…
Content Type: Examples
New Hampshire Supreme Court rules information brokers liable for harms caused by selling information
In 2003, the New Hampshire Supreme Court ruled that information brokers and private investigators may be liable for the harms caused by selling information. In the case in question, Amy Boyer, a young woman, was murdered by Liam Youens, a stalker. Youens obtained her information from Docusearch, which bought her social security number and used a subcontractor to place "pretext" calls in order to get Boyer to reveal her employment information. The ruling led the private investigation industry to…
Content Type: Examples
Uber has closely studied how dynamic pricing functions and when it's acceptable to users. One discovery is that round numbers signal haste and sloppiness where riders appear to believe that more precise numbers (for example, 2.1 instead of 2) have been carefully worked out by an algorithm. The company's head of head of economic research Keith Chen says that riders will pay up to 9.9 times the normal price if their phone's battery is almost dead, information the Uber app openly collects in order…
Content Type: Examples
In 2015, a series of interviews with Moshe Greenshpan, the founder and CEO of the Israeli company Skakash, revealed the existence of the company's facial recognition software Churchix. The software is intended to help churches keep track of who attends services and other events by matching reference photos provided by new congregants to images captured on cameras within the church. Greenshpan claimed that an added benefit is to enable churches to identify criminals and sex offenders by adding…
Content Type: Examples
In 2016, researchers at MIT's Computer Science and Artificial Intelligence Laboratory developed a new device that uses wireless signals that measure heartbeats by bouncing off a person's body. The researchers claim that this system is 87% accurate in recognising joy, pleasure, sadness, or anger based on the heart rate after first measuring how the individual's body reacts in various emotional states. Unlike a medical electrocardiogram, it does not require a sensor to be attached to the person's…
Content Type: Examples
In 2016, rising awareness of the profits pharmaceutical and other medical companies make from personal data such as DNA samples and cell lines led to the rise of a "biorights" movement to ensure that patients retain greater control over their contributions. A federal complaint filed by the American Civil Liberties Union on behalf of four people against Myriad Genetics Laboratories, a Utah-based company, asked the US Department of Health and Human Services to make sure patients retain access to…
Content Type: Examples
Twitter requested one of its key B2B partners, Dataminr — a service that offers advanced social media analytics and early detection of major events like terrorist attacks or natural disasters — stop providing U.S. intelligence agencies with their tools and content. Dataminr isn’t ending its relationship with the government altogether: Dataminir still counts In-Q-Tel, the non-profit investment arm of the CIA, as an investor. Dataminr has taken investment from Twitter, too, highlighting some of…
Content Type: Examples
In 2016, the Big Data lab at the Chinese search engine company Baidu published a study of an algorithm it had developed that it claimed could predict crowd formation and suggested it could be used to warn authorities and individuals of public safety threats stemming from unusually large crowds. The study, which was inspired by a New Year's Eve 2014 stampede in Shanghai that killed more than 30 people, correlated aggregated data from Baidu Map route searches with the crowd density at the places…
Content Type: Examples
According to the US security firm Statfor the Chinese government has been builsing a system to analyse the massive amounts of data it has been collecting over the past years. The company claims: "The new grid management system aims to help the Chinese government act early to contain social unrest. Under the new program, grid administrators each monitor a number of households (sometimes as many as 200). They then aggregate their reports into one enormous surveillance database, where it is…
Content Type: Examples
Between 2010 and 2016, access control spyware implementing a remote "kill switch" was installed increasingly often in rent-to-buy laptops and cars financed by subprime loans. In a 2012 case the Federal Trade Commission settled with seven computer rental companies over their use of DesignerWare's Detective Mode, an add-on to PC Rental Agent, which was installed by 1,617 rent-to-own stores on 420,000 computers around the world. Detective Mode required users to register with their address, phone…
Content Type: Examples
In 2012, London Royal Free, Barnet, and Chase Farm hospitals agreed to provide Google's DeepMind subsidiary with access to an estimated 1.6 million NHS patient records, including full names and medical histories. The company claimed the information, which would remain encrypted so that employees could not identify individual patients, would be used to develop a system for flagging patients at risk of acute kidney injuries, a major reason why people need emergency care. Privacy campaigners…
Content Type: Examples
A new breed of market research companies are pioneering geoanalytics to find complex financial information. That is, they use machine learning algorithms to search for patterns in high-resolution satellite imagery that's refreshed daily and available at the scale of 1 meter per pixel. Much of the information gleaned this way relies on detecting change or counting items such as cars or trucks parked in a particular location. The resulting financial insights are sold to paying customers such as…
Content Type: Examples
In April 2016, Google's Nest subsidiary announced it would drop support for Revolv, a rival smart home start-up the company bought in 2014. After that, the company said, the thermostats would cease functioning entirely because they relied on connecting to a central server and had no local-only mode. The decision elicited angry online responses from Revolv owners, who criticised the company for arbitrarily turning off devices that they had purchased. The story also raised wider concerns about…
Content Type: Examples
A new examination of documents detailing the US National Security Agency's SKYNET programme shows that SKYNET carries out mass surveillance of Pakistan's mobile phone network and then uses a machine learning algorithm to score each of its 55 million users to rate their likelihood of being a terrorist. The documents were released as part of the Edward Snowden cache. The data scientist Patrick Ball, director of research at the Human Rights Data Analysis Group, which produces scientifically…
Content Type: Examples
In 2016 the Dutch Data Protection Authority (AP) ruled that the Personal Data Protection Act prohibits companies from monitoring their employees' health via wearables, even when employees have given their permission. The ruling concluded the AP's investigation into two companies; in one of them, wearables even gave the employer insight into its employees' sleep patterns. The AP argued that employers are free to give wearables as gifts, but that the power relationship between employer and…
Content Type: Explainer
Phone networks are divided between two networks: the physical and the mobile. The physical runs on the Public Switched Telephone Network (PSTN) that serves your home phone. Mobile networks are dominant in the age of communication and are used to relay mobile communications to the PSTN. The most prominent mobile networks are GSM networks (Global System for Mobile communications) and are what we use everyday to communicate with one another. Another system is known as CDMA (Code Division Multiple…
Content Type: Explainer
Video surveillance technologies are deployed in public and private areas for monitoring purposes. Closed-circuit television (CCTV)– a connected network of stationary and mobile video cameras– is increasingly used in public areas, private businesses and public institutions such as schools and hospitals. Systems incorporating video surveillance technologies have far greater powers than simply what the camera sees. Biometric technologies use the transmitted video to profile, sort and identify…
Content Type: Explainer
What is the Global Surveillance Industry?
Today, a global industry consisting of hundreds of companies develops and sells surveillance technology to government agencies around the world. Together, these companies sell a wide range of systems used to identify, track, and monitor individuals and their communications for spying and policing purposes. The advanced powers available to the best equipped spy agencies in the world are being traded around the world. It is a…
Content Type: Case Study
What happened
As we traveled the world we saw alarming use and spread of surveillance capabilities. From country to country we saw the same policy ideas, and the same kit. The role of industry to the growth of surveillance capability had never been exposed before.
What we did
In 1996 we published the first ‘Big Brother Incorporated’ study, identifying the vast numbers of technology firms who were investing in surveillance technologies. We were particularly surprised by the rise of German…