Search
Content type: Explainer
The Free to Protest Guide Pakistan has been created by adapting Privacy International's (PI) Free to Protest Guide UK according to the laws and policies of Pakistan, in collaboration with PI and local activists in Pakistan.The Guide has been published in English, Urdu, Punjabi and Pashto.DISCLAIMER: This guide forms part of PI's global work to highlight the range of surveillance tools that law enforcement can use in the protest context, and how data protection laws can help guarantee…
Content type: News & Analysis
Our mobile phones contain all kinds of data that ranges from photos, videos and emails to information about our health, the places we visit and our leisure time. This data is often relied upon by law enforcement authorities in criminal investigations.
Mobile phone extraction (MPE) tools are used for this purpose as they enable police and other authorities to download content and associated data from people’s phones. These tools are supplied by private companies to security forces and…
Content type: Press release
In a landmark judgment, handed down today (Monday 30 January 2023), the Investigatory Powers Tribunal have found that there were “very serious failings” at the highest levels of MI5 to comply with privacy safeguards from as early as 2014, and that successive Home Secretaries did not to enquire into or resolve these long-standing rule-breaking despite obvious red flags.
Human rights organisations Liberty and Privacy International, who brought this significant legal case in January 2020, have…
Content type: Report
End-to-end encryption (E2EE) contributes significantly to security and privacy. For that reason, PI has long been in favour of the deployment of robust E2EE.
Encryption is a way of securing digital communications using mathematical algorithms that protect the content of a communication while in transmission or storage. It has become essential to our modern digital communications, from personal emails to bank transactions. End-to-end encryption is a form of encryption that is even more private…
Content type: Advocacy
Despite repeated recommendations by the UN Human Rights Council and the UN General Assembly to review, amend or enact national laws to ensure respect and protection of the right to privacy, national laws are often inadequate and do not regulate, limit or prohibit surveillance powers of government agencies as well as data exploitative practices of companies.
Even when laws are in place, they are seldom enforced. In fact PI notes how it is often only following legal challenges in national or…
Content type: Explainer
La guía "Manifestaciones Libres" es un documento que ofrece una serie de propuestas sobre cómo las personas que se manifiestan de forma pacífica deben protegerse durante un evento público. Encontrarás en esta guía descripciones de las herramientas de vigilancia a disposición de las autoridades durante protestas sociales, y cómo puedes protegerte de las mismas.
Puedes descargar la guía desde esta página, de la sección más abajo titulada "Attachments."
This guide was originally…
Content type: Explainer
La ‘Guía para protegerte digiralmente durante una protesta' es un documento enfocado en Colombia que recopila información básica sobre las capacidades de vigilancia que posee la policía colombiana, y mejores prácticas para evitarla. Encontrarás en esta guía definiciones, explicaciones y recomendaciones sobre la vigilancia a los dispositivos tecnológicos, las comunicaciones, la identidad y las redes sociales de las personas que protestan.
Puedes descargar la guía desde esta página, de la…
Content type: Explainer
The ‘Guide to Digital Safety and Privacy at Peaceful Protests’ has been produced by 7amleh - The Arab Center for the Advancement of Social Media.
7amleh has adapted the content of PI's UK Free to Protest guide to fit the Palestinian context. The guide is organized in three sub-guides: (1) a guide to digital safety and privacy at peaceful protests; (2) a guide to surveillance of protesters’ faces and bodies; and (3) a guide to policing databases and predictive policing tools.
This guide was…
Content type: Explainer
Introduction/Background
Electronic tags have been a key part of criminal justice offender management for over 20 years, being used in the United States since the mid 1980’s and in the UK and some other commonwealth countries since 2003. In 2021 the UK introduced GPS tagging for immigration bail.
The tag is predominantly used to curtail the liberties of individuals. For those on criminal bail its intended use includes managing return into communities while deterring reoffending.
As we explore…
Content type: Report
First published in 2017, “PI’s Guide to International Law and Surveillance” is an attempt to collate relevant excerpts from these judgments and reports into a single principled guide that will be regularly updated. This is the third edition of the Guide. It has been updated it to reflect the most relevant legal developments until December 2021.Despite its name, the Guide isn’t just aimed at lawyers. It aspires to be a handy reference tool for anyone engaging in campaigning, advocacy, and…
Content type: News & Analysis
What if we told you that every photo of you, your family, and your friends posted on your social media or even your blog could be copied and saved indefinitely in a database with billions of images of other people, by a company you've never heard of? And what if we told you that this mass surveillance database was pitched to law enforcement and private companies across the world?
This is more or less the business model and aspiration of Clearview AI, a company that only received worldwide…
Content type: Advocacy
The Office of the Privacy Commissioner of Canada has developed draft privacy guidance for police agencies' use of FRT, with a view to ensuring any use of FRT "complies with the law, minimizes privacy risks, and respects privacy rights". The Commissioner is undergoing consultation in relation to this guidance.
Privacy International and the Canadian Civil Liberties Association ("CCLA") welcome the Commissioner's efforts to strengthen the framework around police use of facial recognition, and the…
Content type: Examples
The 20 years since the 9/11 attacks have fundamentally changed the way the New York Police Department operates, leading it to use facial recognition software, licence plate readers, and mobile X-ray vans, among other surveillance tools for both detecting and blocking potential terrorist attacks and solving minor crimes. Surveillance drones monitor mass protests, antiterrorism officers interrogate protesters, and the NYPD’s Intelligence Division uses antiterror tactics against gang violence and…
Content type: Examples
Clashes between police and lockdown protesters have spawned reports of police brutality in Greece. Mobile phone footage of one such protest in March 2021 suggested that the police are using drones to surveil the protests, and some of those remanded have complained that they’ve been beaten and subjected to threats and sexual harassment while in custody. Disinfaux Collective has identified an individual caught on video throwing a petrol bomb as “either a police officer of the DRASI unit… or,under…
Content type: Examples
Israel is abandoning its longstanding tactic of raiding Palestinian homes for “intelligence mapping” in favour of digitised surveillance that includes a vast and sophisticated 20-year-old network of CCTV, ANPR, and IP cameras throughout the Old City in East Jerusalem (“Mabat 2000”), automated facial recognition-equipped checkpoints (provided by the domestic company AnyVision) between Israel and the occupied West Bank, and drone surveillance at Palestinian protests. The drones over weekly…
Content type: Advocacy
PI, together with 30 national and international civil society organisations (CSOs), release an open letter calling on Parliament and relevant stakeholders to halt and ban the use of live facial recognition technology (LFRT) by the police and private companies.We believe that the use of LFRT poses significant and unmitigable risks to our society. We do not believe that it can ever be safely deployed in public spaces or for mass surveillance purposes.The open letter comes as a result of a recent…
Content type: News & Analysis
As Amnesty International and Forbidden Stories continue to publish crucial information about the potential targets of NSO Group’s spyware, we know this much already: something needs to be done.
But what exactly needs to be done is less obvious. Even though this is not the first time that the world has learned about major abuses by the surveillance industry (indeed, it’s not even the first time this month), it’s difficult to know what needs to change.
So how can the proliferation and use of…
Content type: Advocacy
En mai 2021, nous avons fait une soumission pour la 132ème session du Comité des droits de l’homme qui a eu lieu entre le 28 juin 2021 et le 23 juillet 2021 en relation avec la conformité de la France avec le Pacte international relatif aux droits civils et politiques (PIDCP) avant l’adoption de la liste de points à traiter avant présentation de rapports (LoIPR).
Nous avons appelé le Comité des droits de l’homme de l’ONU à inclure dans la liste des questions au gouvernement français les points…
Content type: Advocacy
On May 2021, we made a submission for the 132nd Session of the Human Rights Committee that took place between 28 June 2021 and 23 July 2021 in relation to France’s compliance with the International Covenant on Civil and Political Rights (ICCPR) before the adoption of the List of issues prior to reporting (LoIPR).
We called the UN Human Rights Committee to include in the list of issues to the French government the following:
Emergency measures taken in response to the Covid-19 pandemic, and…
Content type: News & Analysis
Around the world, we see migration authorities use technology to analyse the devices of asylum seekers. The UK via the Policing Bill includes immigration officers amongst those who can exercise powers to extract information from electronic devices. There are two overarching reasons why this is problematic:
The sole provision in the Policing Bill to extract information rests on voluntary provision and agreement, which fails to account for the power imbalance between individual and state. This…
Content type: News & Analysis
It is difficult to imagine a more intrusive invasion of privacy than the search of a personal or home computer ... when connected to the internet, computers serve as portals to an almost infinite amount of information that is shared between different users and is stored almost anywhere in the world.
R v Vu 2013 SCC 60, [2013] 3 SCR 657 at [40] and [41].
The controversial Police Crime Sentencing and Courts Bill includes provision for extracting data from electronic devices.
The Bill…
Content type: Long Read
This is based on UK data protection legislation. The UK’s General Data Protection Regulation (UK GDPR) does not apply to processing of personal data for law enforcement purposes by relevant authorities.
What can happen to my personal data at a peaceful protest?
The most common personal data processed at a protest are notes and photographs taken by police officers, along with voice and video recordings taken from body-worn cameras or drones.
Data processing can also happen with…
Content type: Long Read
Photographing or filming incidents involving police and protestors is an important way of holding the police to account for their actions. Members of the public and the media do not need a permit to film or photograph in public places and police have no power to stop them filming or photographing incidents or police personnel.[1]
Can the police stop and search me for filming or taking photographs?
The police have the discretion to ask you to move back if they think you are interfering with…
Content type: Examples
While traditional media sought to criminalize the widespread November 2020 protests in Peru following the Congressional ouster of President Vizcarra, witnesses disseminated videos and photographs of police abuse on social networks. In the fear and uncertainty, many myths also circulated. In Peru, citizens have the right to refuse to allow police to check their cellphones unless they have a court order; slowed or absent wireless connections may simply be due to overload; as public officials,…
Content type: Explainer
Where are my images, contacts and documents stored?
You generate data every time you use your phone e.g. you generate data when you take photographs or record videos, when you create or edit notes and documents on the go, and when you add new names and numbers to your contacts directory.
All this data is created through dedicated apps - your camera and photo apps, social media apps, notes apps, and your contacts app are just some examples.
It is important to note that when you create any…
Content type: Examples
On November 9, 2020, after a year of escalating tensions, Peruvian president Martín Vizcarra was impeached on the grounds of "moral incapacity" by lawmakers threatened by his anti-corruption investigations and the policy reform he led. The street protests that followed all over the country were coordinated via Instagram, Twitter, WhatsApp, and TikTok (#MerinoNoMeRepresenta) by hundreds of newly-created small, decentralised organisations. The march on November 14 is thought to be the largest in…
Content type: Examples
US Customs and Border Protection Data show that the Department of Homeland Security deployed helicopters, airplanes, and drones over 15 cities, including New York City, Buffalo, Dayton OH, and Philadelphia, where demonstrators assembled to protest the killing of George Floyd and collected at least 270 hours of video surveillance footage. That deployment, which sparked a congressional inquiry, was only part of a nationwide operation that repurposed resources usually sent to the US border to find…
Content type: Examples
According to records obtained under a freedom of information request, the San Francisco Police Department used the camera network belonging to downtown Union Square Improvement District to spy on protesters during the end of May and early June 2020. The high-definition cameras, manufactured by Motorola brand Avigilon, can zoom in on a person's face and are linked to a software analysis system. Motorola is expanding its tool lineup to make it easier for police to gain access to private cameras…
Content type: Examples
Over 2020, EFF supported the right to protest without being surveilled by bringing lawsuits, offering protesters legal support, teaching protesters surveillance self-defence, and providing tools for people on the ground to use to determine what equipment their local police departments are using to spy on activists. Via public records requests, EFF discovered that the San Francisco Police Department gained access to over 400 cameras belonging to the Union Square Business Improvement District to…