Search
Content type: Video
Watch Part 1 of our videos on How to use the Data Interception Environment (DIE). It goes through downloading the DIE from PI's GitHub, setting up a virtual phone, and changing network settings to allow data to be intercepted.
Watch Part 2 of our videos on How to use the DIE. It goes through fixing the certificates for the virtual phone, and how to start using the DIE to view and analyse data being sent from the phone.
PI has made this tool available to assist individuals, researchers and…
Content type: Case Study
This written piece is part of PI's wider research into the tech behind ID systems around the world. Click here to learn more.
Overview
Aadhaar (Hindi for ‘foundation’) is India’s ID programme, the largest in the world, surpassing 1 billion sign ups in just under 6 years. This programme aims to give every citizen a unique, biometrically-verifiable identification number. Each user receives a card with their number on it, which can be cross-referenced with the biometric data held in a government…
Content type: Explainer
With more and more connected devices around us, the chance that you've been hit by an update notification is high. But what do these software updates do? How do they actually work, and why are they important?
Hardware and Software
Modern electronic devices require two main parts to function: the hardware and the software. The hardware usually refers to physical electronic pieces inside a device (usually a collection of microchips, logic gates and specialised processing chips, such as those to…
Content type: Long Read
Governments around the world are increasingly making registration in national digital ID systems mandatory for populations, justifying its need on a range of issues from facilitating access to services, to national security and fighting against corruption. This is an attempt to create a "foundational identity" for an individual, or "a single source of truth" about who someone is, according to a government agency. These identity systems are run by governments, sometimes by private companies, or…
Content type: News & Analysis
Our relationship with ‘public space’ is being redefined, not just by a global pandemic, but also by a new era of biometric surveillance technologies. Biometric mass surveillance enables companies and authorities to track us based on unique personal data and identify us whenever, wherever we go.The increasing use of facial recognition and other biometric surveillance technologies – on our streets, in train stations, at protests, at sports matches and even in our global ‘town square’, Facebook –…
Content type: Long Read
When you buy a brand-new low-cost phone, it’s likely to come pre-installed with insecure apps and an outdated operating system. What this means is that you or your loved ones could be left vulnerable to security risks or to having their data exploited. Privacy shouldn’t be a luxury. That’s why we advocate for companies to provide the latest security features and privacy protections for both low- and high-cost phones.
Content type: News & Analysis
As Amnesty International and Forbidden Stories continue to publish crucial information about the potential targets of NSO Group’s spyware, we know this much already: something needs to be done.
But what exactly needs to be done is less obvious. Even though this is not the first time that the world has learned about major abuses by the surveillance industry (indeed, it’s not even the first time this month), it’s difficult to know what needs to change.
So how can the proliferation and use of…
Content type: News & Analysis
A new industry is offering border agencies around the world access to advanced space-based surveillance capabilities once reserved for the most advanced intelligence agencies. Using satellites able to track signals from satellite phones and other emitters, these companies are then selling access to the data obtained to anyone willing to pay, including UK and EU border agencies.
While such surveillance can and is being used to save lives, it can also be used for illegal ‘pull backs’ in…
Content type: Explainer
An array of digital technologies are being deployed in the context of border enforcement. Satellite and aerial surveillance are part of the surveillance toolkit and yet, they are also used by organisations seeking to hold government actions to account and improve efficacy of their own work. To effectively critique state use and delve into potential benefits of satellite and aerial surveillance, we must first understand it.
In this explainer we dig into a technology which many are aware of for…
Content type: Explainer
‘Free to Protest: The protestor’s guide to police surveillance and how to avoid it’ (UK edition) is a collection of bite-sized guides about high-tech police surveillance capabilities at protests, including tips and strategies about how you can protect yourself from being identified, tracked and monitored. Each guide is self-contained so you don’t need to read the whole thing, or read it any particular order. You can access each separate section of the guide from the campaign homepage, but if…
Content type: Examples
After developing software that automatically recognises cookie banners that do not comply with the GDPR (usually because they do not provide a clear one-click option to reject all non-essential cookies), noyb has sent over 500 complaints to companies they consider non-compliant and given them a one-month grace period to change their practices. Along with the complaints, noyb provides a step-by-step guide on how to comply. They intend on generating over 10,000 complaints in this way in the…
Content type: Examples
The Irish Council for Civil Liberties (ICCL) has filed a lawsuit in Hamburg against three AdTech industry trade bodies including the Interactive Avertising Bureau (IAB). Members of the IAB include big tech companies (Google, Facebook, Amazon, Twitter...), data brokers (Equifax, Experian, Acxiom...) and advertising agencies (Groupm, Publicis, IPG...).
The lawsuit follows the filing in 2018 of complaints with the Irish Data Protection Commission (DPC) and UK Information Commissioner (ICO), which…
Content type: Examples
While traditional media sought to criminalize the widespread November 2020 protests in Peru following the Congressional ouster of President Vizcarra, witnesses disseminated videos and photographs of police abuse on social networks. In the fear and uncertainty, many myths also circulated. In Peru, citizens have the right to refuse to allow police to check their cellphones unless they have a court order; slowed or absent wireless connections may simply be due to overload; as public officials,…
Content type: Examples
In December 2020 Myanmar authorities began rolling out its $1.2 million "Safe City" system of 335 Huawei AI-equipped surveillance cameras in eight townships in the capital, Naypyidaw. The system, whose purpose was originally presented by the Myanmar government as fighting crime, automatically scans faces and vehicle licence plates in public places and alerts authorities to the presence of those on a wanted list. The Safe City plan calls for installing similar systems in Mandalay by mid-2021 and…
Content type: Examples
Hundreds of pages of Myanmar government budgets for the last two fiscal years obtained by the New York Times show that the Myanmar military who staged a coup in February 2021 had new and sophisticated tools at their disposal: Israeli-made, military-grade surveillance drones, European iPhone cracking devices, and US software that can hack into computers and extract their contents. Purchases of sensitive dual-use cybersecurity and defence technology continued during the five years in which the…
Content type: Examples
The internet, mobile, and social media shutdown in Myanmar left protesters vulnerable to rumours and at a disadvantage in organising opposition to the 2021 military coup. Coordination was done via phone, word of mouth, and the Bluetooth-based messaging app Bridgefy, which was downloaded more than 1 million times in Myanmar in the days after the coup. All plans include both online and offline contingency arrangements; a second disruptive possibility is intermittent interruptions and throttling…
Content type: Examples
The Belarusian government is using the "Kipod" facial recognition software developed by the local software company LLCC Synesis to track and identify dissidents. Synesis was previously sanctioned by the EU for providing authorities with an AI surveillance platform capable of tracking individuals. Kipod uses biometrics machine learning algorithms to analyse material. Synesis has denied that the technology could be used to identify protesters, but the Belarusian government decreed the…
Content type: Examples
In August 2020, controversial Belarusian president Alexander Lukashenko cut off most of the nation's access to the internet in hopes of disrupting the protests against the vote-rigging that saw him installed as president. Online news sites were left largely offline from election day onward, and demonstrators had to scramble to find wifi connections and working VPNs or proxies in order to share whatever news they could find. Protests therefore relied on popular bloggers on Telegram channels to…
Content type: Examples
Despite its indications of support for the pro-democracy protesters, in October 2020 the EU bought the Belarusian authorities 15 surveillance drones, raising concerns that the video equipment they carry would be used to identify and arrest individual pro-democracy protesters. The EU foreign service paid for them out of an €850,000 neighbourhood project handled by Latvia and Lithuania, and denied that they could be used to identify individuals. The drones were intended for use to patrol EU…
Content type: Examples
The 2020 Belarus protests were the largest in the country's history and brought an unprecedented crackdown, in which protesters nationwide were tortured and criminally prosecuted as a means of repressing peaceful assembly. A report finds that these cases became political as the government violated the presumption of innocence and meted out disproportionately harsh sentences. The report found no reports of disciplinary action taken against law enforcement officers who exceeded their authority by…
Content type: Examples
In 2019, interviews with Hong Kong protesters destroying smart lampposts revealed that many distrusted the government's claim that they would only take air quality measurements and help with traffic control, largely because of the comprehensive surveillance net the Chinese government was using to control and oppress the minority Uighur population in the Xinjiang region. As part of their response to this threat, the protesters wore masks, carried umbrellas, and travelled on foot, using online…
Content type: Examples
In 2019 Hong Kong protesters cut down 20 of the city's smart lampposts, which are streetlights equipped with sensors and cameras, in order to counter the threat that they were vectors for surveillance technologies such as facial and licence plate recognition. TickTack Technology, which provided the lampposts, terminated its contract with the Hong Kong government because of the property damage and threats to its employees. Protesters uploaded pictures of the lampposts' inner workings to Facebook…
Content type: Examples
During 2019, Hong Kong law enforcement authorities had access to AI facial recognition software provided by Sydney-based iOmniscient that can match faces and licence plates from video footage to police databases, but chief executive Carrie Lam's administration and police did not confirm whether they were using it to quash the pro-democracy protests. IOmniscient is also used to find lost children and manage traffic and has users in more than 50 countries. Under Hong Kong's privacy laws, members…
Content type: Examples
As police began treating every 2019 Hong Kong protest as an illegal assembly attracting sentences of up to ten years in jail, facial recognition offered increased risk of being on the streets, as protesters could be identified and arrested later even if they were in too large a crowd to be picked up at the time. By October, more than 2,000 people had been arrested, and countless others had been targeted with violence, doxxing, and online harassment. On the street, protesters began using…
Content type: Examples
Both protesters and police during the 2019 Hong Kong protests used technical tools including facial recognition to counter each other's tactics. Police tracked protest leaders online and sought to gain access to their phones on a set of Telegram channels. When police stopped wearing identification badges, protesters began to expose their identities online on another. The removal of identification badges has led many to suspect that surveillance techniques are being brought in from mainland…
Content type: Examples
UK police have used unmanned drones to monitor political protests for animal rights, by Extinction Rebellion, and against HS2, an extreme-right demonstration, and those held peacefully by Black Lives Matter, according to the campaign group Drone Watch. The Surrey, Cleveland, Staffordshire, Gloucestershire, and West Midlands forces all admitted to using drones at BLM events. Others admitting to using drones include Devon and Cornwall and Avon and Somerset.
https://www.theguardian.com/uk-news/…
Content type: Examples
A British freedom of information tribunal ruled that for national security reasons police in England and Wales may refuse to say whether they are using Stingrays, also known as IMSI-catchers, which are capable of tracking thousands of mobile phones and intercepting their calls, text messages, and other data. In 2016, the Bristol Cable found that police forces had bought hundreds of thousands of these devices disguised in public spending data by the acronym CCDC. Privacy International, which…
Content type: Examples
On November 9, 2020, after a year of escalating tensions, Peruvian president Martín Vizcarra was impeached on the grounds of "moral incapacity" by lawmakers threatened by his anti-corruption investigations and the policy reform he led. The street protests that followed all over the country were coordinated via Instagram, Twitter, WhatsApp, and TikTok (#MerinoNoMeRepresenta) by hundreds of newly-created small, decentralised organisations. The march on November 14 is thought to be the largest in…
Content type: Examples
US Customs and Border Protection Data show that the Department of Homeland Security deployed helicopters, airplanes, and drones over 15 cities, including New York City, Buffalo, Dayton OH, and Philadelphia, where demonstrators assembled to protest the killing of George Floyd and collected at least 270 hours of video surveillance footage. That deployment, which sparked a congressional inquiry, was only part of a nationwide operation that repurposed resources usually sent to the US border to find…