Search
Content type: Examples
New versions of drones that currently issue audio warnings reminding people in Elizabeth, New Jersey to observe social distancing guidelines will incorporate sensors and fever-detecting cameras that will monitor if people are sick or failing to social distance on the trails and in the parks of Meriden, Connecticut, according to the commercial drone company Draganfly, which claims the cameras can also detect sneezing and heart and respiratory rates. The company expects to conduct pilot…
Content type: Examples
The Department of Health in the US state of Kansas is tracking residents' locations via a platform called Unacast, which compares aggregated GPS mobile phone data from before and after the implementation of social distancing and grades each county on its compliance. As of April 1, 45 of 105 Kansas counties had received an F rating, and the state as a whole had managed a C. Unacast says the data it has access to is updated every other day and publishes updated ratings on all 50 US states.…
Content type: Examples
The US Centers for Disease Control and Prevention, in conjunction with local and state governments, are using location data collected by the mobile advertising industry from millions of cellphones in order to better understand how Americans are moving during the COVID-19 pandemic and how those movements affect the spread of the disease. The goal is to create a portal that federal, state, and local officials can use to study geolocation from up to 500 US cities and see which retail…
Content type: Examples
As inmates are released from prison in order to mitigate the public health and humanitarian threat posed by the coronavirus poses to a confined population, Minneapolis-based Precision Kiosk Technologies is highlighting its AB Kiosks, which can be used to replace riskier face-to-face meetings with electronic check-ins for newly-released inmates and those on probation, who can use the kiosks to set schedules and trigger reminder texts and emails. The kiosks use fingerprint recognition to verify…
Content type: Examples
The consumer and market trends insight company StatSocial announced Crisis Insights, which it claims tracks rapidly changing consumer audience dynamics to help US brands and CMOs respond effectively to the ongoing coronavirus epidemic and economic slowdown. StatSocial's Silhouette social data platform monitors and analyses more than 1.3 billion social accounts covering more than 70% of US households. Crisis Insights is intended to identify the changing dynamics of customers and consumers who…
Content type: Examples
The whistleblower said they were unable to find any legitimate reason for the high volume of the requests for location information. “There is no other explanation, no other technical reason to do this. Saudi Arabia is weaponising mobile technologies,” the whistleblower claimed.
The data leaked by the whistleblower was also seen by telecommunications and security experts, who confirmed they too believed it was indicative of a surveillance campaign by Saudi Arabia.
The data shows requests for…
Content type: Examples
In a widely circulated animated heat map, the geospatial visualisation company Tectonix GEO in partnership with the location technology company X-Mode used the secondary locations of anonymised mobile devices that were active on a single beach in in Ft Lauderdale, FL during spring break to show how the beach-goers fanned out across the US afterwards, potentially carrying infection with them. Although the visualisation was instructive in showing how contagion spreads, it was unclear whether any…
Content type: Examples
At the MIT Media lab, Ramesh Raskar is leading a team that includes software engineers at companies such as Facebook and Uber to develop the free and open source app Private Kit: Safe Paths. The app is intended to share encrypted information between phones in the network without going through a central authority so that individuals can see if they've come in contact with someone carrying the coronavirus. Anyone who tests positive can choose to share location data with health officials, who can…
Content type: Examples
As governments look into surveillance, geolocation and biometric facial recognition to contain the coronavirus, even if they violate user data privacy, the controversial facial recognition company Clearview AI is allegedly negotiating a partnership with state agencies to monitor infected people and the individuals with whom they have interacted. The data mining company Palantir is already collaborating with the CDC and NIH, while the White House convened a task force of technology companies to…
Content type: Examples
US government agencies are considering a range of tracking and surveillance technologies as part of efforts to control the spread of the novel coronavirus. These include: geolocation tracking and facial recognition systems to analyse photos, both to enable contact tracing. Palantir is working with the Centers for Disease Control and Prevention to model the virus outbreak, and other companies that scrape public social media data have contracts in place with CDC and the National Institutes of…
Content type: Case Study
In 2015, a man in Connecticut was charged with murdering his wife based on evidence from her Fitbit. Richard Dabate, the accused, told the police that a masked assailant came into the couple’s suburban home at around 9am on 23 December 2015, overpowering Dabate then shooting his wife as she returned through the garage.
However, the victim’s fitness tracker told a different story. According to data from the device, which uses a digital pedometer to track the wearer’s steps, Dabate’s wife was…
Content type: Case Study
In early May 2019, it was revealed that a spyware, exploiting a vulnerability in Facebook’s WhatsApp messaging app, had been installed onto Android and iOS phones. The spyware could be used to turn on the camera and mic of the targeted phones and collect emails, messages, and location data. Citizen Lab, the organization that discovered the vulnerability, said that the spyware was being used to target journalists and human rights advocates in different countries around the world. The spyware…
Content type: Examples
A woman was killed by a spear to the chest at her home in Hallandale Beache, Florida, north of Miami, in July. Witness "Alexa" has been called yet another time to give evidence and solve the mystery. The police is hoping that the smart assistance Amazon Echo, known as Alexa, was accidentally activated and recorded key moments of the murder. “It is believed that evidence of crimes, audio recordings capturing the attack on victim Silvia Crespo that occurred in the main bedroom … may be found on…
Content type: Examples
The US Department of Homeland Security awarded a $113 million contract to General Dynamics to carry out the Visa Lifecycle Vetting Initiative (VLVI), a renamed version of the Extreme Vetting Initiative and part of a larger effort called the National Vetting Enterprise. In May 2018, public outrage led the DHS to back away from a machine learning system that would monitor immigrants continuously; however, the reason it gave was that the technology to automate vetting did not yet exist. These…
Content type: Examples
New workplace technologies are generating mountains of data on workers despite a lack of clarity over how the data is used and who owns it. In offices, smart badges track interactions and sensors track fitness and health; in trucks sensors monitor drivers' performance in the name of safety. In the US state of Illinois, between July and October 2017 26 lawsuits were filed by employees alleging that their employers had violated the state's Biometric Information Privacy Act, which requires a…
Content type: Examples
In November 2018, worried American parents wishing to check out prospective babysitters and dissatisfied with criminal background checks began paying $24.99 for a scan from the online service Predictim, which claimed to use "advanced artificial intelligence" to offer an automated risk rating. Predictim based its scores in part on Facebook, Twitter, and Instagram posts - applicants were required to share broad access to their accounts - and offered no explanation of how it reached its risk…
Content type: News & Analysis
Picture Credit: US AID
US President Trump has been cutting aid to Central America, including a surprise cut of approximately $500m in aid to the “Northern Triangle” countries of El Salvador, Guatemala, and Honduras, apparently as punishment for “doing absolutely nothing” to prevent emigration to the US.
What remains of the funds is largely and deliberately being repurposed for spending on the US’s own security interests: indeed, one area which his…
Content type: News & Analysis
Foto: US AID
El presidente estadounidense Trump ha estado recortando la ayuda a Centroamérica, incluyendo un recorte sorpresivo de aproximadamente 500 millones de dólares a los países del “Triángulo del Norte” (El Salvador, Guatemala y Honduras), al parecer como castigo por “no haber hecho absolutamente nada” para impedir la emigración hacia los Estados Unidos.
Los fondos restantes están siendo reorientados,en su gran mayoría y deliberadamente, al gasto para…
Content type: Advocacy
Privacy International has today sent letters to leading social media platforms to ask what they're doing to protect their users' from dangerous surveillance by government immigration authorities.
The letter comes following the implementation of plans by US authorities to require nearly all visa applicants to hand over identifiers of all social media accounts they have used in the previous five years, or face “serious immigration consequences”.
The move not only represents…
Content type: News & Analysis
US Immigration and Customs Enforcement (ICE), the agency at the centre of carrying out President Trump’s “zero tolerance” approach to immigration enforcement and family separation, has for years been contracting a US surveillance company to intercept peoples’ communications across the United States.
The wide potential scope for the use of the powers raises concerns about their use for the real-time surveillance of people, families, and communities caught up in Trump’s immigration…
Content type: Examples
For low-income Americans to receive public benefits they are legally entitled to, they must submit to widespread monitoring of their intimate and personal affairs. This monitoring includes sharing a trove of personal documents and information, unannounced home visits from caseworkers, mandatory face-to-face meetings with caseworkers to review one’s grocery, hygiene, and parenting choices, electronic and physical surveillance, mandatory drug testing, and investigations by fraud control agents…
Content type: Examples
The New York City public benefits system has been criticized for its punitive design, how it too often disciplines, rather than helps, people who are legally entitled to benefits. According to Mariana Chilton, the public benefits system is designed to control, surveil, and penalize low-income people, and it is women of colour who disproportionately bear these burdens. Chilton highlights how the violent treatment of Jazmine Headley and her baby in a public assistance waiting room in December…
Content type: Examples
In the United States, while everyone is surveilled not every is equal when it comes to surveillance. Factors including poverty, race, religion, ethnicity, and immigration status will affect how much you end up being surveilled. This reality has a punitive effect on poor people and their families and places disproportionate burdens on people of minority groups.
https://tcf.org/content/report/disparate-impact-surveillance/?agreed=1
Author: Barton Gellman and Sam Adler-Bell
Publication: The…
Content type: Examples
Virginia Eubanks explains what we can draw from understanding the experience of surveillance of marginalised groups: it is a civil rights issue, technologies carry the bias of those who design them, people are resisting and why we need to move away from the privacy rights discourse.
https://prospect.org/article/want-predict-future-surveillance-ask-poor-communities
Author: Virginia Eubanks
Publication: The American Prospect
Content type: Examples
This article is an overview of some of the research documenting how people in vulnerable positions are the ones most affected by government surveillance.
https://stateofopportunity.michiganradio.org/post/technology-opportunity-researcher-says-surveillance-separate-and-unequal
Author: Kimberly Springer
Publication: State of Opportunity Michigan Radio
Content type: News & Analysis
Federal law enforcement is deploying powerful computer hacking tools to conduct domestic criminal and immigration investigations.
By Alex Betschen, Student Attorney, Civil Liberties & Transparency Clinic, University at Buffalo School of Law
Hacking by the government raises grave privacy concerns, creating surveillance possibilities that were previously the stuff of science fiction. It also poses a security risk, because hacking takes advantage of unpatched vulnerabilities in our…
Content type: Press release
FOR IMMEDIATE RELEASE
December 21, 2018
CONTACTS:
Alex Betschen, Civil Liberties & Transparency Clinic, [email protected], 716–531–6649
Colton Kells, Civil Liberties & Transparency Clinic, [email protected], 585–766–5119
Abdullah Hasan, ACLU, [email protected], 646–905–8879
NEW YORK — Privacy International, the American Civil Liberties Union, and the Civil Liberties & Transparency Clinic of the University at Buffalo School of Law filed a lawsuit today…
Content type: News & Analysis
Photo credit: US Immigration and Customs Enforcement
The trial of Mexican drug lord Joaquin “El Chapo” Guzman started in New York back in November 2018. But last week, the jurors were presented with a trove of new key evidence: dozens of text messages exchanged between Guzman, his wife, and his mistresses.
The reason behind this set of revelations? Guzman had been spying on his wife and mistresses, using publicly-available surveillance software called FlexiSpy. Once installed on his targets…
Content type: Examples
In July 2018, Robert Mueller, the special prosecutor appointed to look into Russian interference in the 2016 US presidential election, charged 12 Russian intelligence officers with hacking Hillary Clinton's campaign and the Democratic National Committee by spearphishing staffers. The charges include conspiracy to commit an offence against the US, aggravated identity theft, conspiracy to launder money, and conspiracy to access computers without authorisation. The hack led to the release of…
Content type: Examples
In September 2018, when Massachusetts state police tweeted a map of responses to fires and explosions during a gas emergency, they inadvertently revealed that they were closely monitoring several activist groups, including a Facebook group for Mass Action Against Police Brutality, the Coalition to Organize and Mobilize Boston Against Trump, Facebook 413, Facebook MA Activism, and Resistance Calendar. The image was taken down and cropped after half an hour, but it spurred journalists to ask…