Search
Content type: News & Analysis
To fully understand when, how and why asylum seekers are monitored via the Aspen Card, we need more information.
In February this year we launched our ‘Stop Spying on Asylum Seekers’ campaign, demanding that the UK Home Office ceases surveillance of asylum seekers through the payments they make on their ‘Aspen Card’ debit payment card.
Over 200 people wrote to the Home Office. We are grateful for the pressure that every one of you have applied to the Home Office.
You can read our explainer…
Content type: News & Analysis
The Aspen Card - the debit payment card given to asylum seekers that PI has previously exposed as a de facto surveillance tool - will be outsourced to a new company. The contract with Sodexo has come to an end and the company Prepaid Financial Services will be taking over.
Our campaign for transparency in relation to the Aspen Card and how it monitors asylum seekers continues. Not only do we demand clarity from the Home Office [read more here], we believe the new provider, Prepaid Financial…
Content type: Video
Links
Listen to Love Letter and find more from Sepia on Soundcloud: https://soundcloud.com/sepiamusicuk/love-letter (he's also on most other music platforms!)
Find out more about Dark Patterns: https://www.darkpatterns.org/
The Electronic Freedome Foundation on what comes after cookies: https://www.eff.org/issues/online-behavioral-tracking
WHO on COVID vaccine safety: https://www.who.int/news-room/q-a-detail/coronavirus-disease-(covid-19)-vaccines-safety
COVID and…
Content type: Explainer
What is social media monitoring?
Social media monitoring refers to the monitoring, gathering and analysis of information shared on social media platforms, such as Facebook, Twitter, Instagram and Reddit.
It may include snooping on content posted to public or private groups or pages. It may also involve “scraping” – grabbing all the data from a social media platform, including content you post and data about your behaviour (such as what you like and share).
Through scraping and other tools…
Content type: Explainer
What are my 'unique identifiers' and where are they stored?
Your phone and your SIM card contain unique identifiers about you, which can be accessed by the police to identify you.
The IMSI (International Mobile Subscriber Identity) is a unique number associated with your SIM card. It doesn't change, even if you put the SIM card into a different phone.
If you have a mobile phone subscription, the IMSI will be associated with personal information such as your name and address.
The IMEI (…
Content type: Explainer
Where are my communications stored?
Text messages/phone calls: Traditional cellphone communications happen over the cellular network. You usually access those with the text message and phone call apps that are provided as standard on your phone. While phone calls aren’t stored anywhere, text messages are stored locally on your and the recipient’s devices. They might also be temporarily stored by the network provider.
Messaging apps: Messaging platforms enable fairly secure communication…
Content type: Explainer
What is predictive policing?
Predictive policing programs are used by the police to estimate where and when crimes are likely to be committed – or who is likely to commit them. These programs work by feeding historic policing data through computer algorithms.
For example, a program might evaluate data about past crimes to predict where future crimes will happen – identifying ‘hot spots’ or ‘boxes’ on a map. But the data these programs use can be incomplete or biased, leading to a ‘feedback…
Content type: Explainer
What is LEDS?
LEDS is a new mega-database currently being developed by the UK Home Office.
LEDS will replace and combine the existing Police National Database (PND) and the Police National Computer (PNC). The aim is to provide police and others with a super-database, with on-demand, at the point of need access, containing up-to-date and linked information about individuals’ lives.
Once your details are in LEDS, numerous agencies will have access to that information (e.g. HMRC and DVLA),…
Content type: Explainer
What are police drones?
Drones are remotely controlled Unmanned Aerial Vehicles (UAVs) of varying sizes.
They usually come equipped with cameras and might be enabled with Facial Recognition Technology.
Drones can be equipped with speakers, surveillance equipment, radar and communications interception tools, such as ‘IMSI catchers’.
How might drones be used during protests?
Camera-enabled drones may be used to remotely monitor and track people’s movements in public spaces, including at…
Content type: Explainer
What do Body Worn Video cameras do?
Body worn video (BWV) cameras can be attached to a police officer’s clothing – often at chest, shoulder or head level – and record video, including sound, from the officer’s perspective.
BWV cameras will probably be visible to you, and when it’s recording, a flashing light should appear on the device.
How might body worn video cameras be used at a protest?
BWV cameras may be used at protests to monitor actions of protestors.
They do not usually…
Content type: Explainer
What is gait recognition technology?
Gait recognition technology (GRT) can analyse the shape of an individual’s body and the unique way in which that body moves when walking or running, which can then be used to identify them.
GRT works in a similar way to facial recognition technology. But the two main differences are:
GRT may be used at a fairly long range (at the time of writing, about 165 feet / 50 metres), unlike FRT which generally requires more close up, detailed facial images…
Content type: Explainer
What is Facial Recognition Technology?Facial recognition technology (FRT) collects and processes data about people’s faces, and can be used to identify people. FRT matches captured images with images stored in existing databases or ‘watchlists’.How might it be used in relation to a protest?FRT may be used to monitor, track and identify people’s faces in public spaces, including at protests. This may be done openly or surreptitiously, without people knowing or consenting.FRT-enabled cameras can…
Content type: Explainer
What is hacking?
Hacking refers to finding vulnerabilities in electronic systems, either to report and repair them, or to exploit them.
Hacking can help to identify and fix security flaws in devices, networks and services that millions of people may use. But it can also be used to access our devices, collect information about us, and manipulate us and our devices in other ways.
Hacking comprises a range of ever-evolving techniques. It can be done remotely, but it can also include physical…
Content type: Explainer
What is an IMSI catcher?
‘IMSI’ stands for ‘international mobile subscriber identity’, a number unique to your SIM card. IMSI catchers are also known as ‘Stingrays’.
An ‘IMSI catcher’ is a device that locates and then tracks all mobile phones that are connected to a phone network in its vicinity, by ‘catching’ the unique IMSI number.
It does this by pretending to be a mobile phone tower, tricking mobile phones nearby to connect to it, enabling it to then intercept the data from that phone…
Content type: Explainer
What are ‘cloud extraction tools’ and what do they do?
Cloud extraction technology enables the police to access data stored in your ‘Cloud’ via your mobile phone or other devices.
The use of cloud extraction tools means the police can access data that you store online. Examples of apps that store data in the Cloud include Slack, Instagram, Telegram, Twitter, Facebook and Uber.
How might cloud extraction tools be used at a protest?
In order to extract your cloud data, the police would…
Content type: Advocacy
This report is presented by TEDIC (Technology and Community Association) and Privacy International (PI). TEDIC is a non-governmental, non-profit organization, based in Asunción, that promotes and defends human rights on the Internet and extends its networking to Latin America. PI is a London based human rights organization that works globally at the intersection of modern technologies and rights.
TEDIC and PI wish to express some concerns about the protection and promotion of the right to…
Content type: Video
Remember: sign our ECI! pvcy.org/banbiometrics
And you can find our survey here: pvcy.org/tpsurvey
Links
Facebook Leak
- Facebook Leak: https://www.businessinsider.com/stolen-data-of-533-million-facebook-users-leaked-online-2021-4?r=US&IR=T
- Mark Zuckerburg on signal?: https://www.thesun.co.uk/tech/14595265/mark-zuckerberg-using-whatsapp-rival-signal/
- Irish DPA investigation: https://www.cnet.com/news/facebook-under-investigation-in-europe-over-massive-personal-data-leak…
Content type: Explainer
What do mobile phone extraction tools do?
Mobile phone extraction (MPE) tools are devices that allow the police to extract data from mobile phones, including:
contacts;
call data (i.e. who you call, when, and for how long);
text messages (including who you texted and when);
stored files (photos, videos, audio files, documents etc);
app data (including the data stored on these apps);
location information history;
wifi network connections (which can reveal the locations of any…
Content type: News & Analysis
This article was written by Jamila Venturini from Derechos Digitales. The original version (in Spanish) is available here.
While at the international level there is a growing demand to ban the use of surveillance technologies until rigorous human rights standards are achieved, in Latin America we observe a new and silent tendency to acquire and use such systems to control access to social protection, i.e., to policies developed to reduce poverty, social vulnerability and exclusion…
Content type: Long Read
The role of the Human Rights Act in shaping UK jurisprudence has been discussed at length since the European Convention on Human Rights was brought into UK law. This ongoing discussion was recently fueled by former UK Supreme Court judge Jonathan Sumption’s Reith Lectures, where he voiced concerns in relation to European Court of Human Rights (ECtHR) jurisprudence specifically in relation to Article 8 and the right to privacy.
We disagree with this view. The Human Rights Act has led…
Content type: News & Analysis
This blog post by Coding Rights was originally published in Portuguese at: https://tinyurl.com/mediumcodingrightsTransID. It was written by Mariah Rafaela Silva and Joana Varon and translated by Erly Guedes. Illustration was produced by Clarote.On the International Transgender Day of Visibility, Mariah Rafaela Silva and Joana Varon authors of the report “Facial recognition in the public sector and trans identities: techno-politics of control, surveillance and threats to gender diversity…
Content type: Report
Human rights defenders across the world have been facing increasing threats and harms as result of the use of digital and technological tools used by governments and companies which enable the surveillance, monitoring and tracking of individuals and communities. They are continuously at risk of violence, intimidation and surveillance as a direct consequence of the work they do. Such surveillance has been shown to lead to arbitrary detention, sometimes to torture and possibly to extrajudicial…
Content type: Long Read
This article was written by Sameet Panda and Vipul Kumar.
Over the last couple of years, there has been a push towards digitising the PDS, which includes linkage with the Aadhaar (India’s biometric identification system) and maintenance of digital records at Fair Price Shops that distribute the ration, among other initiatives. Without taking into account the availability of appropriate digital infrastructure and access among beneficiaries, these initiatives have been unable to solve…
Content type: Examples
Sidestepping the need to obtain a search warrant, the US Department of Homeland Security (DHS) has been accessing smartphone location data by buying it from private marketing that typically embed tracker in apps. This data, which maps the movement of millions of cellphones in America, was collected from ordinary cellphone apps, to which users gave access to their location. In this particular instance, it was used by the DHS to search for undocumented immigrants according to the Wall Street…
Content type: Video
Content warning: this episode includes some disturbing stories of people who have died after having their benefits cut or withdrawn by the UK Department of Work and Pensions
Links
Find out more about the DWP's surveillance
Find out more about the DWP's alogrithim
You can find out more about each of the cases of people who died after their benefits withdrawn below:
Errol Graham
The 5,000
Jodey Whiting
Phillipa Day
David Clapson
If you're having problems navigating the UK's…
Content type: News & Analysis
We have set out our understanding of the NFI’s current functioning here.
The National Fraud Initiative is a data-matching exercise overseen by the Cabinet Office which allows a range of public and private sector entities to access personal data, exclusively for the purposes of preventing and detecting fraud. A current government consultation suggests expanding the NFI to include four new, wide-ranging purposes:
Data-matching to assist in the prevention and detection of crime (other than…
Content type: Explainer
You can access PI’s response to the consultation here.
This explainer is based on PI’s analysis and understanding of:
The Consultation text
The Draft Code of Data Matching Practice
The Cabinet Office’s data specifications for the public and private sector
The Cabinet Office’s 2015 case-studies both for the public and private sector
The Data Protection Impact Assessment for the current iteration of the National Fraud…
Content type: Examples
As Europeans went back to work and social spaces in early summer 2020, they discovered that these had been newly equipped with a variety of technologies that brought surveillance with them as the price of preventing a resurgence of the coronavirus. Among the tools being adopted: a Romware Covid Radius bracelet, which beeps whenever two workers get too close to each other; laser technology to ensure social distancing in shopping malls; mask detection technology, facial recognition to ensure…