Search
Content type: Long Read
9th December 2022
The defense and protection of the environment continues to come at a high cost for activists and human rights defenders. In 2021, the murders of environment and land defenders hit a record high. This year, a report by Global Witness found that more than 1,700 environmental activists have been murdered in the past decade.
While the issue of surveillance of human rights defenders has received attention, evidence of the surveillance of environmental activists keeps mounting, with recent examples…
Content type: News & Analysis
22nd July 2022
The relationship between privacy and access to abortion care
In 1973, in the state of Texas, it was a criminal offence to “procure or attempt” an abortion except if the purpose was “saving the life of the mother.” This law was enacted in 1854 by the Texas state legislature, and was part of a wave of provisions criminalising access to abortion care that was gaining ground across the U.S in the mid-1800s. It is worth highlighting that these laws were being passed at a time when women in the U.S…
Content type: Video
10th June 2022
Links
A resource for teachers we've been working with Ina on (consultation draft at the moment so please get in touch if you have thoughts!)
More about critical data literacy
The database of resources for teaching about big data and algorithmic systems Ina mentioned
PI's guides to help you and your loved ones protect yourselves online
Content type: Video
26th May 2022
In this video we introduce ourselves and explain why we wanted to create the “Teaching about Data” resource and what our goals for the resource are.
Content type: Report
5th May 2022
This briefing takes a look at the private intelligence industry, a collection of private detectives, corporate intel firms, and PR agencies working for clients around the world that have made London their hub.
Often staffed by ex-spooks, and promising complete secrecy, little is known about them. But reports over the years have exposed their operations, including things like hacking and targeting of anti-corruption officials, spying on peaceful environment activists, and running fake '…
Content type: Explainer
27th April 2022
The ‘Guide to Digital Safety and Privacy at Peaceful Protests’ has been produced by 7amleh - The Arab Center for the Advancement of Social Media.
7amleh has adapted the content of PI's UK Free to Protest guide to fit the Palestinian context. The guide is organized in three sub-guides: (1) a guide to digital safety and privacy at peaceful protests; (2) a guide to surveillance of protesters’ faces and bodies; and (3) a guide to policing databases and predictive policing tools.
This guide was…
Content type: Explainer
31st March 2022
Bluetooth
The majority of apps settled on using Bluetooth for proximity tracing.
Just what is Bluetooth?
Named after the 10th Century King Harald "Bluetooth" Gormsson who unified Scandinavia — and whose runic initials comprise the logo — Bluetooth is a wireless, low-power, and therefore short-distance, set of protocols used primarily to connect devices directly to each other in order to transfer data, such as video and audio.
Bluetooth for tracking?
Most of us who've encountered Bluetooth use…
Content type: Explainer
9th February 2022
Introduction/Background
Electronic tags have been a key part of criminal justice offender management for over 20 years, being used in the United States since the mid 1980’s and in the UK and some other commonwealth countries since 2003. In 2021 the UK introduced GPS tagging for immigration bail.
The tag is predominantly used to curtail the liberties of individuals. For those on criminal bail its intended use includes managing return into communities while deterring reoffending.
As we explore…
Content type: Report
31st January 2022
First published in 2017, “PI’s Guide to International Law and Surveillance” is an attempt to collate relevant excerpts from these judgments and reports into a single principled guide that will be regularly updated. This is the third edition of the Guide. It has been updated it to reflect the most relevant legal developments until December 2021.
Despite its name, the Guide isn’t just aimed at lawyers. It aspires to be a handy reference tool for anyone engaging in campaigning, advocacy, and…
Content type: Video
17th December 2021
Watch Part 1 of our videos on How to use the Data Interception Environment (DIE). It goes through downloading the DIE from PI's GitHub, setting up a virtual phone, and changing network settings to allow data to be intercepted.
Watch Part 2 of our videos on How to use the DIE. It goes through fixing the certificates for the virtual phone, and how to start using the DIE to view and analyse data being sent from the phone.
PI has made this tool available to assist individuals, researchers and…
Content type: Explainer
29th October 2021
With more and more connected devices around us, the chance that you've been hit by an update notification is high. But what do these software updates do? How do they actually work, and why are they important?
Hardware and Software
Modern electronic devices require two main parts to function: the hardware and the software. The hardware usually refers to physical electronic pieces inside a device (usually a collection of microchips, logic gates and specialised processing chips, such as those to…
Content type: Long Read
26th October 2021
Governments around the world are increasingly making registration in national digital ID systems mandatory for populations, justifying its need on a range of issues from facilitating access to services, to national security and fighting against corruption. This is an attempt to create a "foundational identity" for an individual, or "a single source of truth" about who someone is, according to a government agency. These identity systems are run by governments, sometimes by private companies, or…
Content type: News & Analysis
16th August 2021
Our relationship with ‘public space’ is being redefined, not just by a global pandemic, but also by a new era of biometric surveillance technologies. Biometric mass surveillance enables companies and authorities to track us based on unique personal data and identify us whenever, wherever we go.
The increasing use of facial recognition and other biometric surveillance technologies – on our streets, in train stations, at protests, at sports matches and even in our global ‘town square’, Facebook…
Content type: News & Analysis
27th July 2021
As Amnesty International and Forbidden Stories continue to publish crucial information about the potential targets of NSO Group’s spyware, we know this much already: something needs to be done.
But what exactly needs to be done is less obvious. Even though this is not the first time that the world has learned about major abuses by the surveillance industry (indeed, it’s not even the first time this month), it’s difficult to know what needs to change.
So how can the proliferation and use of…
Content type: News & Analysis
26th July 2021
A new industry is offering border agencies around the world access to advanced space-based surveillance capabilities once reserved for the most advanced intelligence agencies. Using satellites able to track signals from satellite phones and other emitters, these companies are then selling access to the data obtained to anyone willing to pay, including UK and EU border agencies.
While such surveillance can and is being used to save lives, it can also be used for illegal ‘pull backs’ in the…
Content type: Explainer
21st July 2021
An array of digital technologies are being deployed in the context of border enforcement. Satellite and aerial surveillance are part of the surveillance toolkit and yet, they are also used by organisations seeking to hold government actions to account and improve efficacy of their own work. To effectively critique state use and delve into potential benefits of satellite and aerial surveillance, we must first understand it.
In this explainer we dig into a technology which many are aware of for…
Content type: Explainer
29th June 2021
‘Free to Protest: The protestor’s guide to police surveillance and how to avoid it’ (UK edition) is a collection of bite-sized guides about high-tech police surveillance capabilities at protests, including tips and strategies about how you can protect yourself from being identified, tracked and monitored. Each guide is self-contained so you don’t need to read the whole thing, or read it any particular order. You can access each separate section of the guide from the campaign homepage, but if…
Content type: Examples
17th June 2021
After developing software that automatically recognises cookie banners that do not comply with the GDPR (usually because they do not provide a clear one-click option to reject all non-essential cookies), noyb has sent over 500 complaints to companies they consider non-compliant and given them a one-month grace period to change their practices. Along with the complaints, noyb provides a step-by-step guide on how to comply. They intend on generating over 10,000 complaints in this way in the…
Content type: Examples
17th June 2021
The Irish Council for Civil Liberties (ICCL) has filed a lawsuit in Hamburg against three AdTech industry trade bodies including the Interactive Avertising Bureau (IAB). Members of the IAB include big tech companies (Google, Facebook, Amazon, Twitter...), data brokers (Equifax, Experian, Acxiom...) and advertising agencies (Groupm, Publicis, IPG...).
The lawsuit follows the filing in 2018 of complaints with the Irish Data Protection Commission (DPC) and UK Information Commissioner (ICO), which…
Content type: Examples
17th June 2021
While traditional media sought to criminalize the widespread November 2020 protests in Peru following the Congressional ouster of President Vizcarra, witnesses disseminated videos and photographs of police abuse on social networks. In the fear and uncertainty, many myths also circulated. In Peru, citizens have the right to refuse to allow police to check their cellphones unless they have a court order; slowed or absent wireless connections may simply be due to overload; as public officials,…
Content type: Examples
17th June 2021
In December 2020 Myanmar authorities began rolling out its $1.2 million "Safe City" system of 335 Huawei AI-equipped surveillance cameras in eight townships in the capital, Naypyidaw. The system, whose purpose was originally presented by the Myanmar government as fighting crime, automatically scans faces and vehicle licence plates in public places and alerts authorities to the presence of those on a wanted list. The Safe City plan calls for installing similar systems in Mandalay by mid-2021 and…
Content type: Examples
17th June 2021
Hundreds of pages of Myanmar government budgets for the last two fiscal years obtained by the New York Times show that the Myanmar military who staged a coup in February 2021 had new and sophisticated tools at their disposal: Israeli-made, military-grade surveillance drones, European iPhone cracking devices, and US software that can hack into computers and extract their contents. Purchases of sensitive dual-use cybersecurity and defence technology continued during the five years in which the…