Search
Content type: Examples
Ohio teenager Aaron Ogletree has won a lawsuit he filed against Cleveland State University after he was required to pan a webcam around his bedroom to eliminate possible cheating before taking a remote exam.
The court agreed that Ogletree's Fourth Amendment rights were violated by the scanning requirement, which briefly exposed tax documents and medications. The university has filed an appeal and in the meantime has told students that they will not be permitted to take remotely proctored…
Content type: Examples
US parents have reported receiving an explicit and deliberately shocking image after hackers attacked the primary school learning app Seesaw. Seesaw has 10 million users, who include teachers, students, and family members. The company said the hackers had not gained administrative access, but had accessed individual accounts via compromised email addresses and passwords that had been reused across services.
https://www.bbc.co.uk/news/technology-62914010
Writer: BBC
Publication: BBC
Content type: Examples
At least 37 US colleges and universities, as well as numerous school district, have repurposed Social Sentinel (recently renamed Navigate360 Detect) to help campus police surveil student protests. The software is marketed as a safety tool that can scan students' social media posts and university email accounts to identify those who are at risk of harming themselves or others; adoption in schools has been fuelled by shootings. For public colleges, this use of the software creates a conflict…
Content type: Examples
The 32-year-old Americans with Disabilities Act is failing to protect neurodivergent students from school monitoring and risk assessment software that treats any divergence from stereotypically "normal" behaviour as a harm to both the students themselves and others. Remote proctoring software penalises those who need psychological help, flag "suspicious" movements such as looking away from the screen during a test, and makes no provision for disabled students' special needs. These problems are…
Content type: Examples
In a 2010 case, the Lower Merion school district in suburban Philadelphia school district agreed to pay $610,000 to settle two lawsuits brought by students who had discovered that the webcams attached to their school-issued laptops had secretly taken hundreds of photographs of them in their homes along with hundreds of screen shots. In one of the cases, a teenaged boy was accused of popping pills; in fact, he was eating jelly beans.
https://www.wired.com/2010/10/webcam-spy-settlement/
Writer…
Content type: Examples
Even though schools are back in session in person, their teachers can still monitor the screens on their school-issued devices via software such as GoGuardian. In a new report from the Center for Democracy and Technology, 89% of teachers say their schools will continue to use student-monitoring software, up from 84% in 2021, raising worries about how the data will be used in a climate increasingly hostile towards abortion and LGBTQ+ issues.
CDT also reports that 44% of teachers say that at…
Content type: Examples
A new report from the education news site The 74 Million finds that in-school digital surveillance programs are flagging LGBTQ+ content as "pornographic". For example, Gaggle, comprehensive monitoring software implemented in the Minneapolis public school system, has led administrators to notify parents that their children's submissions have been flagged, without context, for mentioning suicide, gay, and lesbian. Democratic senators Elizabeth Warren (D-MA), Ed Markey (D-MA), and Richard…
Content type: Examples
Following the US Supreme Court's Dobbs decision that paved the way for states to enact legislation criminalising abortion, health advocates warn that the surveillance software schools use to algorithmically monitor students' messages and search terms could be weaponised against teens looking for reproductive health care. These systems can automatically alert school administrators, parents, or police when they detect "dangerous behaviour", which may include anything from imminent suicide…
Content type: Examples
The Welsh Local Government Association is collaborating with the Centre for Digital Public Services on an 8-to-12-week discovery project to help local authorities to understand schools' requirements for information management systems and understand the market offerings in order to formulate a needs-based procurement specification. The project is intended to produce a shared set of core requirements and will look at user need for establishing one or more core datasets, individual schools'…
Content type: Examples
During a remotely proctored online exam, a number of students on the Bar Professional Training Course urinated in bottles and buckets and wore adult diapers rather than risk the possibility that their exam would be terminated if they left their screens long enough to go to the toilet. The Bar Standards Board responded to the story by saying that students are warned in advance that they will not be able to leave the room during an online exam and that they should take the exam in a test centre…
Content type: Examples
In September 2022, the UK Department for Education announced that under a £270,000 contract with Suffolk-based Wonde Ltd it would collect data on children's school attendance and potentially share it with other government departments and third parties as part of its drive to raise attendance. A visualisation tool will create an interactive national attendance dashboard to run alongside the publication of fortnightly attendance data that the DfE says will provide "ongoing transparency". LSE…
Content type: Examples
Intel, in partnership with the software company Classroom Technologies, has developed an AI facial analysis system ("Class") by training an algorithmic model based on labels psychologists applied to the emotions they could detect in videos of students in real-life classrooms. The software is intended to help teachers get feedback from students in online classrooms and warn if the students are bored or confused; critics worry the system could threaten student privacy and damage teacher-student…
Content type: Examples
Despite having opened their borders to and taking in millions of fleeing Venezuelan migrants, the Colombian government’s handling process for this population tells a story of discrimination rather than inclusion.
The 2021 issuance of the Temporary Statute for Venezuelan Migrants came with a legal framework laying out the benefits for incoming Venezuelans, but also outlined how a multibiometric system would be used for identification of this specific migrant group.
This system allows for…
Content type: Examples
In December 2019, a Brazilian public security programme, called the Integrated Border Operations Center (CIOF) was presented. The CIOF aims to combat transnational organised crime in the region of Foz do Iguaçu and the Triple Border Area1, shared by Argentina, Brazil, and Paraguy, and integrate different public security agents through a centralised system.
It has been reported that CIOF is part of a wider digital security apparatus being deployed in the Triple Border Area, that there is…
Content type: Examples
A vulnerability in the Bono Familiar Universal, the platform used to distribute the financial subsidy provided to households in precarious economic situation by the Peruvian government in response to the Covid-19 pandemic, enabled the subsidy to be accessed by malicious individuals.
The vulnerability was reported by Deep Security, and it was resolved but an undetermined number of malicious individuals were able to pose as beneficiaries to access the platform and collect the subsidy themselves…
Content type: Examples
The Burkina Faso government cut off internet access across the country following protests demanding the resignation of president Roch Marc Christian Kabore. Insurgents have attacked military positions as well as gold-mining operations. A government statement said the outage was extended under a legal provision relating to national defence and public security.
https://www.bloomberg.com/news/articles/2021-11-25/burkina-faso-extends-internet-shutdown-before-nov-27-protests?sref=Hjm5biAW Internet…
Content type: Examples
On January 5, 2022 the Kazakhstan government shut down the internet nationwide in response to widespread civil unrest after the government's removal of a price cap led liquid natural gas prices to rise sharply. Government use of a kill switch to block internet access is rising as a way of suppressing dissent and exercising social control; other examples include Iran, Sudan, Egypt, China, and Uganda. Kazakh law permits the government to temporarily suspend communications networks; much of the…
Content type: Examples
On December 25, 2021, Sudanese security forces shot and killed four pro-democracy protesters and wounded hundreds of others who, among tens of thousands of people, defied a security lockdown and telecommunications network shutdowns to demonstrate against military rule, AFP News reports. Security forces installed new CCTV cameras on major thoroughfares in advance of the protests, which demanded a transition to a civilian government. Activists have also condemned sexual attacks on women and girls…
Content type: Examples
Following a complaint from the Association for Civil Rights in Israel, the country's attorney general has said the Shin Bet security agency's use of mobile phone tracking technology to monitor and threaten Palestinian protesters at Jerusalem's Al Aqsa Mosque in May 2021 was a legitimate security tool, Josef Federman reports at ABC News. Shin Bet sent a text message to both Palestinian residents of east Jerusalem and Palestinian citizens of Israel who were determined to be in the area of the…
Content type: Examples
Just as China uses technology system called "Integrated Joint Operations Platform" to control and surveil the persecuted population of Uighurs while restricting their movement and branding dissent as "terrorism", the Israeli military is using facial recognition and a massive database of personal information to control millions of Palestinians in the occupied West Bank. In November 2021, NSO Group's Pegasus spyware was found on the phones of six Palestinian human rights activists, three of whom…
Content type: Examples
The Israeli minister of public security has joined police in denying claims in an article in Calcalist that the country's police force have used NSO Group's Pegasus software to spy on the phones of people who led protests against former premier Benjamin Netanyahu. Calcalist reported that the surveillance was carried out without court supervision or oversight of how the data was used. The daily Haaretz newspaper also reported that it had seen a 2013 invoice in which NSO billed police @@2.7…
Content type: Examples
Ukraine and Russia are both weaponising facial recognition - but Russia is using it to hunt down anti-war protesters, holding and sometimes torturing anyone who refuses to be photographed, while Ukraine is using software donated by Clearview AI to help find Russian infiltrators at checkpoints, identify the dead and reunite families. Russia's widespread surveillance means that activists can be followed and arrested anywhere. In an approved, peaceful anti-government rally in Moscow in 2019,…
Content type: Examples
Footage captured by Bloomberg shows that police are arresting anti-war protesters in Russia and scrolling through their phones.
https://www.bloomberg.com/news/videos/2022-03-07/russian-police-search-protesters-phones-make-arrests-video
Writer: Kommersant
Publication: Bloomberg TV
Publication date: 2022-03-07
Content type: Examples
Based on a draft methodology from Russia's Emergency Situations Ministry, Kommersant business daily reports that Rostec's data subsidiary, Natsionalny Tsentr Informatizatsii, is developing software that will use machine learning to detect and prevent mass unrest. The software will analyse news reports, social media postings, public transport data, and video surveillance footage; if it fails to prevent mass unrest it is expected to direct the crowd's movements to stop it from escalating. The…
Content type: Examples
The Kommersant reports that Russia's Rostec State Corporation is developing a new AI-powered anti-riot surveillance system that uses biometrics-powered cameras and can search social media networks and other publicly accessible data and intends to deploy the new system by the end of 2022. The behaviou analysis software is being developed as part of the Safe City project under the aegis of the Ministry of Emergency Situations, which intends to spend 97 billion rubles ($1.3 billion) deploying Safe…
Content type: Examples
The energy company Cuadrilla used Facebook to surveil anti-fracking protesters in Blackpool and forwarded the gathered intelligence to Lancashire Police, which arrested more than 450 protesters at Cuadrilla's Preston New Road site over a period of three years in a policing operation that cost more than £12 million. Legal experts have called the relationship between fracking companies and the police "increasingly unhealthy" and called on the ICO and the Independent Office for Police Conduct to…
Content type: Examples
Environmental campaigners wrote to Scottish first minister Nicola Sturgeon asking her to intervene to ensure the right to protest was upheld during COP26, when as many as 10,000 police officers from all over the UK were deployed per day on the streets of Glasgow. The letter said the police were reportedly filming campaigners, eavesdropping on conversations, unlawfully demanding personal details, and in one case followed a group to where they were staying even though no protest was in progress.…
Content type: Examples
Emails obtained by EFF show that the Los Angeles Police Department contacted Amazon Ring owners specifically asking for footage of protests against racist police violence that took place across the US in the summer of 2020. LAPD signed a formal partnership with Ring and its associated "Neighbors" app in May 2019. Requests for Ring footage typically include the name of the detective, a description of the incident under investigation, and a time period. If enough people in a neighbourhood…
Content type: Examples
Since the May 2020 murder of George Floyd, Minnesota law enforcement agencies have carried out a secretive, long-running surveillance programme targeting journalists and civil rights activists known as Operation Safety Net, a complex surveillance engine that has expanded to include collecting detailed facial images, scouring social media, and tracking mobile phones. Documents obtained via public records requests show that the police continued using the powers granted under OSN to monitor…
Content type: Examples
After the January 6 insurrection at the US Capitol, the Department of Homeland Security expanded its monitoring of online activity and set up a new intelligence branch to counter domestic terrorism, including tracking platforms that have been linked to threats and “narratives known to provoke violence”. The agency warned law enforcement partners when appropriate when it saw upticks in activity on platforms linked to white supremacists and neo-Nazis. The Brennan Center for Justice warns in a new…