Search
Content type: Advocacy
PI welcomes the opportunity to engage once again with the mandate by submitting comments, evidence, and recommendations to the UN Special Rapporteur on the right to health, Ms. Tlaleng Mofokeng. We hope that our input will contribute to the forthcoming report, “Digital innovation, technologies and the right to health”.
Technology has contributed significantly to the planning and delivery of health information, services and care. We have seen the use of data and technology across the healthcare…
Content type: Report
In the months following the beginning of the Covid-19 pandemic, more than half the world’s countries enacted emergency measures. With these measures came an increase in executive powers, a suspension of the rule of law, and an upsurge in security protocols – with subsequent impacts on fundamental human rights. Within this broader context, we have seen a rapid and unprecedented scaling up of governments’ use of technologies to enable widespread surveillance. Surveillance technologies exacerbated…
Content type: Long Read
The defense and protection of the environment continues to come at a high cost for activists and human rights defenders. In 2021, the murders of environment and land defenders hit a record high. This year, a report by Global Witness found that more than 1,700 environmental activists have been murdered in the past decade.
While the issue of surveillance of human rights defenders has received attention, evidence of the surveillance of environmental activists keeps mounting, with recent examples…
Content type: Press release
The decision by the EU’s oversight body follows a year-long inquiry prompted by complaints outlining how EU bodies and agencies are cooperating with governments around the world to increase their surveillance powers filed by Privacy International, Access Now, the Border Violence Monitoring Network, Homo Digitalis, International Federation for Human Rights (FIDH), and Sea-Watch.The complainants welcome the decision by the European Ombudsman and call on the Commission to urgently review its…
Content type: Examples
Even though schools are back in session in person, their teachers can still monitor the screens on their school-issued devices via software such as GoGuardian. In a new report from the Center for Democracy and Technology, 89% of teachers say their schools will continue to use student-monitoring software, up from 84% in 2021, raising worries about how the data will be used in a climate increasingly hostile towards abortion and LGBTQ+ issues.
CDT also reports that 44% of teachers say that at…
Content type: Examples
A new report from the education news site The 74 Million finds that in-school digital surveillance programs are flagging LGBTQ+ content as "pornographic". For example, Gaggle, comprehensive monitoring software implemented in the Minneapolis public school system, has led administrators to notify parents that their children's submissions have been flagged, without context, for mentioning suicide, gay, and lesbian. Democratic senators Elizabeth Warren (D-MA), Ed Markey (D-MA), and Richard…
Content type: Advocacy
Today, PI filed a complaint with the Forensic Science Regulator (FSR) in relation to quality and accuracy issues in satellite-enabled Global Positioning System (GPS) tags used for Electronic Monitoring of subjects released from immigration detention (GPS tags). We are concerned there may be systemic failures in relation to the quality of data extracted from tags, processed and interpreted for use in investigations and criminal prosecutions.
The GPS tags are used by the Home Office to…
Content type: Advocacy
Privacy International (PI) welcomes the call of the Special Rapporteur on the human rights of migrants to assess the human rights impact of current and newly established border management measures with the aim of identifying effective ways to prevent human rights violations at international borders, both on land and at sea.
The issues highlighted in the call for submissions are ones that PI has been investigating, reporting and monitoring as part of our campaigns demanding a human rights…
Content type: News & Analysis
In the midst of the atrocious war currently being waged by Russia on Ukraine, on 14 March 2022 Reuters reported that Clearview AI, the infamous online surveillance company, had offered its services to the Ukrainian defense ministry. A day later in an interview for TechCrunch, Ukraine's vice prime minister and minister for Digital Transformation confirmed that the partnership with Clearview AI was "currently in very early development".
Clearview is an online surveillance company that collects…
Content type: Long Read
In a roundtable available on YouTube, co-hosted with Garden Court Chambers, Privacy International brought together immigration law practitioners to discuss how they’ve used privacy and data protection law to seek information or redress for their clients.Index:1. UK Border 20252. Super-complaint and judicial review challenge to data sharing3. Mobile phone seizure and extraction4. Freedom of Information Act requestsThe dystopian future: UK Border 2025To set the scene on how the future may look…
Content type: Advocacy
We wrote to the Home Office as part of our campaign ‘STOP SPYING ON ASYLUM SEEKERS’, opposing the draconian surveillance of asylum seekers taking place through the Aspen Card.
We asked detailed questions about how data collected from Aspen Card usage is used to monitor asylum seekers, and how the Home Office are alerted to any ‘breach of conditions’ of the card.
In their reply, the Home Office told us that:
“The Home Office can be alerted to a breach of conditions by several internal and…
Content type: News & Analysis
In a ruling handed down on 14 October 2021 by the High Court of Kenya in relation to an application filed by Katiba Institute calling for a halt to the rollout of the Huduma card in the absence of a data impact assessment, the Kenyan High Court found that the Data Protection Act applied retrospectively.
Background to the case
Huduma Namba as initially proposed
In January 2019, the Kenyan Statute Law (Miscellaneous Amendment) Act No. 18 of 2018 came into effect, introducing a raft of amendments…
Content type: Case Study
On 3 December 2015, four masked men in plainclothes arrested Isnina Musa Sheikh in broad daylight (at around 1 p.m.) as she served customers at her food kiosk in Mandera town, in the North East of Kenya, Human Rights Watch reported. The men didn’t identify themselves but they were carrying pistols and M16 assault rifles, commonly used by Kenyan defence forces and the cars that took her away had their insignia on the doors. Isnina’s body was discovered three days later in a shallow grave about…
Content type: Case Study
The prohibition against torture is absolute. There are no exceptional circumstances whatsoever which can be used to justify torture.
And yet, torture is still being carried out by state officials around the world, driven by states’ ability to surveil dissidents, and intercept their communications.
In 2007, French technology firm Amesys (a subsidiary of Bull) supplied sophisticated communications surveillance systems to the Libyan intelligence services. The systems allegedly permitted the…
Content type: News & Analysis
On 24 October 2019, the Swedish government submitted a new draft proposal to give its law enforcement broad hacking powers. On 18 November 2019, the Legal Council (“Lagråd”), an advisory body assessing the constitutionality of laws, approved the draft proposal.
Privacy International believes that even where governments conduct hacking in connection with legitimate activities, such as gathering evidence in a criminal investigation, they may struggle to demonstrate that hacking as…
Content type: News & Analysis
*Photo by Michelle Ding on Unsplash
Pat Finucane was killed in Belfast in 1989. As he and his family ate Sunday dinner, loyalist paramilitaries broke in and shot Pat, a high profile solicitor, in front of his wife and children.
The Report of the Patrick Finucane Review in 2012 expressed “significant doubt as to whether Patrick Finucane would have been murdered by the UDA [Ulster Defence Association] had it not been for the different strands of involvement by the…
Content type: Long Read
*Photo by Kristina Flour on Unsplash
The British government needs to provide assurances that MI5’s secret policy does not authorise people to commit serious human rights violations or cover up of such crimes
Privacy International, along Reprieve, the Committee on the Administration of Justice, and the Pat Finucane Centre, is challenging the secret policy of MI5 to authorise or enable its so called “agents” (not MI5 officials) to commit crimes here in the UK.
So far we have discovered…
Content type: Advocacy
In this submission, Privacy International aims to provide the Office of the UN High Commissioner for Human Rights with information on how surveillance technologies are affecting the right to peaceful protests in new and often unregulated ways.
Based on Privacy International’s research, we provide observations, regarding the following:
the relationship between peaceful protests and the right to privacy;
the impact of new surveillance technologies in the context of peaceful protests…
Content type: News & Analysis
Photo: The European Union
“Border Externalisation”, the transfer of border controls to foreign countries, has in the last few years become the main instrument through which the European Union seeks to stop migratory flows to Europe. Similar to the strategy being implemented under Trump’s administration, it relies on utilising modern technology, training, and equipping authorities in third countries to export the border far beyond its shores.
It is enabled by the adoption…
Content type: Examples
A 17-year-old Palestinian resident of Lebanon, Ismail B. Ajjawi, was deported shortly after he arrived at Boston Airport, where he was due to start attending Harvard University the following week.
Immigration officers subjected him to hours of questioning — at one point leaving to search his phone and computer — according to a written statement by Ajjawi. According to the student, his visa was revoked because of content posted by some social media contacts.
The student alleges that…
Content type: Examples
In October 2018, the Singapore-based startup LenddoEFL was one of a group of microfinance startups aimed at the developing world that used non-traditional types of data such as behavioural traits and smartphone habits for credit scoring. Lenddo's algorithm uses numerous data points, including the number of words a person uses in email subject lines, the percentage of photos in a smartphone's library that were taken with a front-facing camera, and whether they regularly use financial apps on…
Content type: Examples
In 2017, US Immigration & Customs Enforcement (ICE) announced that it would seek to use artificial intelligence to automatically evaluate the probability of a prospective immigrant “becoming a positively contributing member of society.” In a letter to acting Department of Homeland Security Secretary Elaine Duke, a group of 54 concerned computer scientists, engineers, mathematicians, and researchers objected to ICE’s proposal and demanded that ICE abandon this approach because it would be…
Content type: News & Analysis
Today, the British Health Secretary Matt Hancock announced a partnership between the NHS and Amazon to use the NHS’s website content as the source for the answer given to medical question, such as “Alexa, how do I treat a migraine?”
While we welcome Amazon’s use of a trusted source of information for medical queries, we are however extremely concerned about the nature and the implications of this partnership. Amazon is a company with a worrying track record when it comes to the way they…
Content type: Advocacy
Refugees are among the most vulnerable people in the world. From the moment they flee their homes, as they pass through 'temporary' places such as refugee camps and detention centres to their 'final' destinations, they are continuously exposed to threats. In the digital age, these threats are increasingly being driven by the processing of vast amounts of highly sensitive personal data: from enrollment and registration processes needed for them to access services, to their identification and…
Content type: Examples
In February 2019 Google engineers announced that they had created faster, more efficient encryption system that could function on less-expensive Android phones that were too low-powered to implement existing full-device encryption. The scheme, known as Adiantum, uses established and well-vetted encryption tools and principles. Android has required smartphones to support encryption since 2015's version 6, but low-end devices were exempt because of the performance hit. It will now be up to device…
Content type: Long Read
Imagine that every time you want to attend a march, religious event, political meeting, protest, or public rally, you must share deeply personal information with police and intelligence agencies, even when they have no reason to suspect you of wrongdoing.
First, you need to go to the police to register; have your photo taken for a biometric database; share the contacts of your family, friends, and colleagues; disclose your finances, health records, lifestyle choices, relationship status, and…
Content type: News & Analysis
Protest movements throughout history have helped to shape the world we know today. From the suffragettes to the civil rights movement, and to contemporary movements such as those focusing on LGBTIQ+ rights, protests have become a vital way for many, who feel powerless otherwise, to have their voices heard.
But now, making the decision to attend a protest comes with consequences that you may very well be unaware of. This is because policing and security services, always hungry in their quest to…
Content type: News & Analysis
According to the International Organization for Migration, an estimated 258 million people are international migrants – that is, someone who changes their country of usual residence, That’s one in every 30 people on earth.
These unprecedented movements levels show no sign of slowing down. It is predicted that by 2050, there will be 450 million migrants across the world.
Nowadays, it is politically acceptable to demonise migrants, and countless leaders have spewed divisive and xenophobic…
Content type: Long Read
(In order to click the hyperlinks in the explainer below, please download the pdf version at the bottom of the page).
Content type: News & Analysis
Planning and participating in peaceful protests against governments or non-state actors’ policies and practices requires the capacity of individuals to communicate confidentially without unlawful interference. From protests in support of LGBTI rights to protests against specific projects that undermine local communities’ wellbeing, these movements would not have been possible without the ability to exchange ideas and develop plans in private spaces.
Unlawful interference with…