Search
Content type: Guide step
In your day-to-day life, your smartphone silently captures and stores a digital footprint of your whereabouts by keeping a location history: this history is then used to enhance your mobile experience, such as by aiding in navigation and customizing app experiences according to your location habits.
Yet, it's essential to recognize the potential risks tied to this seemingly innocuous practice. Understanding how your location data is handled becomes vital, as it can impact your privacy in ways…
Content type: Guide step
Many mainstream Internet platforms, such as YouTube and X, often collect extensive user data, track online activities, and employ algorithms to create content recommendations based on individual preferences. For a privacy-conscious user, this is nothing short of a nightmare. Making use of alternative front-ends allows you to access the content you want, while minimising the data collected about you. Essentially, this corresponds to using a different website to access the same content. By using…
Content type: Advocacy
We believe the Government's position of refusing to confirm or deny the existence of the Technical Capability Notice or acknowledge Apple's appeal is untenable and violates principles of transparency and accountability.
Content type: Guide step
The practice of buying and selling email addresses is a common one among digital data brokers. Say you register at an online shop to buy an item from a brand. The shop can then sell your email address to that same brand, so they can advertise to you directly in your email inbox. This is a form of targeted advertising, and we have written about its privacy implications to you as a digital citizen. Online marketing is not the sole reason you should consider concealing your personal email address…
Content type: Guide step
Depending on where in the world you are visiting from, websites may seek consent as one way to justify their collection of data about you. This has become general practice across the web, and the typical way to ask for user consent is via banners that pop up first thing when the webpage loads. Often these banners will make use of design elements and user interfaces aiming to mislead or influence you in giving away consent to collect and process your data - these are called Dark Patterns and are…
Content type: People
George is a Legal Officer at Privacy International. He works on legal advocacy and litigation targeting surveillance, the exploitation of personal data and privacy-damaging practices in the healthcare sector.George was admitted as a solicitor in England and Wales in September 2023. Prior to joining PI, George worked as an associate specialising in data protection at a commercial law firm. George has a Master of Laws (LLM) in international human rights law, a Master of Sciences (MSc) in Business…
Content type: Explainer
Imagine this: a power that secretly orders someone anywhere in the world to abide and the receiver can’t tell anyone, can’t even publicly say if they disagree, and can’t really question the power in open court because the secret order is, well, secret. Oh and that power affects billions of people’s security and their data. And despite being affected, we too can’t question the secret order.In this piece we will outline what’s ridiculous, the absurd, and the downright disturbing about what’s…
Content type: News & Analysis
Edit: 13 March 2025 - You can find more about what happened next on our case pageOn February 21st, Apple disabled their ‘advanced data protection’ service for UK customers. That means no-one in Great Britain can now enable a powerful security safeguard that people who use Apple devices everywhere else on the planet can: user controlled end-to-end encryption of stored data.This is likely in response to a disturbing secret government power. Well, that’s what we think happened. We can’t know for…
Content type: Examples
With the stated aim of improving the security of satellite communication, a multinational partnership of companies involved in space engineering has partnered with the European Space Agency (ESA) to operationalise the Quantum Key Distribution Satellite (QKDSat) owned by Honeywell. The UK Space Agency is supporting the scheme within its larger aim to reduce vulnerability in data transfers.https://www.militaryaerospace.com/communications/article/55243719/honeywell-and-esa-announce-public-private-…
Content type: Examples
Anduril has been awarded a 5 year contract to weave in its Lattice software into the US Space Force's Space Surveillance Network (SSN), which monitors objects in space. The agreement will enable swift data sharing between space sensors, repositories, and personnel, and will allow the quick integration of new partners as needed. https://defensescoop.com/2024/11/21/anduril-space-surveillance-network-upgrade-contract-sdanet/Publication: DefenseScoopWriter: Mikayla Easley
Content type: Examples
The Agreement between the Chief Digital AI Office of the USDOD and Anduril is worth $100 million, and uses the latter's software 'Lattice Mesh' to expand the 'mesh' within the US military ecosystem. Anduril has stated that this will allow the delivery of critical data which will enable real-time generative AI solutions which fit specific military needs. https://defensescoop.com/2024/12/03/anduril-awarded-100m-deal-cdao-scale-edge-data-mesh-capabilities-ota/ Publication…
Content type: Examples
The US Army has chosen to extend its relationship with Palantir for up to four years for use of its 'Vantage' system as its main data platform. The Army Data Platform uses Palantir software to process data and utilises Artificial Intelligence (AI), significantly enhancing surveillance capabilities. Palantir has been the main provider of this Platform since 2018. https://www.defensenews.com/land/2024/12/18/us-army-extends-palantirs-contract-for-its-data-harnessing-platform/ …
Content type: Examples
The contract will run until 2031, and will provide the US Air Force with drones (Unmanned Aerial Vehicles) which can serve multiple purposes, including mimicking enemy drones, data collection, and military strikes. These drones will enable enhanced surveillance by the US military. Firestorm will be using their pre-existing drone technology as well as developing drones with new capabilities. https://defence-blog.com/san-diego-based-firestorm-secures-major-us-air-force-deal/#…
Content type: Examples
DroneAcharya, which has recently merged with drone technology start-up AVPL International, has been awarded a contract worth 1.87m Indian Rupees ($21, 660) by the Indian Ministry of Defence. The agreement involves hardware and training for the piloting of drones. This will enhance the Indian military's surveillance capabilities to use drones for intelligence gathering, reconnaissance, and monitoring. Drone Acharya's share prices rose by 4% after news of the Public-Private Partnership went…
Content type: Video
Links Guest's publications PI's technology, data and elections checklistTransparencia Electoral's reportTransparencia's index on data protection in LatAm electionsR3D's report: Censura electoral Links to content discussed in episodeObama's 2012 targeted social media campaignOur work on Cambridge AnalyticaDeepfake use in electionsOur report with the Carter Center on the Kenyan Presidential electionsListen to our episode about our work in Kenya (Election Observation: Data,…
Content type: Guide step
Depending on where in the world you are visiting from, websites may seek consent as one way to justify their collection of data about you. This has become general practice across the web, and the typical way to ask for user consent is via banners that pop up first thing when the webpage loads. Often these banners will make use of design elements and user interfaces aiming to mislead or influence you in giving away consent to collect and process your data - these are called Dark Patterns and are…
Content type: Press release
Privacy International (PI)FOR IMMEDIATE RELEASEUnited Kingdom goes after Apple's encrypted dataThe United Kingdom has used its investigatory powers to force disclosure of private data held by Apple Inc."The United Kingdom's unprecedented attack on individuals' private data around the globe is disproportionate and unnecessary.""This is a fight the UK should not have picked. The reported details suggest the UK is seeking the ability to access encrypted information Apple users store on iCloud, no…
Content type: Advocacy
Our joint stakeholder report made the following recommendations: Strengthen the implementation of Data Protection Act, 2019 and make clear in law and in relevant guidelines that personal data from the electoral register which has been made accessible is still subject to, and protected, by data protection law, including for onward processing.Ensure that there is an effective legal and regulatory framework in place to guarantee a human rights-based approach in the design and deployment of…
Content type: Advocacy
Our submission made the following recommendations to the Committee regarding the Kenya:Review and amend the proposed digital identity system, the Maisha Numba, to ensure it aligns with Kenya’s national and international human rights obligations in its design and implementation, and adopts legal, policy and technical safeguards to prevent exclusion and marginalisation.Ensure that measures taken to develop digital public infrastructures abide by Kenya’s national and international human rights…
Content type: Advocacy
Privacy International has suggested the Committee consider the following recommendations for the UK government:Address longstanding concerns regarding the use of surveillance mechanisms by the Department for Work and Pensions, including covert practices, by ensuring transparency, accountability, and the protection of individuals’ rights within its fraud prevention initiatives.Recognise and address the risks that the use of AI technologies poses to access to social benefits, including the…
Content type: Advocacy
In Colombia, the government utilises the National System for the Identification of Potential Social Program Beneficiaries, Sisbén (Sistema de Identificación de Potenciales Beneficiarios de Programas Sociales), a classification algorithm that ranks individuals by income level to determine access to social assistance programs. The implementation of this algorithm is problematic, and our submission raises the following issues:Sisbén is exclusionary by design. Its inefficiency in accurately…
Content type: Legal Case Files
In December 2023, Haki na Sheria filed a case titled Haki na Sheria Initiative v Attorney General & 4 others (Petition 196 of 2023) before the High Court of Kenya challenging the constitutionality of the Maisha Namba Digital Identity Ecosystem. This new system aims to digitalise civil and personal registration, utilising a Unique Personal Identification (UPI) and Digital ID, among other features. However, the new ID system still fails to address issues previously identified by PI and…
Content type: Video
Links- Read PI's research- Learn more about Rhizomatica- Learn more about Lũa and his work on Starlink- We'd love to hear from you! Share your thoughts, case studies, or ideas about vertical mergers using our survey- More about X and Starlink's legal trouble in Brazil- Our podcast about competition with Dr Deni Mantzari
Content type: Advocacy
We responded to the Home Office consultation on codes of practices under the Investigatory Powers (Amendment) Act 2024 (IPAA). Our response focused on (1) the draft codes relating to bulk personal datasets with low or no reasonable expection of privacy, (2) third-party bulk personal datasets and (3) the notices regime. You can download our full response with its 23 recommendations for reform at the bottom of this page.'Low Privacy' Bulk Personal DatasetsThe IPAA introduces a new concept of…
Content type: Key Resources
Content type: News & Analysis
Together 12 organisations, including trade unions and NGOs across the EU and the UK, are asking Deliveroo, Uber, and Just Eat Takeaway to take serious steps to significantly improve the transparency and explainability around the algorithms they use to manage their workforce.These platforms rely heavily on the use of algorithms to manage many aspect of their workers employment, from account creation, to account suspension to how much workers get paid. Yet, it’s almost impossible for workers to…
Content type: Advocacy
Algorithmic management of workers has become the norm for gig-economy platforms, with workers obligated to give up an immense amount of personal data just to go to work. Decisions made by these algorithms can determine how much individuals are paid and even whether their employment or accounts are suspended or terminated. Yet, workers are often not provided with satisfactory explanations as to how these decisions are made. This lack of transparency means that decisions made through the "black-…
Content type: People
Serhat is a Legal Officer at Privacy International. His work primarily relates to countering authoritarianism and surveillance at borders, the militarization of technology, and authoritarian technologies. Serhat is admitted as an attorney in Turkey. Prior to joining Privacy International, Serhat worked in the fields of international humanitarian and human rights law with the International Committee of the Red Cross. His work mainly related to international humanitarian law, advocacy, and…
Content type: Long Read
Intrusive surveillance technology is increasingly used during protests around the world, and we’ve been tracking its use around the world for years.This technology is often being deployed in secret, without a clear legal basis and without the safeguards and oversight applied to other surveillance technologies under international human rights law.We’ve increasingly observed the use of unlawfully generated and collected data from these technologies being used in court against people exercising…