Advanced Search
Content Type: Guide step
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Telegram for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they can obtain, no transparency and no clear, accessible or effective legal safeguards to protect your…
Content Type: Guide step
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Facebook for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they can obtain, no transparency and no clear, accessible or effective legal safeguards to protect your…
Content Type: Guide step
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like WhatsApp for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they can obtain, no transparency and no clear, accessible or effective legal safeguards to protect your…
Content Type: Guide step
Your Twitter app stores a lot of information about you in the cloud. Here we show you how to gain access to it.
It’s important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Twitter for your data and avoid getting a warrant. So the use of this technology means there is no limit…
Content Type: Advocacy
Privacy International (PI) welcomes the aim of the Digital Markets Act (DMA) to address some of the challenges posed by the way the current digital markets operate. As we noted in our preliminary assessment, the proposal put forward by the European Commission in December 2020 contains some shortcomings that need to be addressed, if the DMA were to be effective in tackling these challenges. Some of these shortcomings have been addressed, particularly by the European Parliament in its resolution…
Content Type: Guide step
Your Uber app stores a lot of information in the cloud. Here we show you how you can get access to it.
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Uber for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they…
Content Type: News & Analysis
2022 will see a raft of high tech surveillance tools emerging in the UK government’s arsenal, which will further entrench a ‘hostile environment’ for migrants. Compounding this further, immigration officers will increasingly be using digital forensic tools such as 'mobile phone extraction' under a veil of secrecy. This raises serious concerns about overreach, misuse and abuse of power, the actual quality and integrity of the data they gather, and independent oversight of these powers. But it…
Content Type: Case Study
Overview
Estonia is widely considered one of the most digitally advanced countries in the world. Its e-ID is the gateway through which e-citizens are able to access most public services. Estonia's e-ID is both designed and operated by a collection of private companies, and overseen by the Police and Border Guard agency.
X-Road® (implemented in Estonia as X-tee) is the free and open-source data exchange layer which provides a standardised method for transferring information between the data…
Content Type: Long Read
This piece is a part of a collection of research that demonstrates how data-intensive systems that are built to deliver reproductive and maternal healthcare are not adequately prioritising equality and privacy.
What are they?
Short Message Services (SMS) are being used in mobile health (MHealth) initiatives which aim to deliver crucial information to expecting and new mothers. These initiatives are being implemented in developing countries experiencing a large percentage of maternal and…
Content Type: Video
In Kenya, if you don’t have an ID, life can be extremely difficult. But for thousands of people across the country, getting an ID can be nigh on impossible. Some Kenyan citizens can’t obtain a national ID because they are registered in the Kenyan refugee database. Often referred to as victims of double registration, their predicaments reveal a deeper problem with ID itself.
Now Haki na Sheria - a Kenyan organisation advocating for and supporting the victims of double registration - and three…
Content Type: Video
Links
Donate to PI and get your facemask
Mozilla's *privacy not included project
US PIRG's Trouble in Toyland
Roomba home maps and concerns from 2017 about Roomba sharing that information
ICO advice
Our guides for protecting yourself from online tracking
Our Amazon Ring report "One Ring to Watch Them All"
Find out more about our legal work
Extra audio credit details in order of appearance:
acclivity (sleigh bells)
dj997 (additional bells)
Marta Tsvettsikh (fire sound)
waxsocks…
Content Type: Video
Watch Part 1 of our videos on How to use the Data Interception Environment (DIE). It goes through downloading the DIE from PI's GitHub, setting up a virtual phone, and changing network settings to allow data to be intercepted.
Watch Part 2 of our videos on How to use the DIE. It goes through fixing the certificates for the virtual phone, and how to start using the DIE to view and analyse data being sent from the phone.
PI has made this tool available to assist individuals, researchers and…
Content Type: News & Analysis
The notorious Clearview AI first rose to prominence in January 2020, following a New York Times report. Put simply, Clearview AI is a facial recognition company that uses an “automated image scraper”, a tool that searches the web and collects any images that it detects as containing human faces. All these faces are then run through its proprietary facial recognition software, to build a gigantic biometrics database.
What this means is that without your knowledge, your face could be stored…
Content Type: Video
Links
You can read more about the DIE, including some of the research we've done that's used it here: https://privacyinternational.org/learn/data-interception-environment
You can find our work about apps sharing data with Facebook here: https://privacyinternational.org/appdata
You can download the DIE to have a go with it yourself here: https://github.com/privacyint/appdata-environment-desktop/tree/update-3
Content Type: Explainer
Following sustained reporting by researchers, journalists and activists around the world, including recent disclosures exposed by the PegasusProject, the surveillance industry is facing scrutiny like never before.
In the latest move, eighteen U.S. lawmakers have today demanded that the U.S. government imposes sanctions on four non-US surveillance companies for, as they mention in their letter, facilitating “disappearance, torture and murder of human rights activists and journalists”.
The move…
Content Type: Video
Please note the views expressed in the video are the interviewee's own and do not necessarily reflect the views of PI.
In his interview, Alexandru told us that he started to work for Uber in 2018. Despite being aware of negative experiences of others, he felt that everything was running smoothly, and for a while, Uber met his expectations.
However, in 2021, he received a notice from Uber that they had noticed fraudulent activity associated with his account. He went on social media and…
Content Type: Video
Please note the views expressed in the video are the interviewee's own and do not necessarily reflect the views of PI.
Driver X (he wishes to remain anonymous) has been working for Uber for five years. After working for Uber for two and half years, he suddenly received a message telling him that his account had been temporarily suspended and asking him not to call Uber while the investigation was pending. He was baffled, as he had an excellent record and rating, with plenty of positive…
Content Type: Long Read
What if your boss was an algorithm? What would you do if your employer suddenly fired you or reduced your pay without telling you why? And without being willing to give you a reason when you ask for one?
This is not science fiction or some far-fetched reality. Millions of people worldwide are working in the gig economy sector for companies like Uber, Deliveroo, Bolt, Just Eat… And this could be the future of work for people working outside the gig economy, as surveillance technologies are…
Content Type: News & Analysis
To add your voice to the letter below, which we'll be sending to gig economy companies like Uber, Deliveroo, Bolt, Amazon Flex, Just Eat, Free Now, and Ola, sign the Managed by Bots petition. (PETITION IS NOW CLOSED, SEE UBER'S RESPONSE TO OUR CAMPAIGN LETTER. SEE DELIVEROO'S RESPONSE.
Worker Info Exchange (WIE), the App Drivers and Couriers Union (ADCU), Privacy International (PI) and other civil society organisations* are today writing to you with urgent questions about the exploitation of…
Content Type: Video
Update: Pa has since won a settlement from UberPlease note the views expressed in the video are interviewee's own and do not necessarily reflect the views of PI.Pa used to work for Uber. After some time, Uber started asking him to submit a picture of himself to the platform to confirm it was indeed him who had completed the job. However, with time, the frequency of the requests increased. In the beginning, the requests for a picture only happened once a week, but as time went by Pa told us that…
Content Type: Explainer
Before you get started
It would be useful to have:
Oracle Virtualbox (version 6.1 or later)
Genymotion, a virtual phone or a physical device
Unarchival software (7Zip, Peazip, Keka, Ark etc)
Android Developer Bridge (adb) (You can also install Android Debug Bridge, which is adb without the full Android SDK platform)
Web Browser
A small amount of linux/unix knowledge will help!
Setting up the Data Interception Environment
Download the latest release of the Data Interception…
Content Type: News & Analysis
What if we told you that every photo of you, your family, and your friends posted on your social media or even your blog could be copied and saved indefinitely in a database with billions of images of other people, by a company you've never heard of? And what if we told you that this mass surveillance database was pitched to law enforcement and private companies across the world?
This is more or less the business model and aspiration of Clearview AI, a company that only received worldwide…
Content Type: Video
<br />
Links
Read more about the ICO's provisional decision
Support our work
You can find out more about Clearview by listening to our podcast: The end of privacy? The spread of facial recognition
Content Type: Press release
Today, following an in-depth investigation, the UK Competition and Market Authority (CMA) assessed that the competition concerns can only be addressed by Facebook selling Giphy in its entirety. This is a very significant decision. Facebook, the largest provider of social media sites and display advertising in the UK, acquired Giphy, the largest provider of GIFs. The merger would further increase Facebook’s dominance and Facebook would have benefitted from Giphy’s data collection practices and…
Content Type: Press release
In what could be seen as one of the strongest sanctions against the company in Europe, the Information Commissioner’s Office (ICO), which is tasked with enforcing data protection legislation in the UK, has today announced its provisional intent to issue a potential fine of £17 million against the controversial facial recognition company Clearview AI.
Clearview AI, which only received worldwide attention following a New York Times report back in January 2020, is a company whose business model…
Content Type: Report
Democratic engagement is increasingly mediated by digital technology, from campaigning to election results transmission. A key example of the application of new technologies to democratic processes is the growing practice of micro-targeting in political campaigning around the globe, including Colombia.
In 2018, the mayor of Bogotá, Enrique Peñalosa, was accused of hiring Cambridge Analytica during his 2015 election campaign. That same year, Cambridge Analytica’s former director acknowledged…