Search
Content type: Video
Links
The Enablers by the Bureau of Investigative Journalism
PI's report
Submit your podcast questions
Sign up to our mailing list
Places to listen
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify | Apple podcasts | Castbox | Google podcasts | Overcast | Stitcher | Pocket Casts | Peertube | Youtube | Soundcloud | Podbean | Podcast Republic | Breaker | Podcast Addict | Deezer | and more...
Content type: Long Read
Here are just 10 of our biggest achievements in 2021.
WE CHALLENGED COMPANIES TO CHANGE THEIR BUSINESS MODELS AND PRACTICES
In 2021 we effectively challenged big tech companies including Google, Facebook, Tecno, and smaller and equally urgent companies like Clearview AI, Web-IQ, Palantir etc. and achieved substantial impact including:
- Popular diet apps include better protections in their products
Many diet sites and apps ask you to take tests to create profiles of your body and eating…
Content type: Explainer
Bluetooth
The majority of apps settled on using Bluetooth for proximity tracing.
Just what is Bluetooth?
Named after the 10th Century King Harald "Bluetooth" Gormsson who unified Scandinavia — and whose runic initials comprise the logo — Bluetooth is a wireless, low-power, and therefore short-distance, set of protocols used primarily to connect devices directly to each other in order to transfer data, such as video and audio.
Bluetooth for tracking?
Most of us who've encountered Bluetooth use…
Content type: Long Read
This piece is a part of a collection of research that demonstrates how data-intensive systems that are built to deliver reproductive and maternal healthcare are not adequately prioritising equality and privacy.
Digital health apps of all kinds are being used by people to better understand their bodies, their fertility, and to access health information. But there are concerns that the information people both knowingly and unknowing provide to the app, which can be very personal health…
Content type: Explainer
Introduction/Background
Electronic tags have been a key part of criminal justice offender management for over 20 years, being used in the United States since the mid 1980’s and in the UK and some other commonwealth countries since 2003. In 2021 the UK introduced GPS tagging for immigration bail.
The tag is predominantly used to curtail the liberties of individuals. For those on criminal bail its intended use includes managing return into communities while deterring reoffending.
As we explore…
Content type: Video
Links
Teens and Facebook
Frances Haugen and Instagram
Facebook and Metaverse
Metaverse and Bandwidth
EFF on new Google replacement for cookies
Google's follow up plan to replace cookies
EV cars and the national grid
The gates of hell
South Africa, Omicron, and travel
Patent-free covid vaccine
Covid vaccine plastic bag shortage
James Webb telescope
Human trails for Elon Musks' brain chip
Content type: Video
Links
Our predictions from 2021
Clearview UK provisional fine
Clearview legal trouble in France
Clearview investments
TRIPS waiver
Travel podcast
Patent-free vaccine
Mental health podcast
Dr David works for the Mental Health Foundation
Google unionise
The 'Great Resignation'
PI has been working with two unions on our managed by bots campaign
Complicated history of plagues and workers
Indian National Education Plan
Ugandan Election
Crypto mining trouble
US commitment…
Content type: Guide step
The information you (consciously or not) share with Telegram can be very revealing. It can also be (mis)interpreted by government agencies and used to profile individuals. Once installed on a device, depending on your settings, the Telegram app may have access to information such as your location, contact information and media stored on the same device. All of this data can be potentially be accessed remotely using cloud extraction technology.
Your Telegram app generates a lot of data that can…
Content type: Guide step
The information you (consciously or not) share with Facebook can be very revealing. It can also be (mis)interpreted by government agencies and used to profile individuals. Once installed on a device, depending on your settings, the Facebook app may have access to information such as your location, contact information and media stored on the same device. All of this data can be potentially be accessed remotely using cloud extraction technology.
Your Facebook app generates a lot of data that can…
Content type: Guide step
The information you share on WhatsApp can be very revealing. Once installed on a device, the app potentially has access to information such as your location, contact information, and media stored on the same device.
Your WhatsApp app generates a lot of data that can also be stored on your device and elsewhere. It’s important for you to be able to understand the types of data that apps like WhatsApp generate. Government agencies may seek access to this data through at least two routes: they…
Content type: Explainer
Before you get started
It would be useful to have:
Oracle Virtualbox (version 6.1 or later)
Genymotion, a virtual phone or a physical device
Unarchival software (7Zip, Peazip, Keka, Ark etc)
Android Developer Bridge (adb) (You can also install Android Debug Bridge, which is adb without the full Android SDK platform)
Web Browser
A small amount of linux/unix knowledge will help!
Setting up the Data Interception Environment
Download the latest release of the Data Interception…
Content type: Examples
As a result of the challenges emerging from Covid-19 to disburse financial assistance, the government of Paraguay decided to change its food security programme, Ñangareko, from an in-kind benefit to a bank transfer consisting of a one-off payment of PYG 500,000 (= +/-73USD).
The Ñangareko Programme is aimed at those affected by Covid-19 which are stated to include the most vulnerable, informal workers, persons without a RUC (the unique taxpayer registry number) or social security, and who don’…
Content type: Long Read
For over 20 years with the start of the first use of ICTs in the 1990s, we have seen a digital revolution in the health sector. The Covid-19 pandemic significantly accelerated the digitalisation of the health sector, and it illustrates how fast this uptake can be and what opportunities can emerge; but also, importantly, the risks that it involves.
As we've said many times before, whilst technologies can be part of the solution to tackle some socio-economic and political challenges facing our…
Content type: Examples
The global internet monitoring firm NetBlocks finds that Cuba has restricted access to social media and messaging platforms including Facebook, Instagram, and WhatsApp, as well as some Telegram servers, on the govt-owned telecom provider ETECSA during the largest protests the country has seen in decades. Access to the streaming services YouTube and Google Video was also limited. The protests focused on rising prices, curbs on civil liberties, and the government’s handling of the pandemic.…
Content type: Advocacy
Our environment is increasingly populated by devices connected to the Internet, from computers and mobile phones to sound systems and TVs to fridges, kettles, toys, or domestic alarms. There has been research into the negative safety and privacy impacts of inadequate security provided by the software in such devices (such as the creation of large scale botnets). This is also the case with outdated security, a risk enabled by software support periods that are shorter than a product’s usable life…
Content type: Long Read
Image source
This piece is a part of a collection of research that demonstrates how data-intensive systems that are built to deliver reproductive and maternal healthcare are not adequately prioritising equality and privacy.
Telemedicine describes the vast range of applications and technologies used to provide and manage healthcare remotely.
Telemedicine as its most basic refers to the transmission of data from a patient to a healthcare professional through a range of electronic…
Content type: Guide step
Introducción
Pi-hole es un bloqueador de anuncios de uso general que cubre toda la red y la protege de los anuncios y los rastreadores sin que sea necesario configurar cada uno de los dispositivos. Tiene la capacidad de bloquear anuncios en cualquier dispositivo de la red (por ejemplo, electrodomésticos inteligentes) y, a diferencia de las extensiones del navegador, Pi-hole bloquea los anuncios en cualquier tipo de software.
La configuración general funciona de la siguiente manera (Fig. 1).…
Content type: Guide step
Las redes de distribución de contenidos (CDN) son redes geográficamente distribuidas de servidores proxy que buscan ofrecer funciones como mejorar la disponibilidad y el rendimiento de los sitios web. Aunque el objetivo es loable, también implica que los proveedores de CDN reciben metadatos vinculados con los sitios web que visitas (donde están instalados). Sabiendo esto, quizá sea conveniente sacrificar estas ventajas adicionales y prescindir de los grandes proveedores de CDN (como Google y…
Content type: Long Read
Introduction
Technology has driven a number of changes in the way that financial services are packaged and accessed by consumers. These changes have led to the rise of fintech, a data intensive industry that has been touted for its convenience and as an alternative to traditional financial services.
The current article looks at the use of digital loan Apps in Philippines and Kenya and contextualises the global discussions on fintech which we have been monitoring for some years. Research…
Content type: Press release
Privacy International research released today shows that the brand new TECNO Y2 phone is being sold with outdated versions of the Android operating system. The version of Android, which is from 2013, no longer receives security updates, and contains over 200 known vulnerabilities. The phone also comes with pre-installed apps that the users cannot uninstall. What this means is that the privacy and security of people using TECNO’s Y2 phones can be at risk.
TECNO are a phone manufacturer based in…
Content type: Long Read
When you buy a brand-new low-cost phone, it’s likely to come pre-installed with insecure apps and an outdated operating system. What this means is that you or your loved ones could be left vulnerable to security risks or to having their data exploited. Privacy shouldn’t be a luxury. That’s why we advocate for companies to provide the latest security features and privacy protections for both low- and high-cost phones.
Content type: Long Read
For many, browsing the internet or checking social media comes with its fair share of being targeted with ads selling “fad diet” subscription-based programmes, magic weight-loss powders, or promising a secret trick to lose weight quickly. Some of the products and programmes sold have been described as scams, with a very real impact for those suffering from eating disorders and those who fall prey to these ads. This is even more problematic due to the Covid-19 pandemic, which has seen the…
Content type: News & Analysis
As Amnesty International and Forbidden Stories continue to publish crucial information about the potential targets of NSO Group’s spyware, we know this much already: something needs to be done.
But what exactly needs to be done is less obvious. Even though this is not the first time that the world has learned about major abuses by the surveillance industry (indeed, it’s not even the first time this month), it’s difficult to know what needs to change.
So how can the proliferation and use of…
Content type: Explainer
An array of digital technologies are being deployed in the context of border enforcement. Satellite and aerial surveillance are part of the surveillance toolkit and yet, they are also used by organisations seeking to hold government actions to account and improve efficacy of their own work. To effectively critique state use and delve into potential benefits of satellite and aerial surveillance, we must first understand it.
In this explainer we dig into a technology which many are aware of for…
Content type: News & Analysis
It is difficult to imagine a more intrusive invasion of privacy than the search of a personal or home computer ... when connected to the internet, computers serve as portals to an almost infinite amount of information that is shared between different users and is stored almost anywhere in the world.
R v Vu 2013 SCC 60, [2013] 3 SCR 657 at [40] and [41].
The controversial Police Crime Sentencing and Courts Bill includes provision for extracting data from electronic devices.
The Bill…
Content type: Video
<br />
Links
- Locked down, our recommedations podcast: privacyinternational.org/video/3788/podcast-locked-down
- Schools and Covid: https://privacyinternational.org/news-analysis/3709/schools-and-covid-19
- Proctoring software and racism: https://www.theverge.com/2021/4/8/22374386/proctorio-racial-bias-issues-opencv-facial-detection-schools-tests-remote-learning
- Covid contact tracing apps: https://privacyinternational.org/long-read/3792/covid-…
Content type: Examples
The Irish Council for Civil Liberties (ICCL) has filed a lawsuit in Hamburg against three AdTech industry trade bodies including the Interactive Avertising Bureau (IAB). Members of the IAB include big tech companies (Google, Facebook, Amazon, Twitter...), data brokers (Equifax, Experian, Acxiom...) and advertising agencies (Groupm, Publicis, IPG...).
The lawsuit follows the filing in 2018 of complaints with the Irish Data Protection Commission (DPC) and UK Information Commissioner (ICO), which…
Content type: Explainer
Where are my images, contacts and documents stored?
You generate data every time you use your phone e.g. you generate data when you take photographs or record videos, when you create or edit notes and documents on the go, and when you add new names and numbers to your contacts directory.
All this data is created through dedicated apps - your camera and photo apps, social media apps, notes apps, and your contacts app are just some examples.
It is important to note that when you create any…
Content type: Examples
When Dallas police posted on Twitter asking for videos of the protests taking place after George Floyd's killing, a flood of videos and images of K-pop stars were uploaded to its anonymous iWatch Dallas tip-off app. Law enforcement can call on vast numbers of networked cameras - from cars, food and retail chains that are typically willing to share with police, law enforcement agencies' own networks of surveillance and body cameras as well as object and face recognition software, protesters and…
Content type: Long Read
The Grand Chamber of the European Court of Human Rights ruled that the UK government’s historical mass interception program violates the rights to privacy and freedom of expression. The Court held that the program “did not contain sufficient “end-to-end” safeguards to provide adequate and effective guarantees against arbitrariness and the risk of abuse.” As a result the Court ruled that UK law "did not meet the “quality of law” requirement and was therefore incapable of keeping the “…