Search
Content type: Video
Links
More about Gillian Tully
Original Phone Extraction podcast
GPS tag complaint: Challenge to systemic quality failures of GPS tags submitted to Forensic Science Regulator
Why Forensics Matter: Immigration officers and the quality of evidence in the UK
Push This Button For Evidence: Digital Forensics
Police Linked to Hacking Campaign to Frame Indian Activists
Unpacking the evidence elasticity of digital traces
Forensic science and the criminal justice system: a blueprint for change…
Content type: Press release
The decision by the EU’s oversight body follows a year-long inquiry prompted by complaints outlining how EU bodies and agencies are cooperating with governments around the world to increase their surveillance powers filed by Privacy International, Access Now, the Border Violence Monitoring Network, Homo Digitalis, International Federation for Human Rights (FIDH), and Sea-Watch.
The complainants welcome the decision by the European Ombudsman and call on the Commission to urgently review its…
Content type: News & Analysis
In a judgment of 14 October 2022, the UK High Court ordered the UK Home Office to provide remedy to the thousands of migrants affected by its unlawful policy and practice of seizing mobile phones from people arriving by small boats to UK shores.
The availability and spread of new technologies, and the exponential amounts of data they generate, are regularly being abused by governments to surveil and control people - but these new forms of surveillance are only starting to make their way through…
Content type: Advocacy
Privacy International (PI) welcomes the call of the Special Rapporteur on the human rights of migrants to assess the human rights impact of current and newly established border management measures with the aim of identifying effective ways to prevent human rights violations at international borders, both on land and at sea.
The issues highlighted in the call for submissions are ones that PI has been investigating, reporting and monitoring as part of our campaigns demanding a human rights…
Content type: Examples
Following a complaint from the Association for Civil Rights in Israel, the country's attorney general has said the Shin Bet security agency's use of mobile phone tracking technology to monitor and threaten Palestinian protesters at Jerusalem's Al Aqsa Mosque in May 2021 was a legitimate security tool, Josef Federman reports at ABC News. Shin Bet sent a text message to both Palestinian residents of east Jerusalem and Palestinian citizens of Israel who were determined to be in the area of the…
Content type: Examples
Ukraine and Russia are both weaponising facial recognition - but Russia is using it to hunt down anti-war protesters, holding and sometimes torturing anyone who refuses to be photographed, while Ukraine is using software donated by Clearview AI to help find Russian infiltrators at checkpoints, identify the dead and reunite families. Russia's widespread surveillance means that activists can be followed and arrested anywhere. In an approved, peaceful anti-government rally in Moscow in 2019,…
Content type: Advocacy
Despite repeated recommendations by the UN Human Rights Council and the UN General Assembly to review, amend or enact national laws to ensure respect and protection of the right to privacy, national laws are often inadequate and do not regulate, limit or prohibit surveillance powers of government agencies as well as data exploitative practices of companies.
Even when laws are in place, they are seldom enforced. In fact PI notes how it is often only following legal challenges in national or…
Content type: Press release
Today, the High Court ruled that the Home Secretary acted unlawfully and breached human rights and data protection laws by operating a secret, blanket policy of seizing, retaining and extracting data from the mobile phones of asylum seekers arriving by small boat.
This claim for judicial review was brought by three asylum seeking claimants: HM represented by Gold Jennings, and KA and MH represented by Deighton Pierce Glynn. The Claimants, like thousands of others arriving by small boat, all…
Content type: News & Analysis
Background
Today judgment has been handed down in the landmark case of R (HM and MA and KH) v Secretary of State for the Home Department.
This is a Judicial Review decision concerning the UK Home Office’s secret and blanket policy of seizing mobile phones of all migrants who arrived to the UK by small boat between April 2020 and November 2020, and extracting data from all phones. PI was a third party intervener in the case.
The case revealed that migrants were searched on arrival at Tug Haven…
Content type: Long Read
In a roundtable available on YouTube, co-hosted with Garden Court Chambers, Privacy International brought together immigration law practitioners to discuss how they’ve used privacy and data protection law to seek information or redress for their clients.
Index:
1. UK Border 2025
2. Super-complaint and judicial review challenge to data sharing
3. Mobile phone seizure and extraction
4. Freedom of Information Act requests
The dystopian future: UK Border 2025
To set the scene on how the…
Content type: News & Analysis
Last week, Privacy International intervened in an important and long overdue Judicial Review into the UK Home Office’s secret and blanket policy of seizing mobile phones of all migrants who arrived to the UK by small boat between April 2020 and November 2020.
The case revealed that migrants were searched on arrival at Tug Haven in Dover and compelled to hand over their mobile phones and provide their PIN numbers. During the course of proceedings it came to light that the Home Office had self-…
Content type: Guide step
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Telegram for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they can obtain, no transparency and no clear, accessible or effective legal safeguards to protect your…
Content type: Guide step
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Facebook for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they can obtain, no transparency and no clear, accessible or effective legal safeguards to protect your…
Content type: Guide step
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like WhatsApp for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they can obtain, no transparency and no clear, accessible or effective legal safeguards to protect your…
Content type: Guide step
Your Uber app stores a lot of information in the cloud. Here we show you how you can get access to it.
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Uber for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they…