Search
Content type: Long Read
27th March 2019
(In order to click the hyperlinks in the explainer below, please download the pdf version at the bottom of the page).
Content type: Examples
20th August 2020
In London, during the UK’s coronavirus lockdown, young black men were stopped and searched by police 21,950 times with no further action taken in 80% of cases. If each individual were searched only once - which may not be the case - that would equate to 30% of all young black males in London. The Metropolitan police increased its use of stop and search during the lockdown, carrying out 43,000 stops in May 2020, more than double the number in May 2019. The Met responded that crime is also not…
Content type: News & Analysis
6th February 2020
On 30 January 2020, Kenya’s High Court handed down its judgment on the validity of the implementation of the National Integrated Identity Management System (NIIMS), known as the Huduma Namba. Privacy International submitted an expert witness testimony in the case. We await the final text of the judgment, but the summaries presented by the judges in Court outline the key findings of the Court. Whilst there is much there that is disappointing, the Court found that the implementation of NIIMS…
Content type: News & Analysis
11th June 2020
Yesterday, Amazon announced that they will be putting a one-year suspension on sales of its facial recognition software Rekognition to law enforcement. While Amazon’s move should be welcomed as a step towards sanctioning company opportunism at the expense of our fundamental freedoms, there is still a lot to be done.
The announcement speaks of just a one-year ban. What is Amazon exactly expecting to change within that one year? Is one year enough to make the technology to not discriminate…
Content type: News & Analysis
21st February 2014
Political activist and university lecturer Tadesse Kersmo believed that he was free from intrusive surveillance when he was granted political asylum in the UK. Instead, he was likely subject to more surveillance than ever. His case underlines the borderless nature of advanced surveillance technologies and why it represents such a massive problem.
In the past, those fleeing conflict or persecution could reasonably expect a degree of respite if they managed to escape their circumstances. However…
Content type: Long Read
24th May 2020
It is common for families with no recourse to public funds who attempt to access support from local authorities to have their social media monitored as part of a ‘Child in Need’ assessment.
This practice appears to be part of a proactive strategy on the part of local authorities to discredit vulnerable families in order to refuse support. In our experience, information on social media accounts is often wildly misinterpreted by local authorities who make serious and unfounded allegations…
Content type: News & Analysis
6th April 2020
Lockdowns and quarantines are an extraordinary measure that help in slowing down the global COVID-19 pandemic, and protecting the population.
However, they come at an even higher cost to some individuals, such as victims of domestic violence, persons in a vulnerable situation, and human rights defenders, who face specific threats that are exacerbated by measures taken by governments to address the global pandemic.
In that context, states should adopt special measures to keep those people…
Content type: Examples
13th May 2020
At least four law enforcement agencies in the US - two in California, and one in each of Maryland and Texas - are using drones to communicate with homeless people about maintaining social distance because encampments are located in areas that are difficult to access and police do not have to visit in person. Critics complain that the move increases encampment dwellers' already-high distrust in government. Many of the drones are being donated by the China-based drone company DJI as part of the…
Content type: Explainer
24th May 2020
Social media platforms are a vast trove of information about individuals, including their personal preferences, political and religious views, physical and mental health and the identity of their friends and families.
Social media monitoring, or social media intelligence (also defined as SOCMINT), refers to the techniques and technologies that allow the monitoring and gathering of information on social media platforms such as Facebook and Twitter which provides valuable intelligence to others…
Content type: News & Analysis
24th February 2020
Today, the District Court of the Hague ruled that the right to privacy prevailed over the hunt against alleged benefits fraudsters. The ruling could have huge implications for the future of digital welfare around the world.
In NJCM cs/ De Staat der Nederlanden (NJCM vs the Netherlands), also known as the SyRI case, the court considered the legality of the System Risk Indication (SyRI), a system designed by the Dutch government to process large amounts of data collected by various Dutch public…
Content type: News & Analysis
2nd April 2020
Amid calls from international organisations and civil society urging for measures to protect the migrant populations in Greece and elsewhere, last week, the European Commission submitted a draft proposal to amend the general budget 2020 in order to, among other measures, provide assistance to Greece in the context of the COVID-19 outbreak.
Both at the Turkish-Greek border and in the camps on the Greek islands, there are severe concerns not only about the dire situation in which these people…
Content type: Advocacy
15th April 2020
To the Members of the European Parliament and to the Committee on Budgets of the European Parliament
The EU urgently needs to step up and provide assistance to protect the health and safety of people trapped in camps on the Greek islands - not just to protect their welfare, but to contain the virus itself as a matter of global public health.
However, as we detail in the briefing below, the current European Commission proposal for funds allocation is insufficient to ensure the safety of…
Content type: Examples
12th August 2019
In October 2018, the Singapore-based startup LenddoEFL was one of a group of microfinance startups aimed at the developing world that used non-traditional types of data such as behavioural traits and smartphone habits for credit scoring. Lenddo's algorithm uses numerous data points, including the number of words a person uses in email subject lines, the percentage of photos in a smartphone's library that were taken with a front-facing camera, and whether they regularly use financial apps on…
Content type: Explainer graphic
10th March 2019
You can also read a more detailed explainer about social media intelligence (SOCMINT) here.
Content type: Explainer
23rd October 2017
What is SOCMINT?
Social media intelligence (SOCMINT) refers to the techniques and technologies that allow companies or governments to monitor social media networking sites (SNSs), such as Facebook or Twitter.
SOCMINT includes monitoring of content, such as messages or images posted, and other data, which is generated when someone uses a social media networking site. This information involves person-to-person, person-to-group, group-to-group, and includes interactions that are private and…
Content type: Long Read
1st May 2019
Imagine that every time you want to attend a march, religious event, political meeting, protest, or public rally, you must share deeply personal information with police and intelligence agencies, even when they have no reason to suspect you of wrongdoing.
First, you need to go to the police to register; have your photo taken for a biometric database; share the contacts of your family, friends, and colleagues; disclose your finances, health records, lifestyle choices, relationship status, and…
Content type: Advocacy
23rd May 2019
Refugees are among the most vulnerable people in the world. From the moment they flee their homes, as they pass through 'temporary' places such as refugee camps and detention centres to their 'final' destinations, they are continuously exposed to threats. In the digital age, these threats are increasingly being driven by the processing of vast amounts of highly sensitive personal data: from enrollment and registration processes needed for them to access services, to their identification and…
Content type: News & Analysis
20th March 2019
Planning and participating in peaceful protests against governments or non-state actors’ policies and practices requires the capacity of individuals to communicate confidentially without unlawful interference. From protests in support of LGBTI rights to protests against specific projects that undermine local communities’ wellbeing, these movements would not have been possible without the ability to exchange ideas and develop plans in private spaces.
Unlawful interference with someone’s…
Content type: Advocacy
15th October 2019
In this submission, Privacy International aims to provide the Office of the UN High Commissioner for Human Rights with information on how surveillance technologies are affecting the right to peaceful protests in new and often unregulated ways.
Based on Privacy International’s research, we provide observations, regarding the following:
the relationship between peaceful protests and the right to privacy;
the impact of new surveillance technologies in the context of peaceful protests…
Content type: Advocacy
17th June 2020
Privacy International (PI), Fundaciòn Datos Protegidos, Red en Defensa de los Derechos Digitales (R3D) and Statewatch responded to the call for submission of the UN Special Rapporteur on contemporary forms of racism, xenophobia and related intolerance on how digital technologies deployed in the context of border enforcement and administration reproduce, reinforce, and compound racial discrimination.
This submission provides information on specific digital technologies in service of border…
Content type: News & Analysis
24th February 2020
In mid-2019, MI5 admitted, during a case brought by Liberty, that personal data was being held in “ungoverned spaces”. Much about these ‘ungoverned spaces’, and how they would effectively be “governed” in the future, remained unclear. At the moment, they are understood to be a ‘technical environment’ where personal data of unknown numbers of individuals was being ‘handled’. The use of ‘technical environment’ suggests something more than simply a compilation of a few datasets or databases.
The…
Content type: News & Analysis
10th July 2019
Today, the British Health Secretary Matt Hancock announced a partnership between the NHS and Amazon to use the NHS’s website content as the source for the answer given to medical question, such as “Alexa, how do I treat a migraine?”
While we welcome Amazon’s use of a trusted source of information for medical queries, we are however extremely concerned about the nature and the implications of this partnership. Amazon is a company with a worrying track record when it comes to the way they…
Content type: News & Analysis
28th November 2019
On 24 October 2019, the Swedish government submitted a new draft proposal to give its law enforcement broad hacking powers. On 18 November 2019, the Legal Council (“Lagråd”), an advisory body assessing the constitutionality of laws, approved the draft proposal.
Privacy International believes that even where governments conduct hacking in connection with legitimate activities, such as gathering evidence in a criminal investigation, they may struggle to demonstrate that hacking as a form of…
Content type: News & Analysis
18th September 2019
Photo: The European Union
“Border Externalisation”, the transfer of border controls to foreign countries, has in the last few years become the main instrument through which the European Union seeks to stop migratory flows to Europe. Similar to the strategy being implemented under Trump’s administration, it relies on utilising modern technology, training, and equipping authorities in third countries to export the border far beyond its shores.
It is enabled by the adoption of ad hoc funds, like…
Content type: News & Analysis
22nd July 2020
The UN Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, Professor Fionnuala Ní Aoláin together with Dr. Krisztina Huszti-Orbán, released today a key report on the “Use of Biometric Data to Identify Terrorists: Best Practice or Risky Business?”.
The report explores the human rights risks involved in the deployment of biometrics emphasising that
in the absence of robust rights protections which are institutionally embedded…
Content type: Examples
3rd May 2018
In 2015, The Intercept obtained documents showing that the Mall of America in Bloomington, Minnesota used a fake Facebook account to friend and monitor local Black Lives Matter activists, and collect their personal information and photographs without their knowledge. The account was discovered in a cache of files the Mall of America provided to Bloomington officials after a large BLM protest against police brutality that was held at the mall. After the protest, the city charged 11 protesters…
Content type: Examples
13th July 2020
Gypsy and Traveller communities in England, especially those living on canals and waterways or in unauthorised roadside encampments, have had no access to sanitation, refuse collection, or water for drinking, cooking, showering, and washing clothes during the coronavirus lockdown. Some local authorities have directed Travellers to public toilets without hand-washing facilities, while others tried to evict them. In addition, conditions like COPD and asthma are more common in Gypsy and Traveller…
Content type: Advocacy
1st June 2020
Last week, Privacy International joined more than 30 UK charities in a letter addressed to the British Prime Minister Boris Johnson, following his recent declaration, asking him to lift No Recourse to Public Funds (NRPF) restrictions.
Since 2012, a ‘NRPF condition’ has been imposed on all migrants granted the legal right to live and work in the UK. They are required to pay taxes, but they are not permitted to access the public safety net funded by those taxes.
This is not a topic we are known…
Content type: Explainer
30th July 2020
At first glance, infrared temperature checks would appear to provide much-needed reassurance for people concerned about their own health, as well as that of loved ones and colleagues, as the lockdown is lifted. More people are beginning to travel, and are re-entering offices, airports, and other contained public and private spaces. Thermal imaging cameras are presented as an effective way to detect if someone has one of the symptoms of the coronavirus - a temperature.
However, there is little…
Content type: Explainer graphic
15th February 2019
You can also read a more detailed explainer about IMSI catchers here.