Expose Data Exploitation: Data, Profiling, and Decision Making

Exposing companies' generation, collection, and exploitation of people's personal information.

 

Advocacy
The feedback in this document was submitted as part of an open Request for Information (RFI) process regarding the document created by The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems ("The IEEE Global Initiative") titled, Ethically Aligned
News & Analysis
30 May 2017 These days it seems that no election can go by without fears of foul play, whether it is the hacking of a candidate or party’s e-mail or the spread of fake news and other misinformation to support or discredit a particular party or politician. Often the finger is pointed at shady
Case Study

Invisible and insecure infrastructure is facilitating data exploitation

Many technologies, including those that are critical to our day-to-day lives do not protect our privacy or security. One reason for this is that the standards which govern our modern internet infrastructure do not prioritise

In 2015, IBM began testing its i2 Enterprise Insight Analysis software to see if it could pick out terrorists, distinguish genuine refugees from imposters carrying fake passports, and perhaps predict bomb attacks. Using a scoring system based on several data sources and a hypothetical scenario, IBM
03 Mar 2017
In 2017, the New York Times discovered that Uber had a secret internal programme known as "Greyball", which used data collected from the Uber app and other techniques to identify and bar regulators and officials from using its service. As the company expanded into new areas, its standard practice
In 2015 Hong Kong's Face of Litter campaign used DNA samples taken from street litter and collected from volunteers to create facial images that were then posted on billboards across the city. The campaign, conceived by PR firm Ogilvy & Mather and organised by online magazine Ecozine and the Nature
23 Apr 2017
For some months in 2017, in one of a series of high-risk missteps, Uber violated Apple's privacy guidelines by tagging and identifying iPhones even after their users had deleted Uber's app. When Apple discovered the deception, CEO Tim Cook told Uber CEO Travis Kalanick to cease the practice or face
Report
Financial services are changing, with technology being a key driver. It is affecting the nature of financial services, from credit and lending through to insurance, and even the future of money itself. The field of fintech is where the attention and investment is flowing. Within it, new sources of
Long Read
Photo Credit: AU UN IST / Tobin Jones El 25 de septiembre 2017, el presidente de Paraguay objetó la totalidad de una propuesta de Ley denominada “ que regula la activación del servicio de telefonía móvil”, disponiendo la creación de un registro de huellas dactilares de todos los usuarios de
Case Study

As society heads toward an ever more connected world, the ability for individuals to protect and manage the invisible data that companies and third parties hold about them, becomes increasingly difficult. This is further complicated by events like data breaches, hacks, and covert information

News & Analysis
Privacy International’s Data Exploitation Programme Lead was invited to give evidence to the Select Committee on Artificial Intelligence at the U.K. House of Lords. The session sought to establish how personal data should be owned, managed, valued, and used for the benefit of society. Link to the
Advocacy
Privacy International wishes to raise serious concerns regarding the proposal to expand immigration records to include social media handles, associated identifiable information and search results. Specifically, in relation to the current request for comments Docket Number DHS 2017 0038, we object to
Explainer
What is SOCMINT? Social media intelligence (SOCMINT) refers to the techniques and technologies that allow companies or governments to monitor social media networking sites (SNSs), such as Facebook or Twitter. SOCMINT includes monitoring of content, such as messages or images posted, and other data
Advocacy
Privacy International's response to the inquiry by the House of Lords Select Committee on Artificial Intelligence.
Explainer
What is integrated policing? Integrated policing is the collection and centralisation of data used for policing purposes. In the era of ‘big data’, companies – often the same companies offering infrastructures for smart cities – are offering interfaces that allow police easier access to datasets
Case Study

Cities around the world are deploying collecting increasing amounts of data and the public is not part of deciding if and how such systems are deployed.

Smart cities represent a market expected to reach almost $760 billion dollars by 2020. All over the world, deals are signed between local