Search
Content type: Long Read
IntroductionHarnessing new digital technology to improve people’s health is now commonplace across the world. Countries and international organisations alike are devising digital health strategies and looking to emerging technology to help solve tricky problems within healthcare. At the same time, more and more start-ups and established tech companies are bringing out new, and at times innovative, digital tools aimed at health and wellbeing.
Content type: Explainer
On International Identity Day, we are highlighting that the technology-driven ID systems being implemented around the world are leading to new forms of surveillance and exclusion.Last September, PI and its global network of partners launched Identity Crisis - a campaign to change the narrative on identity systems. Around the world PI and our partners have seen ID systems creating and facilitating exclusion, insecurity, and surveillance.To learn more, watch our Identity Crisis video, in which…
Content type: Long Read
In June 2023, the UK government announced its proposal to expand its surveillance powers by, among others, forcing communications operators to undermine encryption or abstain from providing security software updates globally. Building on our response to the government’s plans, this piece explains why what they want to do puts every one of us at risk.
Why your trust (to technologies you use) matters
Surveillance and privacy are complex concepts to grasp – it’s part of the appeal to us at PI.…
Content type: Advocacy
We are responding to the UK Government's consultation to expand its powers around Technical Capabilities Notices and National Security Notices.
Background
Following Edward Snowden's revelations about the illegal and expansive secret powers of the US and UK intelligence agencies, the UK Government took the opportunity to, rather than reflect on what powers are proportionate in the modern era, to expand its arsenal of surveillance powers.
One of the powers it added was the ability to issue…
Content type: Examples
In December 2019, a Brazilian public security programme, called the Integrated Border Operations Center (CIOF) was presented. The CIOF aims to combat transnational organised crime in the region of Foz do Iguaçu and the Triple Border Area1, shared by Argentina, Brazil, and Paraguy, and integrate different public security agents through a centralised system.
It has been reported that CIOF is part of a wider digital security apparatus being deployed in the Triple Border Area, that there is…
Content type: Examples
A vulnerability in the Bono Familiar Universal, the platform used to distribute the financial subsidy provided to households in precarious economic situation by the Peruvian government in response to the Covid-19 pandemic, enabled the subsidy to be accessed by malicious individuals.
The vulnerability was reported by Deep Security, and it was resolved but an undetermined number of malicious individuals were able to pose as beneficiaries to access the platform and collect the subsidy themselves…
Content type: Key Resources
ID systems create their own reality: they create a situation where ID is needed for more things and more actors, which only increases people’s vulnerability to their data being misused or abused.
Content type: Long Read
The global COVID-19 health crisis not only induced a public health crisis, but has led to severe social, economic and educational crises which have laid bare any pre-existing gaps in social protection policies and frameworks. Measures identified as necessary for an effective public health response such as lockdowns have impacted billions workers and people's ability to sustain their livelihood worldwide, with countries seeing unprecedented levels of applications for welfare benefits support,…
Content type: Key Resources
The first step when looking at technology is to find basic information about it - to define and categorise it. Looking at the Wikipedia page of a given technology is often a good starting point and will help you clarify what is implied within a technology (for example for Facial recognition). This is particularly useful when there is no specific technology that is mentioned in the partnership or when you are looking at a tender. You might also want to check the company’s marketing materials to…
Content type: Long Read
In a roundtable available on YouTube, co-hosted with Garden Court Chambers, Privacy International brought together immigration law practitioners to discuss how they’ve used privacy and data protection law to seek information or redress for their clients.
Index:
1. UK Border 2025
2. Super-complaint and judicial review challenge to data sharing
3. Mobile phone seizure and extraction
4. Freedom of Information Act requests
The dystopian future: UK Border 2025
To set the scene on how the…
Content type: Long Read
Governments around the world are increasingly making registration in national digital ID systems mandatory for populations, justifying its need on a range of issues from facilitating access to services, to national security and fighting against corruption. This is an attempt to create a "foundational identity" for an individual, or "a single source of truth" about who someone is, according to a government agency. These identity systems are run by governments, sometimes by private companies, or…
Content type: Press release
Dear TECNO,
We, the undersigned, don’t believe that privacy should be a luxury. And yet, when TECNO manufacture and sell phones with an outdated operating system, that’s the world TECNO are helping to create.
Our recent investigation into the TECNO Y2 showed that at least one TECNO phone is currently on sale with an operating system that hasn’t received updates since 2013. We are concerned because this is leaving users vulnerable to hundreds of well-known and serious exploits.
The Y2 was…
Content type: Advocacy
Dear TECNO,
We, the undersigned, don’t believe that privacy should be a luxury. And yet, when TECNO manufacture and sell phones with an outdated operating system, that’s the world TECNO are helping to create.
Our recent investigation into the TECNO Y2 showed that at least one TECNO phone is currently on sale with an operating system that hasn’t received updates since 2013. We are concerned because this is leaving users vulnerable to hundreds of well-known and serious exploits.
The Y2 was…
Content type: Press release
Privacy International research released today shows that the brand new TECNO Y2 phone is being sold with outdated versions of the Android operating system. The version of Android, which is from 2013, no longer receives security updates, and contains over 200 known vulnerabilities. The phone also comes with pre-installed apps that the users cannot uninstall. What this means is that the privacy and security of people using TECNO’s Y2 phones can be at risk.
TECNO are a phone manufacturer based in…
Content type: Long Read
When you buy a brand-new low-cost phone, it’s likely to come pre-installed with insecure apps and an outdated operating system. What this means is that you or your loved ones could be left vulnerable to security risks or to having their data exploited. Privacy shouldn’t be a luxury. That’s why we advocate for companies to provide the latest security features and privacy protections for both low- and high-cost phones.
Content type: Long Read
For many, browsing the internet or checking social media comes with its fair share of being targeted with ads selling “fad diet” subscription-based programmes, magic weight-loss powders, or promising a secret trick to lose weight quickly. Some of the products and programmes sold have been described as scams, with a very real impact for those suffering from eating disorders and those who fall prey to these ads. This is even more problematic due to the Covid-19 pandemic, which has seen the…
Content type: Long Read
Social protection programmes can be broadly understood as government support for individuals to meet basic human needs, protecting citizens from the “economic risks and insecurities of life”. These policies and programmes are essential to reducing the lifelong consequences of poverty and exclusion. Programmes like cash transfers – including child grants, school meals, skills development and more – help connect families with health care, nutritious food and quality education. To ensure that…
Content type: Long Read
Since the September 11th attacks, decision makers across the globe have embraced overreaching surveillance technologies. The global “War on Terror” ushered in and normalized an array of invasive surveillance technologies. Collection and storage of biometrics data and the application of statistical methods to such data have been touted as uniquely suited to twenty-first century threats. Yet, biometrics technologies are not seamless, panoptic technologies that allow for perfect control. They can…
Content type: Long Read
This piece was last updated in June 2021.
In many countries, access to social protection (such as welfare programmes or healthcare) is made conditional on producing a form of identification (“ID”). But obtaining a recognised and accurate ID is often a process riddled with discriminatory designs, bureaucracy and technical failures that prevent individuals from accessing the services they are entitled to. Even when people eventually get an ID, it might not accurately reflect who they are,…
Content type: Explainer
The UK Home Office provides basic subsistence support to people who are in the process of applying for asylum, as well as to those whose applications have been refused and are appealing their cases, in the form of an ‘Aspen Card’ - basically it’s a debit payment card, which can be used in any shop that accepts VISA debit payments. At the time of writing the programme is managed by corporate giant corporate giant Sodexo, but the administration of the payment system is soon going to go to a new…
Content type: Examples
A study of 17 Android mobile contact tracing apps from 17 different countries found that most government-sponsored contact tracing apps are insecure and risk exposing users’ privacy and data. The researchers used the presence or absence of six basic hardening techniques: name obfuscation (just one app of the 17), string encryption (29%), asset/resource encryption (6%), class encryption (6%), root detection (41%), and emulator detection (18%) as indicators of the overall level of in-app security…
Content type: Case Study
Como is one of the most advanced cities in Italy in the use of facial recognition technology (FRT). An investigation for the Italian Wired magazine published in June 2020 exposed how the system had been bought, installed and tested for months with little transparency and despite the lack of a clear legal framework.
The investigation was entirely based on tools available to everyone, such as Freedom of Information requests (FOI requests. Similar to PI’s campaign 'Unmasking policing, inc', it…
Content type: Examples
A detailed analysis of Pakistan’s app, which was developed by the Ministry of IT and Telecom and the National Information Technology Board and which offers dashboards for each province and state, self-assessment tools, and popup hygiene reminders, finds a number of security issues. Among them: the app uses hard-coded credentials, which it sends insecurely, to communicate with the government server, and it downloads the exact coordinates of infected people in order to provide a map of their…
Content type: Examples
Excluded groups such as sex workers and asylum seekers are being left behind in the UK’s COVID-19 response as control measures amplify existing health inequalities and put life-saving advice and care further out of reach.
The closure of services and some GP registrations, a lack of access to technology, distrust and fear of authorities, unsuitable or insecure accommodation, and reduced income are among the many challenges facing people in vulnerable circumstances in England.
Doctors of…
Content type: News & Analysis
Humanitarian organisations are defined by their commitment to core, apolitical principles, including: humanity, impartiality, neutrality, independence and to “do no harm”.
And yet the ways data and technology are being used in the world today are often far from being apolitical, humane, impartial, neutral and independent, and in many instances many actors are using technology to exploit people, failing to protect and empower many individuals and communities - in particular those most in need…
Content type: Long Read
This research was commissioned as part of Privacy International’s global research into data exploitative technologies used to curtail women’s access to reproductive rights.
Read about Privacy International’s Reproductive Rights and Privacy Project here and our research findings here.
1. What are the barriers to access safe and legal abortion care?
Even though abortion is legal in certain cases in Argentina, different types of barriers restrict the access to legal abortions, contribute…
Content type: Advocacy
Last week, Privacy International joined more than 30 UK charities in a letter addressed to the British Prime Minister Boris Johnson, following his recent declaration, asking him to lift No Recourse to Public Funds (NRPF) restrictions.
Since 2012, a ‘NRPF condition’ has been imposed on all migrants granted the legal right to live and work in the UK. They are required to pay taxes, but they are not permitted to access the public safety net funded by those taxes.
This is not a topic we are known…
Content type: Report
It is common for families with no recourse to public funds who attempt to access support from local authorities to have their social media monitored as part of a 'Child in Need' assessment. This practice appears to be part of a proactive strategy on the part of local authorities to discredit vulnerable families in order to refuse support. In our experience, information on social media accounts is often wildly misinterpreted by local authorities who make serious and unfounded allegations…
Content type: Long Read
Commercial interests seem to often overshadow the EU’s stance as a global privacy leader. After looking at Europes's shady funds to border forces in the Sahel area, Niger's new biometric voting system, and attempts to dismantle smugglers networks powered by Europe's gifts of surveillance, freelance journalist Giacomo Zandonini looks at the battle for data protection and digital rights in the continent.
What do a teenage labourer on a marijuana farm in Lesotho, a…