Search
Content type: Case Study
In the Xingjiang region of Western China, surveillance is being used to facilitate the government’s persecution of 8.6million Uighur Muslims.
Nurjamal Atawula, a Uighur woman, described how, in early 2016, police began regularly searching her home and calling her husband into the police station, as a result of his WeChat activity.
WeChat is a Chinese multi-purpose messaging, social media and mobile payment app. As of 2013, it was being used by around 1million Uighurs, but in 2014 WeChat was…
Content type: News & Analysis
Updated January 18th 2021
The Government of Myanmar is pushing ahead with plans to require anyone buying a mobile SIM card to be fingerprinted and hand over their ID cards, according to procurement documents circulated to prospective bidders.
The plans are a serious threat to privacy in a country lacking any data protection or surveillance laws and where minorities are systematically persecuted, and must be scrapped.
According to technical requirements developed by Myanmar’s Post and…
Content type: Long Read
Sitting on the ground inside an unadorned courtyard in Koira Tegui, one of Niamey’s most popular districts, Halimatou Hamadou shows a copy of what, she’s been told, is a certificate of birth.
The 33 year old woman, who’s unable to read and write, received it days earlier during a crowded public ceremony at a nearby primary school.
“It’s my first document ever,'' she says, with surprise.
Thanks to the paper, she’ll be able to take part in a crucial passage for the future of Niger: the…
Content type: News & Analysis
Photo by Ray Witlin / World Bank CC BY-NC-ND 2.0
This article has been written by Ambika Tandon, Policy Officer at the Centre for Internet and Society, in collaboration with Privacy International.
On October 17th 2019, the UN Special Rapporteur (UNSR) on Extreme Poverty and Human Rights, Philip Alston, released his thematic report on digital technology, social protection and human rights. Understanding the impact of technology on the provision of social protection – and, by extent, its…
Content type: Report
In September 2019, Privacy International filed 10 access to documents requests to EU bodies regarding the transfer of surveillance capabilities to non-EU countries. The requests seek documents providing information on the transfer of personal data, surveillance technology, training, financing, and legislation to non-EU countries. The requests were submitted to:
Frontex
Europol
The European Union Agency for Law Enforcement Training
The Directorate-General for Economic and Financial Affairs…
Content type: News & Analysis
Photo: The European Union
“Border Externalisation”, the transfer of border controls to foreign countries, has in the last few years become the main instrument through which the European Union seeks to stop migratory flows to Europe. Similar to the strategy being implemented under Trump’s administration, it relies on utilising modern technology, training, and equipping authorities in third countries to export the border far beyond its shores.
It is enabled by the adoption of ad hoc funds, like…
Content type: News & Analysis
Photo by Francesco Bellina
The wars on terror and migration have seen international funders sponsoring numerous border control missions across the Sahel region of Africa. Many of these rely on funds supposed to be reserved for development aid and lack vital transparency safeguards. In the first of a series, freelance journalist Giacomo Zandonini sets the scene from Niger.
Surrounded by a straw-yellow stretch of sand, the immense base of the border control mobile company of Maradi, in southern…
Content type: News & Analysis
Photo: The European Union
On 2 September 2019, Privacy International, together with 60 other organisations, signed an open letter to the European Parliament to express our deep concern about upcoming EU policy proposals which undermine the EU’s founding values of human rights, peace and disarmament.
Since 2017, the EU has diverted funds towards security research and security capacity-building in countries around the world. The proposal for the EU's next budget (2021-2027) will significantly…
Content type: Examples
In February 2019 Gemalto announced it would supply the Uganda Police Force with its Cogent Automated Biometric Identification System and LiveScan technology in order to improve crime-solving. LiveScan enables police to capture biometric data alongside mugshots and biographical data. CABIS speeds up the biometric matching process by mapping distinctive characteristics in fingerprints, palm prints, and facial images. The Ugandan police will also pilot Gemalto's Mobile Biometric Identification…
Content type: Examples
New workplace technologies are generating mountains of data on workers despite a lack of clarity over how the data is used and who owns it. In offices, smart badges track interactions and sensors track fitness and health; in trucks sensors monitor drivers' performance in the name of safety. In the US state of Illinois, between July and October 2017 26 lawsuits were filed by employees alleging that their employers had violated the state's Biometric Information Privacy Act, which requires a…
Content type: Examples
In October 2018, the answers to a FOIA request filed by the Project on Government Oversight revealed that in June 2018 Amazon pitched its Rekognition facial recognition system to US Immigration and Customs Enforcement officials as a way to help them target or identify immigrants. Amazon has also marketed Rekognition to police departments, and it is used by officers in Oregon and Florida even though tests have raised questions about its accuracy. Hundreds of Amazon workers protested by writing a…
Content type: Examples
In November 2018, 112 civil liberties, immigrant rights groups, child welfare advocates, and privacy activists wrote a letter to the heads of the US Department of Health and Human Services and the Department of Homeland Security demanding an immediate halt to the HHS Office for Refugee Resettlement's practice of using information given them by detained migrant children to arrest and deport their US-based relatives and other sponsors. The policy began in April 2018, and the result has been that…
Content type: Examples
In October 2018, British home secretary Sajid Javid apologised to more than 400 migrants, who included Gurkha soldiers and Afghans who had worked for the British armed forces, who were forced to provide DNA samples when applying to live and work in the UK. DNA samples are sometimes provided by applicants to prove their relationship to someone already in the UK, but are not supposed to be mandatory. An internal review indicated that more people than the initially estimated 449 had received DNA…
Content type: Examples
In December 2018, Florida citizen Peter Sean Brown filed a federal lawsuit against the Monroe County Sheriff's offices for arresting and detaining him for three weeks claiming he was an illegal alien from Jamaica. Even though Brown offered to show the sheriff his birth certificate and explained he had been wrongfully detained 20 years before and the jail's own records listed his birthplace as Philadelphia, PA, the sheriff relied on a form sent by Immigration and Customs Enforcement. Brown had…
Content type: Examples
In February 2019, the World Food Programme, a United Nations aid agency, announced a five-year, $45 million partnership with the data analytics company Palantir. WFP, the world's largest humanitarian organisation focusing on hunger and food security, hoped that Palantir, better known for partnering with police and surveillance agencies, could help analyse large amounts of data to create new insights from the data WFP collects from the 90 million people in 80 countries to whom it distributes 3…
Content type: News & Analysis
Picture Credit: US AID
US President Trump has been cutting aid to Central America, including a surprise cut of approximately $500m in aid to the “Northern Triangle” countries of El Salvador, Guatemala, and Honduras, apparently as punishment for “doing absolutely nothing” to prevent emigration to the US.
What remains of the funds is largely and deliberately being repurposed for spending on the US’s own security interests: indeed, one area which his attorney general claims will be spared from…
Content type: News & Analysis
Foto: US AID
El presidente estadounidense Trump ha estado recortando la ayuda a Centroamérica, incluyendo un recorte sorpresivo de aproximadamente 500 millones de dólares a los países del “Triángulo del Norte” (El Salvador, Guatemala y Honduras), al parecer como castigo por “no haber hecho absolutamente nada” para impedir la emigración hacia los Estados Unidos.
Los fondos restantes están siendo reorientados,en su gran mayoría y deliberadamente, al gasto para defender los intereses de…
Content type: Long Read
By Valentina Pavel, PI Mozilla-Ford Fellow, 2018-2019
Our digital environment is changing, fast. Nobody knows exactly what it’ll look like in five to ten years’ time, but we know that how we produce and share our data will change where we end up. We have to decide how to protect, enhance, and preserve our rights in a world where technology is everywhere and data is generated by every action. Key battles will be fought over who can access our data and how they may use it. It’s time to take…
Content type: Long Read
Photo By: Cpl. Joel Abshier
‘Biometrics’ describes the physiological and behavioural characteristics of individuals. This could be fingerprints, voice, face, retina and iris patterns, hand geometry, gait or DNA profiles. Because biometric data is particularly sensitive and revealing of individual’s characteristics and identity, it can be applied in a massive number of ways – and has the potential to be gravely abused.
Identification systems across the world increasingly rely on biometric…
Content type: Examples
The State is not always the only actor involved in the surveillance of benefits claimants. Often those practices are encouraged, facilitated or conducted by private companies. South Africa for instance mandated MasterCard to help distribute benefits through biometric debit cards.
https://www.finextra.com/newsarticle/23941/south-africa-enlists-mastercard-to-distribute-welfare-through-biometric-debit-cards
Publication: FinExtra
Content type: Examples
The National Board of Scholarships and School Aid (Junaeb) in Chile was also heavily criticised for its use of facial recognition programmes to deliver meals at thirty schools in three cities across the country. After the Supreme Court requested in 2017 that the system must not be applied without the consent of the parents, in February 2019 it was the Council for Transparency that declared that: “The use of biometric identification systems to certify the delivery of food rations at schools…
Content type: Examples
In Mexico, people registered as beneficiaries of any programmes led by the Ministry of Social Development could obtain a TV set, as part of the transition from analogue to digital TV organised by the Ministry of Communications and Transportation. Yet, the Ministry of Communications and Transportation requested the collection of fingerprints, the scanning of the beneficiary’s voter card and the beneficiary’s address in exchange of the TV set. The company Codigo Empresarial SA de CV was tasked…
Content type: Examples
In Bangladesh, as part of the USAID and Bill and Melinda Gates Foundation supported programme “a2i” (Access to Information), the government has built a system to allow citizens to receive their welfare payment on a pre-paid debit card given to them at the Bangladesh Post Office after having been registered with their biometric data.
https://govinsider.asia/smart-gov/bangladesh-a2i-mobile-payments/
Author: Joshua Chambers and Nurfilzah Rohaidi
Publication: Gov Insider
Content type: News & Analysis
Protest movements throughout history have helped to shape the world we know today. From the suffragettes to the civil rights movement, and to contemporary movements such as those focusing on LGBTIQ+ rights, protests have become a vital way for many, who feel powerless otherwise, to have their voices heard.
But now, making the decision to attend a protest comes with consequences that you may very well be unaware of. This is because policing and security services, always hungry in their quest to…
Content type: Explainer graphic
You can also read a more detailed explainer about facial recognition cameras here.
Content type: Long Read
(In order to click the hyperlinks in the explainer below, please download the pdf version at the bottom of the page).
Content type: Long Read
The Privacy International Network is celebrating Data Privacy Week, where we’ll be talking about how trends in surveillance and data exploitation are increasingly affecting our right to privacy. Join the conversation on Twitter using #dataprivacyweek.
It is often communities who are already the most marginalised who are at risk because of the privacy invasions of data-intensive systems. Across the globe, we see the dangers of identity systems; the harms of online violence against women and the…