Search Taxonomy Terms

Content Creators Working for the Algorithm

Creators who produce content for big online platforms, from video game livestreamers on Twitch to adult content producers on platforms like OnlyFans, often find themselves forced to share a lot of data, putting their privacy and security at risk while being given limited information as to how this data is being used.

Free to Protest

We all need to understand the range of surveillance tools that police forces around the world can use to monitor and identify you if you attend a protest, and how you can better protect yourself from protest surveillance. Our partners and us have devised guides to educate people on the surveillance capacities police forces across the globe can use.

No Body’s Business But Mine

People all over the world share with menstruation apps their deeply intimate data - the date of their last periods, dates and details pertaining to their sex lives, their moods, their health. This data is being ruthlessly exploited and shared with third parties to target and profile people. 

UK Law Enforcement Data Service (LEDS): the new police mega-database

The Home Office is currently developing a UK-wide police 'super-database' containing a vast amount of data, which mixes both evidential and intelligence material. Here is why PI is concerned about LEDS and what we are doing about it.

Unmasking Policing, Inc.

Governments are secretly collaborating with private companies. Here is why PI is concerned about surveillance outsourcing, and why together we urgently must expose them.

Advertisers on Facebook: who the heck are you and how did you get my data?

Investigating brands using Facebook for advertising, exposing how difficult it is to understand how our data's used and demanding Facebook make it easier to exercise our rights

Privacy shouldn't be a luxury

Buying a brand new low-cost phone can leave you with an outdated operating system and exploitative apps.

Police unlocking your data in the cloud

Our data stored in the cloud is increasingly sought after by law enforcement agencies. Increasingly, it is obtained using ‘cloud extraction technologies’.

Scrutinising the global counter-terrorism agenda

Increasingly counter-terrorism strategies and policies are decided at the international level, most notably by the UN Security Council, and are used to erode human rights, with no accountability.

IoT in Court

Exploiting new technologies that are in our homes and on our bodies as part of criminal investigations and for use as evidence, raises new challenges and risks that have not been sufficiently explored.