Search
Content type: Long Read
The fourth edition of PI’s Guide to International Law and Surveillance provides the most hard-hitting past and recent results on international human rights law that reinforce the core human rights principles and standards on surveillance. We hope that it will continue helping researchers, activists, journalists, policymakers, and anyone else working on these issues.The new edition includes, among others, entries on (extra)territorial jurisdiction in surveillance, surveillance of public…
Content type: Advocacy
Privacy International had suggested the Human Rights Committee consider the following recommendations for the UK government:Review and reform the IPA 2016 to ensure its compliance with Article 17 of the ICCPR, including by removing the powers of bulk surveillance;Abandon efforts to undermine the limited safeguards of the IPA 2016 through the proposed Investigatory Powers Amendment Bill;Refrain from taking any measures that undermine or limit the availability of encrypted communications or other…
Content type: Advocacy
Dejusticia, Fundación Karisma, and Privacy International submitted a joint stakeholder report on Colombia to the 44th session of the Universal Periodic Review at the UN Human Rights Council.Our submission raised concerns regarding the protection of the rights to freedom of expression and opinion, to privacy, and to personal data protection; the shutdown of civil society spaces; protection of the right to protest; and protection of the rights of the Venezuelan migrant and refugee population.…
Content type: Report
End-to-end encryption (E2EE) contributes significantly to security and privacy. For that reason, PI has long been in favour of the deployment of robust E2EE.Encryption is a way of securing digital communications using mathematical algorithms that protect the content of a communication while in transmission or storage. It has become essential to our modern digital communications, from personal emails to bank transactions. End-to-end encryption is a form of encryption that is even more private.…
Content type: Examples
The 20 years since the 9/11 attacks have fundamentally changed the way the New York Police Department operates, leading it to use facial recognition software, licence plate readers, and mobile X-ray vans, among other surveillance tools for both detecting and blocking potential terrorist attacks and solving minor crimes. Surveillance drones monitor mass protests, antiterrorism officers interrogate protesters, and the NYPD’s Intelligence Division uses antiterror tactics against gang violence and…
Content type: News & Analysis
As Amnesty International and Forbidden Stories continue to publish crucial information about the potential targets of NSO Group’s spyware, we know this much already: something needs to be done.
But what exactly needs to be done is less obvious. Even though this is not the first time that the world has learned about major abuses by the surveillance industry (indeed, it’s not even the first time this month), it’s difficult to know what needs to change.
So how can the proliferation and use of…
Content type: Examples
While traditional media sought to criminalize the widespread November 2020 protests in Peru following the Congressional ouster of President Vizcarra, witnesses disseminated videos and photographs of police abuse on social networks. In the fear and uncertainty, many myths also circulated. In Peru, citizens have the right to refuse to allow police to check their cellphones unless they have a court order; slowed or absent wireless connections may simply be due to overload; as public officials,…
Content type: Examples
On November 9, 2020, after a year of escalating tensions, Peruvian president Martín Vizcarra was impeached on the grounds of "moral incapacity" by lawmakers threatened by his anti-corruption investigations and the policy reform he led. The street protests that followed all over the country were coordinated via Instagram, Twitter, WhatsApp, and TikTok (#MerinoNoMeRepresenta) by hundreds of newly-created small, decentralised organisations. The march on November 14 is thought to be the largest in…
Content type: Examples
US Customs and Border Protection Data show that the Department of Homeland Security deployed helicopters, airplanes, and drones over 15 cities, including New York City, Buffalo, Dayton OH, and Philadelphia, where demonstrators assembled to protest the killing of George Floyd and collected at least 270 hours of video surveillance footage. That deployment, which sparked a congressional inquiry, was only part of a nationwide operation that repurposed resources usually sent to the US border to find…
Content type: Examples
According to records obtained under a freedom of information request, the San Francisco Police Department used the camera network belonging to downtown Union Square Improvement District to spy on protesters during the end of May and early June 2020. The high-definition cameras, manufactured by Motorola brand Avigilon, can zoom in on a person's face and are linked to a software analysis system. Motorola is expanding its tool lineup to make it easier for police to gain access to private cameras…
Content type: Examples
Over 2020, EFF supported the right to protest without being surveilled by bringing lawsuits, offering protesters legal support, teaching protesters surveillance self-defence, and providing tools for people on the ground to use to determine what equipment their local police departments are using to spy on activists. Via public records requests, EFF discovered that the San Francisco Police Department gained access to over 400 cameras belonging to the Union Square Business Improvement District to…
Content type: Examples
When Dallas police posted on Twitter asking for videos of the protests taking place after George Floyd's killing, a flood of videos and images of K-pop stars were uploaded to its anonymous iWatch Dallas tip-off app. Law enforcement can call on vast numbers of networked cameras - from cars, food and retail chains that are typically willing to share with police, law enforcement agencies' own networks of surveillance and body cameras as well as object and face recognition software, protesters and…
Content type: Examples
Despite having promised in 2016 not to facilitate domestic surveillance, the AI startup Dataminr used its firehose access to Twitter to alert law enforcement to social media posts with the latest whereabouts and actions of demonstrators involved in the protests following the killing of George Floyd. Dataminr's investors include the CIA and, previously, Twitter itself. Twitter's terms of service ban software developers from tracking or monitoring protest events. Some alerts were sourced from…
Content type: Examples
New data emerged in January 2021 to show that the National Guard deployment of more than 43,350 troops during the nationwide demonstrations following the killing of George Floyd was far more extensive than had been realised, and far greater than the 6,200 troops deployed at the Capitol during the forewarned insurrection. At least 20 military surveillance and reconnaissance helicopters flew over protests in Philadelphia, Minneapolis, Atlanta, and Washington DC, raising concerns about the data…
Content type: Examples
Hundreds of emails and documents obtained in response to a freedom of information request by BuzzFeed News show that US federal agents monitored social media for information on planned Black Lives Matter demonstrations in Minneapolis, Washington DC, Los Angeles, and other cities. Researchers and activists (such as EFF) warned that technology-driven surveillance of protesters could set a dangerous precedent and chill assembly and speech, particularly in the case of Black Lives Matter. The…
Content type: Examples
Human rights activists and Democratic members of the US Congress wrote to top law enforcement officials in the Trump administration to demand they cease surveilling Americans engaging in peaceful protests. Trump and others in his administration called those protesting the killing of George Floyd "domestic terrorists" and "anarchists". Recent efforts to surveil Americans have included facial recognition, automated licence plate readers, and Stingrays, as well as spy planes and drones.
https://…
Content type: Examples
During the Black Lives Matter protests of summer 2020, US police took advantage of a lack of regulation and new technologies to expand the scope of people and platforms they monitor; details typically emerge through lawsuits, public records disclosures, and stories released by police department PR as crime prevention successes. A report from the Brennan Center for Justice highlights New York Police Department threats to privacy, freedom of expression, and due process and the use of a predator…
Content type: Explainer
What is social media monitoring?
Social media monitoring refers to the monitoring, gathering and analysis of information shared on social media platforms, such as Facebook, Twitter, Instagram and Reddit.
It may include snooping on content posted to public or private groups or pages. It may also involve “scraping” – grabbing all the data from a social media platform, including content you post and data about your behaviour (such as what you like and share).
Through scraping and other tools…
Content type: Explainer
What are police drones?
Drones are remotely controlled Unmanned Aerial Vehicles (UAVs) of varying sizes.
They usually come equipped with cameras and might be enabled with Facial Recognition Technology.
Drones can be equipped with speakers, surveillance equipment, radar and communications interception tools, such as ‘IMSI catchers’.
How might drones be used during protests?
Camera-enabled drones may be used to remotely monitor and track people’s movements in public spaces, including at…
Content type: Explainer
What do Body Worn Video cameras do?
Body worn video (BWV) cameras can be attached to a police officer’s clothing – often at chest, shoulder or head level – and record video, including sound, from the officer’s perspective.
BWV cameras will probably be visible to you, and when it’s recording, a flashing light should appear on the device.
How might body worn video cameras be used at a protest?
BWV cameras may be used at protests to monitor actions of protestors.
They do not usually…
Content type: Explainer
What is gait recognition technology?
Gait recognition technology (GRT) can analyse the shape of an individual’s body and the unique way in which that body moves when walking or running, which can then be used to identify them.
GRT works in a similar way to facial recognition technology. But the two main differences are:
GRT may be used at a fairly long range (at the time of writing, about 165 feet / 50 metres), unlike FRT which generally requires more close up, detailed facial images…
Content type: Explainer
What is Facial Recognition Technology?Facial recognition technology (FRT) collects and processes data about people’s faces, and can be used to identify people. FRT matches captured images with images stored in existing databases or ‘watchlists’.How might it be used in relation to a protest?FRT may be used to monitor, track and identify people’s faces in public spaces, including at protests. This may be done openly or surreptitiously, without people knowing or consenting.FRT-enabled cameras can…
Content type: Explainer
What is hacking?
Hacking refers to finding vulnerabilities in electronic systems, either to report and repair them, or to exploit them.
Hacking can help to identify and fix security flaws in devices, networks and services that millions of people may use. But it can also be used to access our devices, collect information about us, and manipulate us and our devices in other ways.
Hacking comprises a range of ever-evolving techniques. It can be done remotely, but it can also include physical…
Content type: Explainer
What is an IMSI catcher?
‘IMSI’ stands for ‘international mobile subscriber identity’, a number unique to your SIM card. IMSI catchers are also known as ‘Stingrays’.
An ‘IMSI catcher’ is a device that locates and then tracks all mobile phones that are connected to a phone network in its vicinity, by ‘catching’ the unique IMSI number.
It does this by pretending to be a mobile phone tower, tricking mobile phones nearby to connect to it, enabling it to then intercept the data from that phone…
Content type: News & Analysis
IMSI catchers (or stingrays as they are known in the US) are one of the surveillance technologies that has come to the forefront again in the protests against police brutality and systemic racism that have been sparked by the murder of George Floyd on 25 May 2020.
An International Mobile Subscriber Identity catcher – in short an “IMSI catcher” – is an intrusive piece of technology that can be used to locate and track all mobile phones that are switched on in a certain area. It does so by…
Content type: Long Read
In December 2019, the Information Rights Tribunal issued two disappointing decisions refusing appeals brought by Privacy International (PI) against the UK Information Commissioner.
The appeals related to decisions by the Information Commissioner (IC), who is responsible for the UK’s Freedom of Information regime, concerning responses by the Police and Crime Commissioner for Warwickshire and the Commissioner of Police for the Metropolis (The Metropolitan Police) to PI’s freedom of information…