Search
Content type: Long Read
Over the last two decades we have seen an array of digital technologies being deployed in the context of border controls and immigration enforcement, with surveillance practices and data-driven immigration policies routinely leading to discriminatory treatment of people and undermining peoples’ dignity.And yet this is happening with little public scrutiny, often in a regulatory or legal void and without understanding and consideration to the impact on migrant communities at the border and…
Content type: Examples
The Finnish government will not move forward with its plan to oblige unsuccessful asylum seekers to wear ankle monitors, Maria Ohisalo, the Minister of the Interior, stated on Tuesday. “It’s something that’d be difficult to carry out as it’s considered in the government programme,” she said. “The conclusion drawn from the assessment is that it wouldn’t be cost-effective.”
The government programme states that a process will be initiated to amend the aliens act to lay down provisions on “…
Content type: Examples
Thousands of Muscovites ordered to download a hastily-developed app to enforce their quarantine report that they have been wrongly geolocated and fined and that the app has trapped them into compliance criteria that are impossible to meet. The app, which demands an exceptionally broad range of permission and stores the data on Moscow’s servers for a year, is compulsory for everyone with respiratory disease symptoms. Officials say it has helped keep the city’s death rate as low as 3.8%. Some…
Content type: Examples
Russian authorities are considering introducing an app that migrant workers will be required to download when they enter the country. Leaked details indicate that the app would contain detailed biometric data, health status, police records, and a “social trustworthiness” rating. It’s unclear whether the app would access other data such as geolocation and user content. Other aspects of surveillance are also expanding in Russia, such as using Moscow’s surveillance camera system to track those…
Content type: Advocacy
Privacy International responded to the call for submissions on Zimbabwe’s Cyber Security and Data Protection Bill, 2019.
According to its Memorandum, the Bill seeks to “consolidate cyber related offences and provide for data protection with due regard to the Declaration of Rights under the Constitution and the public and national interest.” The Bill also proposes the establishment of a Cyber Security Centre and a Data Protection Authority.
In its submission, PI applauds the positive aspects…
Content type: News & Analysis
At a time where the mass surveillance of protests has been at the forefront, the UN High Commissioner for Human Rights released a timely report on the impact of new technologies on the promotion and protection of human rights in the context of assemblies, including peaceful protests.
The new report highlights the strong ties between protest and privacy and warns that “…the use of some such technologies to surveil or crack down on protesters can lead to human rights violations, including…
Content type: Case Study
The EU have been using foreign aid budgets, not to lift people out of poverty, but to export surveillance technologies used to repress people’s human rights all over the world.
A wave of anti-immigration fervour has swept across Europe in recent years. As leaders have come to power across Europe either on anti-immigration platforms or having to respond to an anti-immigration sentiment, the EU’s recent policies have been shaped by the drive to stop migration to Europe.
Surveillance…
Content type: Long Read
What Do We Know?
Palantir & the NHS
What You Don’t Know About Palantir in the UK
Steps We’re Taking
The Way Forward
This article was written by No Tech For Tyrants - an organisation that works on severing links between higher education, violent tech & hostile immigration environments.
Content type: Case Study
Facial recognition technology (FRT) is fairly present in our daily lives, as an authentication method to unlock phones for example. Despite having useful applications, FRT can also be just another technology used by those in power to undermine our democracies and carry out mass surveillance. The biometric data collected by FRT can be as uniquely identifying as a fingerprint or DNA. The use of this technology by third parties, specially without your consent, violates your right to privacy.
The…
Content type: Long Read
In April 2018, Amazon acquired “Ring”, a smart security device company best known for its video doorbell, which allows Ring users to see, talk to, and record people who come to their doorsteps.
What started out as a company pitch on Shark Tank in 2013, led to the $839 million deal, which has been crucial for Amazon to expand on their concept of the XXI century smart home. It’s not just about convenience anymore, interconnected sensors and algorithms promise protection and provide a feeling of…
Content type: Explainer
The internet is filled with guides on how to file a Freedom of Information (FOI) request. Depending on the country you are in, it is likely that a local NGO – or your national freedom of information authority. – will have come up with one. The Global Investigative Journalism Network has an excellent list of FOI resources available in many countries across every continent. We really recommend you take a look at it; many of the FOI guides we love are in that repository.At PI we equally spend much…
Content type: Case Study
The Ugandan government has a running contract with the Chinese tech giant, Huawei, to supply and install CCTV cameras along major highways within the capital, Kampala, and other cities.
While details of the contract remain concealed from the public, the Uganda Police Force (UPF) released a statement, simply confirming its existing business partnership for telecommunication and surveillance hardware, and software between the security force and Huawei. However, it is not clear whether the…
Content type: Case Study
Well into the 21st century, Serbia still does not have a strong privacy culture, which has been left in the shadows of past regimes and widespread surveillance. Even today, direct police and security agencies’ access to communications metadata stored by mobile and internet operators makes mass surveillance possible.
However, a new threat to human rights and freedoms in Serbia has emerged. In early 2019, the Minister of Interior and the Police Director announced that Belgrade will receive “a…
Content type: Report
The majority of people today carry a mobile phone with them wherever they go, which they use to stay connected to the world. Yet an intrusive tool, known as an International Mobile Subscriber Identity catcher, or “IMSI catcher” is a form of surveillance equipment that enables governments and state authorities to conduct indiscriminate surveillance of mobile devices, and by extension, on users.
IMSI catchers can do much more than monitor and intercept mobile communications. Designed to imitate…
Content type: News & Analysis
IMSI catchers (or stingrays as they are known in the US) are one of the surveillance technologies that has come to the forefront again in the protests against police brutality and systemic racism that have been sparked by the murder of George Floyd on 25 May 2020.
An International Mobile Subscriber Identity catcher – in short an “IMSI catcher” – is an intrusive piece of technology that can be used to locate and track all mobile phones that are switched on in a certain area. It does so by…
Content type: Case Study
Chinese artist Ai Weiwei creates art that highlights the harmful effects of surveillance on society — and is himself a target of persistent surveillance by the Chinese government. In an article for Agence France-Presse, he said, "In my life, there is so much surveillance and monitoring -- my phone, my computer ... Our office has been searched, I have been searched, every day I am being followed, there are surveillance cameras in front of my house.”
Weiwei is an artist, blogger, documentary…
Content type: Press release
Today, the ICO has issued a long-awaited and critical report on Police practices regarding extraction of data from people's phones, including phones belonging to the victims of crime.
The report highlights numerous risks and failures by the police in terms of data protection and privacy rights. The report comes as a result of PI’s complaint, dating back to 2018, where we outlined our concerns about this intrusive practice, which involves extraction of data from devices of victims, witnesses…
Content type: Advocacy
Privacy International (PI), Fundaciòn Datos Protegidos, Red en Defensa de los Derechos Digitales (R3D) and Statewatch responded to the call for submission of the UN Special Rapporteur on contemporary forms of racism, xenophobia and related intolerance on how digital technologies deployed in the context of border enforcement and administration reproduce, reinforce, and compound racial discrimination.
This submission provides information on specific digital technologies in service of border…
Content type: Long Read
There are few places in the world where an individual is as vulnerable as at the border of a foreign country.As migration continues to be high on the social and political agenda, Western countries are increasingly adopting an approach that criminalises people at the border. Asylum seekers are often targeted with intrusive surveillance technologies and afforded only limited rights (including in relation to data protection), often having the effect of being treated as “guilty until proven…
Content type: Explainer
Hello friend,
You may have found your way here because you are thinking about, or have just submitted, a Data Subject Access Request, maybe to your Facebook advertisers like we did. Or maybe you are curious to see if Policing, Inc. has your personal data.
The right to access your personal data (or access right) is just one of a number of data rights that may be found in data protection law, including the European Union's General Data Protection Regulation, better known as "GDPR", which took…
Content type: Examples
Immunity passports, under consideration in a number of countries, may violate US disability law, enable discrimination, and create a two-tiered exclusionary society. They are not really comparable to vaccination cards for diseases such as yellow fever or meningitis, which are required for entry into a number of countries or universities, because in those cases vaccines are available. Antibody testing for COVID-19, however, has many uncertainties, as the extent to which antibodies confer…
Content type: News & Analysis
For the past few weeks, people across the world, starting in the US, have taken to the streets to protest the murder of George Floyd, a victim of police brutality. The protests, which are organised by and in support of the Black Lives Matter movement have also become a platform to protest against state sponsored violence and systematic racism against black people.
The majority of articles and media focus have so far focused on what happens during the protest, namely an increasingly militarised…
Content type: Long Read
In December 2019, the Information Rights Tribunal issued two disappointing decisions refusing appeals brought by Privacy International (PI) against the UK Information Commissioner.
The appeals related to decisions by the Information Commissioner (IC), who is responsible for the UK’s Freedom of Information regime, concerning responses by the Police and Crime Commissioner for Warwickshire and the Commissioner of Police for the Metropolis (The Metropolitan Police) to PI’s freedom of information…
Content type: Examples
Cameras repurposed as "fever-detecting" aren't designed for and are not very good at detecting infections, but businesses, airlines, major employers, and public officials are nonetheless reacting to the coronavirus pandemic by spending large sums to buy them without understanding their limitations. The systems can detect elevated skin temperatures, but aren't precise enough to be able to identify the cause. In addition, many people who develop COVID-19 don't have fevers. The scanners have not…
Content type: Examples
Many of the technologies used to combat the coronavirus pandemic, including monitoring and analysing social media posts, telecommunications location data, and the use of sensors, were first tested on refugees during the 2015 crisis and are now being repurposed in the name of public health. In 2019, the European border security agency Frontex published a €400,000 tender for social media analysis services hoping to better predict future migration patterns; the tender was withdrawn after an…
Content type: People
Ksenia is a Legal Officer at PI. She leads PI’s programme focusing on police surveillance technologies, data exploitation and the law. She is also responsible for legal research and litigation on surveillance and data protection. Prior to joining PI, Ksenia taught law at Queen Mary, University of London and Royal Holloway, University of London.
Ksenia has a PhD from Queen Mary, University of London. Her research examined the contemporary phenomenon of ‘revenge pornography’ and analysed…
Content type: News & Analysis
On June 9th, in light of the global debate against racial injustices, the company IBM announced they would stop selling facial recognition. In a letter to the US congress, they demanded a “national dialogue on whether and how facial recognition technology should be employed by domestic law enforcement agencies.”
It is worth noting first of all that it is not entirely clear that IBM is actually stopping facial recognition. The letter states that "IBM no longer offers general purpose IBM facial…
Content type: News & Analysis
Yesterday, Amazon announced that they will be putting a one-year suspension on sales of its facial recognition software Rekognition to law enforcement. While Amazon’s move should be welcomed as a step towards sanctioning company opportunism at the expense of our fundamental freedoms, there is still a lot to be done.
The announcement speaks of just a one-year ban. What is Amazon exactly expecting to change within that one year? Is one year enough to make the technology to not discriminate…
Content type: Examples
The UK's Project OASIS collects data from third-party app providers that are collecting COVID-19 symptoms and demographic data to help the NHS respond to the COVID-19 pandemic. The Ministry of Defence Strategic Command's technology innovation hub, JHub, has been brought in to provide assistance and coordination, and to facilitate the secure transfer of relevant symptom and epidemiology data from the third-party apps to NHSx. Part of JHub's role is to remove any identifying information, erase…