Search
Content type: Examples
China is adding new features to its coronavirus surveillance app, which has helped many workers and employers return to their former lives, and looks likely to become a permanent fixture. Zhou Jiangyong, the Communist Party secretary of the eastern city of Hangzhou, has said the city's app, which it has begun linking to citizens' medical records, should become a beloved "intimate health guardian" for residents, who can use it to schedule hospital visits. The authorities are considering…
Content type: Examples
The UK government, in collaboration with universities, water companies, and public research bodies, is preparing to launch a national research programme to develop an early warning system for future waves of COVID-19 by detecting the coronavirus in sewage. About half of those infected with SARS-CoV-2 excrete it in their faeces, and enough virus survive to be detectable in untreated water using ultrasensitive PCR analysis. Teams in the UK, several other European countries, Australia, Israel, and…
Content type: Examples
In a preprint study of primary sewage sludge from a northeastern US metropolitan area, researchers detected SARS-CoV-2 RNA in all environmental samples and found that the concentrations of virus RNA were highly correlated with the COVID-19 epidemiological curve and local hospital admissions. The RNA concentrations were a seven-day leading indicator ahead of compiled COVID-19 testing data, and led hospital admissions by three days. Collecting environmental samples at a wastewater treatment…
Content type: Examples
As part of a survey of the human rights compliance of contact tracing apps Amnesty International's Security Lab discovered that security vulnerabilities in Qatar's mandatory contact tracing app, EHTERAZ, would have allowed attackers to access the personal information, including name, national ID, health status, and location data, of the app's more than 1 million users because the central server did not have security measures in place to protect the data. The authorities fixed the problem within…
Content type: Examples
South Korea's second spike in coronavirus cases was curbed via a contact tracing regime that uses credit card records, mobile phone tracking, and GPS location data in order to track the previous movements of infected individuals working alongside efficient diagnostic testing. Successfully tracing an outbreak in Itaewon to a gay barhopper, however, led to reports of homophobic abuse targeted at the South Korean LGBTQIA community, and online criticism has led some who should be self-isolating to…
Content type: Examples
On the day South Korea relaxed its social distancing measures, a 29-year-old man tested positive for COVID-19. The previous weekend, he had visited five nightclubs in the gay district of Itweon in Seoul, mingling with around 7,200 other people. After nearly 80 new COVID-19 cases have been linked to that one man's outing, the mayor ordered all clubs and bars closed indefinitely, and led officials to push back reopening schools by a week. Soon aftewards, another infected man was found to have…
Content type: Examples
Estonia has begun testing its Immuunsuspass app, which was developed for the Back to Work NGO by the Estonian technology firms Transferwise and Guardtime working with health specialists. The app, which is intended to help schools and employers make decisions, will have to pass scientific consensus before being approved for use. It allows users to access COVID-19 test results for an hour after proving their identity, and issues them with a QR code valid for one minute that they can use to show…
Content type: Examples
Numerous companies are repurposing their body monitors, asset trackers, and electronic ankle monitors and marketing them to the newly-created market for strap-on surveillance bracelets to enforce quarantine and social distancing including companies such as AiRISTA Flow. Redpoint Positioning Corporation, Israel-based SuperCom.
https://theintercept.com/2020/05/25/coronavirus-tracking-bracelets-monitors-surveillance-supercom/
Writer: Sam Biddle
Publication: The Intercept
Content type: News & Analysis
Traduction réalisée par Nadine Blum.
Le 29 mai, le Congrès nigérien a voté une loi permettant au gouvernement d’intercepter largement certaines communications électroniques. La loi rend légale l’interception de communications, autorisée par le gouvernement, sans protections appropriées ni mécanismes de contrôle.
La loi a été adoptée avec 104 votes pour – le Parlement nigérien compte 171 membres – et sans la participation de l’opposition qui a boycotté la loi. L’opposition a affirmé…
Content type: Long Read
1. What are the barriers to access safe and legal abortion care?
The Indian state’s approach to reproductive rights historically has focused on population control rather than enhancing individual autonomy and removing structural barriers to reproductive health services, which is reflected in the barriers to provision of services. As a consequence of the early adoption of family planning and population control measures in the 1950s, India was one of the first countries to legislate on abortion…
Content type: Video
Given everything that's happening at the moment around the world, we've decided to postpone our episode on ID in Kenya until next week.
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Some of the resources we mentioned in the episode can be found here:
ACLU: know your rights: https://www.aclu.org/know-your-rights/protesters-…
Content type: News & Analysis
Humanitarian organisations are defined by their commitment to core, apolitical principles, including: humanity, impartiality, neutrality, independence and to “do no harm”.
And yet the ways data and technology are being used in the world today are often far from being apolitical, humane, impartial, neutral and independent, and in many instances many actors are using technology to exploit people, failing to protect and empower many individuals and communities - in particular those most in need…
Content type: News & Analysis
On 29 May, Niger’s Congress voted on a law allowing for broad interception powers of certain electronic communications by the government. The bill makes it lawful for the government to approve the interception of communications without appropriate safeguards or oversight mechanisms.
The law passed with 104 votes – the Nigerien parliament has 171 members – without the participation of the opposition that boycotted the law. The opposition claimed that
the law will allow those, for…
Content type: Advocacy
Last week, Privacy International joined more than 30 UK charities in a letter addressed to the British Prime Minister Boris Johnson, following his recent declaration, asking him to lift No Recourse to Public Funds (NRPF) restrictions.
Since 2012, a ‘NRPF condition’ has been imposed on all migrants granted the legal right to live and work in the UK. They are required to pay taxes, but they are not permitted to access the public safety net funded by those taxes.
This is not a topic we are known…
Content type: Case Study
As working from home is becoming the new normal, employees’ monitoring becomes the new norm.
Companies around the globe are increasingly using software to monitor how long we spend in front of our computer, what websites we visit and what apps we use, when we type, for how long and how fast, how long our mouse stay inactive — any more than 15 seconds away can shift us from ‘active’ to ‘idle’ — and require us to keep our camera and microphone on at all times. These systems pit us against our…
Content type: Report
It is common for families with no recourse to public funds who attempt to access support from local authorities to have their social media monitored as part of a 'Child in Need' assessment. This practice appears to be part of a proactive strategy on the part of local authorities to discredit vulnerable families in order to refuse support. In our experience, information on social media accounts is often wildly misinterpreted by local authorities who make serious and unfounded allegations…
Content type: Long Read
It is common for families with no recourse to public funds who attempt to access support from local authorities to have their social media monitored as part of a ‘Child in Need’ assessment.
This practice appears to be part of a proactive strategy on the part of local authorities to discredit vulnerable families in order to refuse support. In our experience, information on social media accounts is often wildly misinterpreted by local authorities who make serious and unfounded allegations…
Content type: Explainer
Social media platforms are a vast trove of information about individuals, including their personal preferences, political and religious views, physical and mental health and the identity of their friends and families.
Social media monitoring, or social media intelligence (also defined as SOCMINT), refers to the techniques and technologies that allow the monitoring and gathering of information on social media platforms such as Facebook and Twitter which provides valuable intelligence to others…
Content type: Long Read
Dear Sir/Madam,
Freedom of information act request
RE: Social media monitoring / social media intelligence
FOIA REQUEST
For definition of social media intelligence please see background explanation below. We further note the comments of the Office of Surveillance Commissioners Annual Report 2016 cited below.
1. In 2016 the Rt Hon Lord Judge, then Chief Surveillance Commissioner, wrote to all Local Authorities regarding use of social media in investigations. Please confirm whether you are…
Content type: Long Read
Office of Surveillance Commissioners Guidance - Covert surveillance of Social Networking Sites (SNS)
Covert surveillance of Social Networking Sites (SNS)
289. The fact that digital investigation is routine or easy to conduct does not reduce the need for authorisation. Care must be taken to understand how the SNS being used works. Authorising Officers must not be tempted to assume that one service provider is the same as another or that the services provided by a single provider are the same.
289.1 Whilst it is the responsibility of an individual to set privacy settings to protect…
Content type: Report
SUMMARY
In the UK, local authorities* are looking at people’s social media accounts, such as Facebook, as part of their intelligence gathering and investigation tactics in areas such as council tax payments, children’s services, benefits and monitoring protests and demonstrations.
In some cases, local authorities will go so far as to use such information to make accusations of fraud and withhold urgently needed support from families who are living in extreme poverty.
THE PROBLEM
Since 2011…
Content type: Long Read
Online covert activity
3.10 The growth of the internet, and the extent of the information that is now available online, presents new opportunities for public authorities to view or gather information which may assist them in preventing or detecting crime or carrying out other statutory functions, as well as in understanding and engaging with the public they serve. It is important that public authorities are able to make full and lawful use of this information for their statutory purposes. Much…
Content type: Long Read
The Chief Surveillance Commissioner, The Rt Hon Sir Christopher Rose’s Annual Report 2011 - 12 did not refer to social networks but to overt investigations using the internet as a surveillance tool, stating that:
“5.17 A frequent response to my Inspectors’ enquiries regarding a reduction in directed surveillance is that ‘overt’ investigations using the Internet suffice. My Commissioners have expressed concern that some research using the Internet may meet the criteria of directed…
Content type: Advocacy
Privacy International sent a letter to the Investigatory Powers Commissioner’s Office (IPCO) addressing social media monitoring carried out by Local Authorities.
The submission builds on a campaign and research carried out by PI highlighting the growth of social media monitoring across Local Authorities, as well as the general lack of internal oversight for some of these activities. After providing an introduction to the research and the findings, the letter highlights each of PI’s concerns…
Content type: Case Study
You have the right to decent standards and dignity at work, and the right to join a union to protect yourself and your rights. That might come as a shock to Amazon - who have been using Covid-19 as a reason to undermine those rights.
Chris Smalls, an organiser and now former Amazon warehouse assistant manager, led a walkout at a New York City facility and within days he’d been fired under a dubious pretext.
The walkout was to ensure workers’ safety - they were asking for the warehouse to be…
Content type: Examples
A parliamentary panel granted Israel's Shin Bet security service an additional three weeks to use mobile phone data to track people infected with the coronavirus; prime minister Benjamin Netanyahu had requested a six-week extension while his government drafts legislation to regulate the data use in line with requirements imposed by the Israeli Supreme Court. Testimony given to the parliament's intelligence subcommittee showed that the Shin Bet surveillance was the reason it was possible to…
Content type: Examples
After a call from a vendor, India's state-owned Broadcast Engineering Consultants Limited (BECIL) put out an expression of interest for electronic bracelets and accompanying software for use to ensure that COVID-19 patients do not violate their quarantine orders.
A hundred companies responded. BECIL saw the idea as an opportunity to sell a patient surveillance system to municipal corporations, private companies, welfare resident societies, and central government departments. BECIL, which was…
Content type: News & Analysis
In a legal challenge brought by French activist group, La Quadrature du Net (LGDN), the Conseil d’État, the French highest court, has ruled that the use of drones by the police in the context of monitoring compliance with Covid-19 lockdown measures was unlawful.
The ruling found that the imagery and footage captured by drones flying at a low altitude was personal data to the extent that individuals filmed were identifiable. Consequently, the operation of drones by the police amounted…
Content type: Examples
The rush to incorporate greater safety from the coronavirus is bringing with it a new wave of workplace surveillance as companies install tracking software to determine who may have been exposed and which areas need deep cleaning if an employee gets infected; monitor social distancing; and use Bluetooth beacons embedded in badges to locate employees.
Companies are also installing thermal cameras to take employees' temperature as they enter the workplace or public area. Companies are also…
Content type: Examples
Amazon has spent $10 million to buy 1,500 cameras to take the temperature of workers from the Chinese firm Zhejiang Dahua Technology Company even though the US previously blacklisted Dahua because it was alleged to have helped China detain and monitor the Uighurs and other Muslim minorities.
The cameras work by comparing a person’s radiation with a separate infrared calibration device and uses face detection technology to make sure it is looking for heat in the right part of the subjects…