Search
Content type: Long Read
Imagine that every time you want to attend a march, religious event, political meeting, protest, or public rally, you must share deeply personal information with police and intelligence agencies, even when they have no reason to suspect you of wrongdoing.
First, you need to go to the police to register; have your photo taken for a biometric database; share the contacts of your family, friends, and colleagues; disclose your finances, health records, lifestyle choices, relationship status, and…
Content type: Report
This report presents a detailed analysis of the international trade in surveillance technology. Its’ primary concern is the ow of sophisticated computer-based technology from developed countries to developing countries – and particularly to non-democratic regimes. It is in this environment where surveillance technologies become technologies of political control.
Surveillance technologies can be de ned as technologies which can monitor, track and assess the movements, activities and…