Search
Content type: Long Read
Intrusive surveillance technology is increasingly used during protests around the world, and we’ve been tracking its use around the world for years.This technology is often being deployed in secret, without a clear legal basis and without the safeguards and oversight applied to other surveillance technologies under international human rights law.We’ve increasingly observed the use of unlawfully generated and collected data from these technologies being used in court against people exercising…
Content type: Long Read
What happened?On 19 July 2024, American cybersecurity company CrowdStrike released an update to its CrowdStrike Falcon software that ultimately caused 8.5 million computers running Microsoft Windows to crash. The damage done was both deep and wide: deep because the computers affected were unable to recover without direct user intervention. Wide because a whole range of companies - from airlines to healthcare to media - across a whole range of countries - from Sweden to India to New Zealand -…
Content type: Long Read
18th December is International Migrants Day, a day to recognize both the contributions and continued struggles of migrants across the world.Migrants continue to face an increased level of human rights violations through hostile immigration policies and practices. At borders and beyond, their fundamental human rights and dignity are being violated through old and new technologies. These systems in place reinforce the dehumanising rhetoric of migrants, who are merely seeking asylum and a better…
Content type: Long Read
In this new briefing, we identify the most significant concerns on the UN Countering Terrorist Travel Programme (CTTP), and put forward a range of recommendations to mitigate some of the human rights risks associated with the surveillance of travellers. We based our briefing on publicly available information and our own research, outlining the purposes and activities of this UN programme. We shared a draft of this briefing with the United Nations Office of Counter- Terrorism (OCT), which…
Content type: Advocacy
In the wake of Privacy International’s (PI) campaign against the unfettered use of Facial Recognition Technology in the UK, MPs gave inadequate responses to concerns raised by members of the public about the roll-out of this pernicious mass-surveillance technology in public spaces. Their responses also sidestep calls on them to take action.The UK is sleepwalking towards the end of privacy in public. The spread of insidious Facial Recognition Technology (FRT) in public spaces across the country…
Content type: Advocacy
The rapid expansion of educational technologies (EdTech) has introduced serious concerns about human rights protection in educational spaces. This briefing explores the impact of facial recognition technology (FRT) and heightened surveillance in these settings, highlighting many complex and multifaceted issues that demand careful consideration from a human rights perspective. From the erosion of privacy and the securitisation of educational spaces - that undermines the learning and growth…
Content type: Long Read
Increasingly, EdTech systems are less about teaching than about monitoring, security and ‘safety’ – although those aims are often mixed with wider educational claims.For instance, one company offering “high quality surveillance systems and CCTV for schools including sophisticated infra-red cameras which record in the darkest areas” claimed that these both deter “bad or antisocial behaviour from pupils, parents and visitors” and improve the concentration, productivity and attainment of the…
Content type: Long Read
IntroductionHarnessing new digital technology to improve people’s health is now commonplace across the world. Countries and international organisations alike are devising digital health strategies and looking to emerging technology to help solve tricky problems within healthcare. At the same time, more and more start-ups and established tech companies are bringing out new, and at times innovative, digital tools aimed at health and wellbeing.
Content type: Long Read
IntroductionWith the ongoing expansion of GPS tagging under the UK Home Office's electronic monitoring programme, it has increasingly deployed non-fitted devices (NFDs) that track a person's GPS location and request frequent biometric verification in the form of fingerprint scans.The NFDs deployed by the UK Home Office are small handheld devices with a fingerprint scanner that record a person's location 24/7 (referred to as their trail data). They alert the person at random intervals throughout…
Content type: Long Read
Education is a fundamental human right outlined in the Universal Declaration of Human Rights (Article 26), which states that everyone has the right to education. Schools play a core role in the education of children, but it’s also in schools that children are encouraged to learn to work with others, and to develop their own identities and emotional skills. The education process doesn’t stop there, it continues as children grow and make their way through different higher educational spaces such…
Content type: Long Read
1. What is the issue?Governments and international organisations are developing and accessing databases to pursue a range of vague and ever-expanding aims, from countering terrorism and investigating crimes to border management and migration control.These databases hold personal, including biometric, data of millions if not billions of people, and such data is processed by technologies, including Artificial Intelligence (AI), to surveil, profile, predict future behaviour, and ultimately make…
Content type: Long Read
Elections and political campaigns are increasingly mediated by digital technologies. These technologies rely on collecting, storing, and analysing personal information to operate. They have enabled the proliferation of tailor-made political advertising. The recent proliferation of AI technologies is enabling ever more sophisticated content creation and manipulation in the context of elections.In parallel, governments are continuing to invest in digital technologies for the running of elections…
Content type: News & Analysis
We’ve published a new tech explainer on election technologies in Kenya. The explainer takes a deep dive into the technologies employed to manage and administer the election process in Kenya, such as biometric voter registration (BVR), voter identification, results transmission, and candidate management systems.Electoral processes - along with elections themselves - are one of the largest government data-gathering exercises undertaken, making them susceptible to data exploitation and privacy…
Content type: Advocacy
When it comes to elections around the world, we find ourselves in a terrain that is more and more populated by digital technologies, which have an increasingly critical impact upon the realisation of democracy. Digital technologies used in the context of elections offer new opportunities to support voter participation, whilst simultaneously posing increasing challenges for voters and those who manage and oversee elections. The introduction of technologies into electoral systems in countries…
Content type: Explainer
Many democracies, particularly younger democracies, are increasingly looking to employ technology - including biometrics - to coordinate the running of their electoral processes. Governments give various reasons for the use of these technologies, such as transparency, voter identification, and fighting corrupt practices in attempts to increase confidence in election results.
These databases and the devices used to access and edit them are susceptible to abuse, manipulation, and theft. Moreover…
Content type: Examples
Google has settled a case brought in 2020 by the parents of an Illinois girl who sued the company in state court alleging that it had violated two sections of the Biometric Information Privacy Act. The case also alleged that Google had violated the law by failing to obtain parental consent to collect, store, and use biometric data belonging to millions of children and had illegally harvest other data such as physical location, website histories, personal contact lists, passwords, and…
Content type: Examples
Los Angeles schools superintendent Alberto Carvalho is appointing a task force to find out what went wrong and how to move forward with an AI chatbot intended to issue advice and create individual acceleration plans for every student. The company, AllHere, has apparently collapsed financially, but the school district still has no idea why. Its former manager, Chris Whiteley, has said the company implemented security and privacy in ways that violated school district policy, sound pracctice, and…
Content type: Examples
In an interview conducted by the Los Angeles Unified School District’s investigative team, Chris Whiteley, the former senior director of software engineering at AllHere, explained his concerns with the security and privacy aspects of the design of “Ed”, an AI chatbot intended to assist students. Whiteley says the chatbot placed students’ personally identifiable information at risk by including it in all chatbot prompts, even when the data wasn’t relevant. District leaders need to conduct…
Content type: Examples
Skeptics at an education conference pushed parents to question AI vendors' pitches instead of gambling children's privacy for promises of increased on-campus safety. Even so, schools are increasingly upgrading surveillance systems to incorporate AI and biometrics in the name of safety. Link to article Publication: Biometric UpdatePublication date: 2024-03-07Writer: Jim Nash
Content type: Examples
The ACLU of Maine has criticised the Caribou school district and the Pennsylvania-based biometric education company IdentiMetrics for mishandling a contract by not laying out clear plans for protecting student data. The contract was to supply a biometric finger scanner to track student attendance data; it was cancelled when parents raised concerns about data privacy. IdentiMetrics have further contracts with thousands of other school districts in 48 states. Link to articlePublication: The…
Content type: Examples
Numerous research efforts are developing facial recognition systems for use in classrooms. In one example, researchers at Guilford College are designing a system for classroom management that will use multiple cameras to take attendance, monitor students’ activities, and detect their emotional states, believing that it will reduce stress for teachers. While such use is not illegal and Guilford’s researchers say protecting student privacy is an important part of their design, the ethics and the…
Content type: Long Read
INTRODUCTION
In recent years, major tech platforms have been rapidly evolving their business models. Despite their dominance in various markets, tech giants like Google and Meta are venturing into new territories to expand their user base. One of the most striking ventures has been their foray into the "connectivity market" through substantial, and occasionally unsuccessful, investments in network infrastructure.
Many tech companies are investing resources into network infrastructure, either…
Content type: Long Read
Our briefing, “When Spiders Share Webs: The creeping expansion of INTERPOL’s interoperable policing and biometrics entrench externalised EU borders in West Africa”, explores the concerning human rights implications of the use of interoperable data-driven policing capabilities and biometric technologies in West African countries rolled out by the International Criminal Police Organisation (INTERPOL)’s European Union (EU)-funded West African Police Information System (WAPIS) programme. We make a…
Content type: Long Read
The fourth edition of PI’s Guide to International Law and Surveillance provides the most hard-hitting past and recent results on international human rights law that reinforce the core human rights principles and standards on surveillance. We hope that it will continue helping researchers, activists, journalists, policymakers, and anyone else working on these issues.The new edition includes, among others, entries on (extra)territorial jurisdiction in surveillance, surveillance of public…
Content type: Long Read
IntroductionFor years PI has been documenting the market dominance and associated power of Big Tech over the digital economy, and the threats this poses to our privacy and wider rights.The digital economy is characterised by a handful of Big Tech companies that have established and maintained dominance over the digital market through opaque and exploitative practices. Big Tech exploits the data of those who use their platforms in ways which interfere with our privacy and wider rights. In…
Content type: Long Read
Social media is now undeniably a significant part of many of our lives, in the UK and around the world. We use it to connect with others and share information in public and private ways. Governments and companies have, of course, taken note and built fortunes or extended their power by exploiting the digital information we generate. But should the power to use the information we share online be unlimited, especially for governments who increasingly use that information to make material…
Content type: Long Read
Table of contentsIntroductionWeighing the (potential) benefits with the risksPrivacy rights and the right to healthThe right to healthPrivacy, data-protection and health dataThe right to health in the digital contextWhy the drive for digitalImproved access to healthcarePatient empowerment and remote monitoringBut these same digital solutions carry magnified risks…More (and more connected) dataData leaks and breachesData sharing without informed consentProfiling and manipulationTools are not…