Search
Content type: App Analysis
5th December 2018
This app prerequest permissions when installing from the app store, a screenshot is attached for reference
This documentation demonstrates actions taken by the test user and the apps subsequent responses.
Test user action 1: The user taps on the application icon, which opens the applicationResponse from app: The application is initialised and the following data is sent and received by the app:
Immediately after the app is opened, the following data is sent to graph.facebook.com (Graph…
Content type: Examples
27th June 2018
In 2012, Facebook CEO Mark Zuckerberg's sister, Randi, tweeted to fellow Twitter user Callie Schweitzer that Schweitzer had violated her privacy by posting a picture taken in her kitchen. Randi Zuckerberg, the former head of Facebook's marketing department, had posted the picture, which was taken in her kitchen and showed four people including her brother, to Facebook intending it to be viewed by Friends only. Schweitzer responded that the picture had popped up in her Facebook News Feed. Randi…
Content type: News & Analysis
21st April 2020
A few weeks ago, its name would probably have been unknown to you. Amidst the covid-19 crisis and the lockdown it caused, Zoom has suddenly become the go-to tool for video chat and conference calling, whether it’s a business meeting, a drink with friends, or a much needed moment with your family. This intense rise in use has been financially good to the company, but it also came with a hefty toll on its image and serious scrutiny on its privacy and security practices.
While Zoom already had a…
Content type: Examples
13th July 2020
Zoom said it would deliver end-to-end encryption as one of a number of security enhancements to its service, but it will only be available to enterprise and business customers whose identity they can verify and not on the free service. The company says it wants to be able to work with law enforcement in case people use Zoom for a "bad purpose". None of Zoom's competitors offer end-to-end encryption.
Source: CNBC
Writer: Jordan Novet
Content type: News & Analysis
2nd October 2013
The Zimbabwean government extended its reach into the private lives of its citizens this week by promulgating a new law establishing a central database of information about all mobile telephone users in the country. The Statutory Instrument 142 of 2013 on Postal and Telecommunications (Subscriber Registration) Regulations 2013, gazetted last Friday, raises new challenges to the already embattled rights to privacy and free expression in Zimbabwe, increasing the potential that the repressive…
Content type: News & Analysis
11th December 2015
Sometimes it takes an unexpected stranger to remind you what you have, and what you are at risk of losing. Roman Zakharov, a Russian publisher who challenged Russia’s surveillance legislation, is that stranger for many Brits and Europeans. The Grand Chamber of the European Court of Human Rights judgement on Friday 4 December 2015 was remarkable, not because it tore up the rule book on the jurisprudence surrounding state surveillance in the Council of Europe, but because it followed that rule…
Content type: Explainer
24th February 2020
Television offers some of the earliest instances of digital marketing. The majority of television channels rely on commercials and advertisements to maintain their operations. For the past 75 years, TV adverts have been passive transmissions broadcast to viewers, the demographics of the channels audience guiding the kinds of products and services shown during commercial breaks and intermissions. With the changes in the way individuals are now consuming content however, broadcasters are trying…
Content type: Examples
5th May 2018
In the wake of Tesla’s first recorded autopilot crash, automakers are reassessing the risk involved with rushing semi-autonomous driving technology into the hands of distractible drivers. But another aspect of autopilot—its ability to hoover up huge amounts of mapping and “fleet learning” data—is also accelerating the auto industry’s rush to add new sensors to showroom-bound vehicles. This may surprise some users: Tesla’s Terms of Use (TOU) does not explicitly state that the company will…
Content type: Long Read
9th April 2019
(In order to click the hyperlinks in the explainer below, please download the pdf version at the bottom of the page).
Content type: Long Read
27th March 2019
(In order to click the hyperlinks in the explainer below, please download the pdf version at the bottom of the page).
Content type: Long Read
20th August 2019
This blog is about our new Twitter bot, called @adversarybot. If you want to follow the account, please do watch the pinned 'Privacy Policy' tweet before you do so.
Content type: Examples
20th August 2020
In London, during the UK’s coronavirus lockdown, young black men were stopped and searched by police 21,950 times with no further action taken in 80% of cases. If each individual were searched only once - which may not be the case - that would equate to 30% of all young black males in London. The Metropolitan police increased its use of stop and search during the lockdown, carrying out 43,000 stops in May 2020, more than double the number in May 2019. The Met responded that crime is also not…
Content type: News & Analysis
1st December 2017
13 June 2016
"State capacity to conduct surveillance may depend on the extent to which business enterprises cooperate with or resist such surveillance” notes the Special Rapporteur on freedom of expression in his report on the role of the private sector to respect human rights in the digital age. The Special Rapporteur will present its findings and recommendations to the Human Rights Council on Thursday.
It is no longer sufficient for companies to simply point the finger at intelligence and…
Content type: News & Analysis
22nd October 2019
Privacy International has been doing work on the UK-based digital identity company, Yoti. We have raised concerns about their use of user data for their 'Yoti Age Scan' product. As we say in our analysis:
Yoti Age Scan is just one example of digital identity. The issues ... can be used to reflect on wider issues relating to the use of data gathered in the course of identity services: how do we want the identity industry to treat our data? What is the future for this market, and how do we…
Content type: App Analysis
29th November 2018
This documentation demonstrates actions taken by the test user and the apps subsequent responses.
Test user action 1: The user taps on the application icon, which opens the applicationResponse from app: The application is initialised and the following data is sent and received by the app:
Immediately after the app is opened, the following data is sent to graph.facebook.com (Graph)
The following GET request was made:
GET https://graph.facebook.com/v3.1/97534753161?fields=…
Content type: Long Read
4th February 2019
Over the past year, the Privacy International Network has uncovered, campaigned, and advocated on how trends in surveillance and data exploitation are increasingly affecting our right to privacy.
To celebrate Data Privacy Day on 28 January, we shared a full week of stories and research, exploring how countries are addressing data governance, and the implications for our security and privacy.
Monday - Exposing Harms, Fighting Back
It is often communities who are already the most marginalised…
Content type: Long Read
2nd February 2018
To celebrate International Data Privacy Day (28 January), PI and its International Network have shared a full week of stories and research, exploring how countries are addressing data governance in light of innovations in technology and policy, and implications for the security and privacy of individuals.
Content type: Examples
12th August 2019
In February 2019, the World Food Programme, a United Nations aid agency, announced a five-year, $45 million partnership with the data analytics company Palantir. WFP, the world's largest humanitarian organisation focusing on hunger and food security, hoped that Palantir, better known for partnering with police and surveillance agencies, could help analyse large amounts of data to create new insights from the data WFP collects from the 90 million people in 80 countries to whom it distributes 3…
Content type: Long Read
24th February 2020
Valentine’s Day is traditionally a day to celebrate relationships, but many relationships that begin romantically can quickly become controlling, with partners reading emails, checking texts and locations of social media posts. This can be just the beginning.
Today, Friday 14th February, Privacy International and Women’s Aid are launching a series of digital social media cards giving women practical information on how to help stay safe digitally from control and abuse.
Did you know that…
Content type: Examples
7th May 2019
The rise of social media has also been a game changer in the tracking of benefits claimants. In the UK in 2019, a woman was jailed after she was jailed for five months after pictures of her partying in Ibiza emerged on social media. She had previously sued the NHS for £2.5 million, after surviving a botched operation. She had argued the operation had left her disabled and the “shadow of a former self” but judges argued that the pictures suggested otherwise.
https://www.dailymail.co.uk/news/…
Content type: Examples
7th May 2019
The rise of social media has also been a game changer in the tracking of benefits claimants. Back in 2009, the case of Nathalie Blanchard a woman in Quebec who had lost her disability insurance benefits for depression because she looked “too happy” on her Facebook pictures had made the news.
https://abcnews.go.com/Technology/AheadoftheCurve/woman-loses-insurance-benefits-facebook-pics/story?id=9154741
Author: Ki Mae Heussner
Publication: ABC News
Content type: Examples
13th November 2019
A woman was killed by a spear to the chest at her home in Hallandale Beache, Florida, north of Miami, in July. Witness "Alexa" has been called yet another time to give evidence and solve the mystery. The police is hoping that the smart assistance Amazon Echo, known as Alexa, was accidentally activated and recorded key moments of the murder. “It is believed that evidence of crimes, audio recordings capturing the attack on victim Silvia Crespo that occurred in the main bedroom … may be found on…
Content type: News & Analysis
9th March 2016
Surveillance companies and government officials from across the world are gathering in the UK this week at the invitation of the Home Office for the UK’s “Premier Security and Law Enforcement Event’, one week after the controversial spying legislation, entitled the Investigatory Powers Bill, had its first reading in Parliament.
Delegates and companies will be attending the three-day long ‘Security and Policing’ trade show in Farnborough, the historical centre of the UK’s aerospace industry.…
Content type: News & Analysis
29th November 2012
One of the first things that strikes you about the chaotic East African metropolises of Kenya, Uganda and Zimbabwe is the blanket of adverts for mobile phone companies that covers them, from the walls of the immigration hall at Harare airport, to the rickety shacks that line the dusty streets of Kampala. Where official signage is unavailable, DIY versions are painted onto the roofs and walls of houses and small businesses. Stores selling mobile phones are rarely more than a few short steps away…
Content type: Long Read
28th June 2019
Everyday objects and devices that can connect to the Internet -- known as the Internet of Things (IoT) or connected devices -- play an increasing role in crime scenes and are a target for law enforcement. Exploiting new technologies that are in our homes and on our bodies as part of criminal investigations and for use as evidence, raises new challenges and risks that have not been sufficiently explored.
We believe that a discussion on the exploitation of IoT by law enforcement would benefit…
Content type: News & Analysis
21st April 2017
Dear Politicians,
With elections coming up and quite a few cringe-worthy comments that have come from many of you and from all sides of the political spectrum, we figured it was time to have a chat about encryption.
First, let’s say what you shouldn’t do:
call for boycotts of companies because they protect their users’ data even from the companies themselves.
say something like “we’ll develop a Manhattan-level project on this” (which, as we’ll remind you, ended up with the creation of a…
Content type: News & Analysis
24th November 2015
The relationship between users and companies is based primarily on trust. However, many recent developments have the potential to undermine this trust and to question companies loyalties to their users. From excessive data collection and transmission to the failure to guard against basic security risks, one could be forgiven for thinking that the privacy and security interests of users and devices have taken a back seat. Governments of the world are unilaterally endeavouring to make this…
Content type: News & Analysis
10th September 2012
As part of the government’s ambitious Open Data programme, the Cabinet Office announced last year that data from the National Pupil Database (NPD) will be made freely available and accessible to all. The NPD, previously only available to researchers on an academic licence, contains a record for every single state school pupil in the country, covering educational attainment from reception to sixth form, as well as characteristics such as attendance, ethnic background and free school meal…
Content type: News & Analysis
2nd February 2015
Late last year, the newly-elected government of Indonesia began to take steps which are almost unheard of today: reforming government communications surveillance powers.
The much-needed development, on the back of the victory of President Joko Widodo, comes at a critical moment in the country's history as the relationships that Indonesians have with technology are changing and growing rapidly. A recent poll revealed that Indonesians consider technology to have had a mostly negative impact on…
Content type: News & Analysis
2nd February 2018
The recent announcement by the Minister for Justice that serious and organised crime will receive legislative attention from the Government and the Oireachtas is most welcome. However, the stated means of achieving this are deeply concerning for the Irish public and larger digital economy. The statements indicate that the Government intends to follow the British model of surveillance where Irish companies can be compelled to betray their users. Why would any user engage with a service that…