Advanced Search
Content Type: Video
<br />
Biometric data collection and use in the name of countering terrorism has been accelerating around the globe, often abusively, without being effectively regulated or subject to accountability mechanisms
This week we talk to Fionnuala Ní Aoláin, UN Special Rapporteur on Human Rights & Counter-Terrorism, Nina Dewi Toft Djanegara about biometrics in Afghanistan and Iraq, and Keren Weitzberg about uses in Somalia and Palestine.
Links
Read more about uses in Iraq…
Content Type: Examples
Amid a chaotic rollout of the national vaccination plan, the Italian Federation of General Practitioners (FIMMG) and some regions in Italy are resorting to algorithms to more efficiently prioritise who gets vaccinated against COVID-19.
AlgorithmWatch documented the adoption of automated decision-making (ADM) systems to determine COVID-19 vaccination priority orders both by the Italian Federation of General Practitioners and by regional authorities in Lombardy, Valle d’Aosta, and Piedmont. More…
Content Type: Report
In this briefing, Amnesty International, PI and The Centre for Research on Multinational Corporations (SOMO) discuss the corporate structure of NSO group, one of the surveillance industry's well-known participants. The lack of transparency around NSO Group’s corporate structure and the lack of information about the relevant jurisdictions within which it operates are significant barriers in seeking prevention of, and accountability for, human rights violations reportedly linked to NSO Group’s…
Content Type: Report
In Somalia, international entities like the US Department of Defense (DoD) and intergovernmental organizations such as the United Nations (UN) have used biometrics in the name of counterterrorism, collecting and indefinitely storing biometric data, frequently in the absence of full disclosure or appropritate regulation. These biometric initiatives have had dubious benefits and known detrimental effects on local populations. Nevertheless, most Somalis have little knowledge or say over how their…
Content Type: Report
In Afghanistan and Iraq, the U.S. Department of Defense developed its biometric program in confluence with US military operations in. Its expansion was tightly linked to the goals of military commanders during the “War on Terror”: to distinguish insurgents and terrorists from the local civilian population. This research shows how the DOD’s biometric programme was developed and implemented without prior assessment of its human rights impact and without the safeguards necessary to prevent its…
Content Type: Report
In Israel/Palestine, the Israeli government has been deploying biometrics, including cutting-edge facial recognition technology, in the name of counter-terrorism. The Israeli state routinely surveils and severely restricts Palestinians’ freedom of movement using myriad technologies, including biometrics, which result in furthering the policies of systemic segregation. Since many Palestinians live under Israeli occupation, they have little control over the way their sensitive data is turned…
Content Type: Long Read
Since the September 11th attacks, decision makers across the globe have embraced overreaching surveillance technologies. The global “War on Terror” ushered in and normalized an array of invasive surveillance technologies. Collection and storage of biometrics data and the application of statistical methods to such data have been touted as uniquely suited to twenty-first century threats. Yet, biometrics technologies are not seamless, panoptic technologies that allow for perfect control. They can…
Content Type: Long Read
The Grand Chamber of the European Court of Human Rights ruled that the UK government’s historical mass interception program violates the rights to privacy and freedom of expression. The Court held that the program “did not contain sufficient “end-to-end” safeguards to provide adequate and effective guarantees against arbitrariness and the risk of abuse.” As a result the Court ruled that UK law "did not meet the “quality of law” requirement and was therefore incapable of keeping the “…
Content Type: Long Read
Summary
This case began in the UK in 2013, following Edward Snowden’s revelations that UK’s GCHQ was secretly intercepting, processing, and storing data concerning millions of people’s private communications, even when those people were of clearly of no intelligence interest (the ‘Tempora’ programme). It was also revealed that the UK government was accessing communications and data collected by the USA’s National Security Agency and other countries’ intelligence agencies. All of this was…
Content Type: Long Read
On 25 May 2021, the European Court of Human Rights issued its judgment in Big Brother Watch & Others v. the UK. Below, we answer some of the main questions relating to the case.
After our initial reaction, below we answer some of the main questions relating to the case.
NOTE: This post reflects our initial reaction to the judgment and may be updated.
What’s the ruling all about?
In a nutshell, one of the world’s most important courts, the Grand Chamber of the European Court of Human…
Content Type: Press release
The Grand Chamber of the European Court of Human Rights has today ruled that UK mass surveillance laws violate the rights to privacy and freedom of expression.
It found that:
The UK’s historical bulk interception regime violated the right to privacy protected by Article 8 of the European Convention on Human Rights and freedom of expression, protected by Article 10. Particularly it found that:
the absence of independent authorisation,
the failure to include the categories of selectors…
Content Type: Press release
Privacy International (PI), together with Hermes Center for Transparency and Digital Human Rights, Homo Digitalis and noyb - the European Center for Digital Rights, has today filed a series of legal complaints against Clearview AI, Inc. The facial recognition company claims to have “the largest known database of 3+ billion facial images”. The complaints were submitted to data protection regulators in France, Austria, Italy, Greece and the United Kingdom.
As our complaints detail, Clearview AI…
Content Type: Video
This case was made possible because of Edward Snowden’s disclosures in 2013, and through the combined work of Big Brother Watch, American Civil Liberties Union, Amnesty International, Bytes for All, Canadian Civil Liberties Association, Egyptian Initiative for Personal Rights, Hungarian Civil Liberties Union, Irish Council for Civil Liberties, Legal Resources Centre and Liberty.
Content Type: Video
<br />
It’s been a long road, starting at the UK’s Investigatory Powers Tribunal in 2013, but this case would have happened without Ed’s revelations, which revealed the extent of those surveillance programmes. Which is why (around a year ago now) we sat down with him to talk about this case, mass surveillance and what we can do to fight back.
Find out more about the case here: https://privacyinternational.org/legal-action/10-human-rights-organisations-v-united-kingdom
And…
Content Type: News & Analysis
On May 18th 2021 Google held its annual developer conference, Google I/O, where the company announces a number of innovations, products and software updates that will hit the market in the months to come. Among these announcements, the company introduced Android 12, its latest mobile Operating System (OS), that came with headline grabbing privacy features.
Possibly trying to catch up with Apple, which is positioning itself as a privacy-friendly tech company and gave the adtech industry a kick…
Content Type: Long Read
One of the most exciting aspects of being a campaigning organisation today is developing new ways to work with people. We enjoy devising and testing new ways to reach and engage with people, hear their concerns, and channel their voices towards our shared adversaries.
It's also an exciting challenge to undertake all of this while protecting the people you are working with. This also means working to protect people's data.
At PI we think hard on this, and struggle openly in many of the right…
Content Type: News & Analysis
The report on disinformation by the UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression follows a growing trend by international bodies (including the Organization of American States and the European Commission) to assess and regulate the global phenomenon that is disinformation.
The report strongly links the spread of disinformation with the gratuitous data collection and profiling techniques utilised by the online…
Content Type: News & Analysis
To fully understand when, how and why asylum seekers are monitored via the Aspen Card, we need more information.
In February this year we launched our ‘Stop Spying on Asylum Seekers’ campaign, demanding that the UK Home Office ceases surveillance of asylum seekers through the payments they make on their ‘Aspen Card’ debit payment card.
Over 200 people wrote to the Home Office. We are grateful for the pressure that every one of you have applied to the Home Office.
You can read our explainer…
Content Type: News & Analysis
The Aspen Card - the debit payment card given to asylum seekers that PI has previously exposed as a de facto surveillance tool - will be outsourced to a new company. The contract with Sodexo has come to an end and the company Prepaid Financial Services will be taking over.
Our campaign for transparency in relation to the Aspen Card and how it monitors asylum seekers continues. Not only do we demand clarity from the Home Office [read more here], we believe the new provider, Prepaid Financial…
Content Type: Video
Links
Listen to Love Letter and find more from Sepia on Soundcloud: https://soundcloud.com/sepiamusicuk/love-letter (he's also on most other music platforms!)
Find out more about Dark Patterns: https://www.darkpatterns.org/
The Electronic Freedome Foundation on what comes after cookies: https://www.eff.org/issues/online-behavioral-tracking
WHO on COVID vaccine safety: https://www.who.int/news-room/q-a-detail/coronavirus-disease-(covid-19)-vaccines-safety
COVID and…
Content Type: Explainer
What is social media monitoring?
Social media monitoring refers to the monitoring, gathering and analysis of information shared on social media platforms, such as Facebook, Twitter, Instagram and Reddit.
It may include snooping on content posted to public or private groups or pages. It may also involve “scraping” – grabbing all the data from a social media platform, including content you post and data about your behaviour (such as what you like and share).
Through scraping and other tools…
Content Type: Explainer
What are my 'unique identifiers' and where are they stored?
Your phone and your SIM card contain unique identifiers about you, which can be accessed by the police to identify you.
The IMSI (International Mobile Subscriber Identity) is a unique number associated with your SIM card. It doesn't change, even if you put the SIM card into a different phone.
If you have a mobile phone subscription, the IMSI will be associated with personal information such as your name and address.
The IMEI (…
Content Type: Explainer
Where are my communications stored?
Text messages/phone calls: Traditional cellphone communications happen over the cellular network. You usually access those with the text message and phone call apps that are provided as standard on your phone. While phone calls aren’t stored anywhere, text messages are stored locally on your and the recipient’s devices. They might also be temporarily stored by the network provider.
Messaging apps: Messaging platforms enable fairly secure communication…
Content Type: Explainer
Where is my phone's location data stored?
Your phone can be located in two main ways, using GPS or mobile network location:
1. GPS
GPS (that stands for Global Positioning System) uses satellite navigation to locate your phone fairly precisely (within a few metres), and relies on a GPS chip inside your handset.
Depending on the phone you use, your GPS location data might be stored locally and/or on a cloud service like Google Cloud or iCloud. It might also be collected by any app that you…
Content Type: Explainer
What is predictive policing?
Predictive policing programs are used by the police to estimate where and when crimes are likely to be committed – or who is likely to commit them. These programs work by feeding historic policing data through computer algorithms.
For example, a program might evaluate data about past crimes to predict where future crimes will happen – identifying ‘hot spots’ or ‘boxes’ on a map. But the data these programs use can be incomplete or biased, leading to a ‘feedback…