Search
Content type: Report
End-to-end encryption (E2EE) contributes significantly to security and privacy. For that reason, PI has long been in favour of the deployment of robust E2EE.Encryption is a way of securing digital communications using mathematical algorithms that protect the content of a communication while in transmission or storage. It has become essential to our modern digital communications, from personal emails to bank transactions. End-to-end encryption is a form of encryption that is even more private.…
Content type: Advocacy
Despite repeated recommendations by the UN Human Rights Council and the UN General Assembly to review, amend or enact national laws to ensure respect and protection of the right to privacy, national laws are often inadequate and do not regulate, limit or prohibit surveillance powers of government agencies as well as data exploitative practices of companies.
Even when laws are in place, they are seldom enforced. In fact PI notes how it is often only following legal challenges in national or…
Content type: Explainer
La guía "Manifestaciones Libres" es un documento que ofrece una serie de propuestas sobre cómo las personas que se manifiestan de forma pacífica deben protegerse durante un evento público. Encontrarás en esta guía descripciones de las herramientas de vigilancia a disposición de las autoridades durante protestas sociales, y cómo puedes protegerte de las mismas.
Puedes descargar la guía desde esta página, de la sección más abajo titulada "Attachments."
This guide was originally…
Content type: Explainer
La ‘Guía para protegerte digiralmente durante una protesta' es un documento enfocado en Colombia que recopila información básica sobre las capacidades de vigilancia que posee la policía colombiana, y mejores prácticas para evitarla. Encontrarás en esta guía definiciones, explicaciones y recomendaciones sobre la vigilancia a los dispositivos tecnológicos, las comunicaciones, la identidad y las redes sociales de las personas que protestan.
Puedes descargar la guía desde esta página, de la…
Content type: Explainer
The ‘Guide to Digital Safety and Privacy at Peaceful Protests’ has been produced by 7amleh - The Arab Center for the Advancement of Social Media.
7amleh has adapted the content of PI's UK Free to Protest guide to fit the Palestinian context. The guide is organized in three sub-guides: (1) a guide to digital safety and privacy at peaceful protests; (2) a guide to surveillance of protesters’ faces and bodies; and (3) a guide to policing databases and predictive policing tools.
This guide was…
Content type: Explainer
Introduction/Background
Electronic tags have been a key part of criminal justice offender management for over 20 years, being used in the United States since the mid 1980’s and in the UK and some other commonwealth countries since 2003. In 2021 the UK introduced GPS tagging for immigration bail.
The tag is predominantly used to curtail the liberties of individuals. For those on criminal bail its intended use includes managing return into communities while deterring reoffending.
As we explore…
Content type: Guide step
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Telegram for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they can obtain, no transparency and no clear, accessible or effective legal safeguards to protect your…
Content type: Guide step
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Facebook for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they can obtain, no transparency and no clear, accessible or effective legal safeguards to protect your…
Content type: Guide step
Your Uber app stores a lot of information in the cloud. Here we show you how you can get access to it.
It's important to understand how much of your data is stored in the cloud. Why? Because our research exposes that law enforcement can use cloud extraction techniques to obtain vast quantities of your data. These techniques means law enforcement can circumvent asking companies like Uber for your data and avoid getting a warrant. So the use of this technology means there is no limit on what they…