Search
Content type:
Content type:
… human rights defenders - as they are targeted by unlawful surveillance deployed in the name of counter-terrorism; and … human rights defenders - as they are targeted by unlawful surveillance deployed in the name of counter-terrorism; and …
Content type:
Content type:
Content type:
… capable of conducting generalised, invisible, real-time surveillance of civic spaces, from a distance, without …
Content type:
… media monitoring, from remote hacking to the use of mobile surveillance equipment called 'IMSI catchers', UK police forces are using an ever-expanding array of surveillance tools to spy on us as we go about our everyday … media monitoring, from remote hacking to the use of mobile surveillance equipment called 'IMSI catchers', UK police …
Content type:
… almost $1 million on hacking technology sold by the Italian surveillance technology company, Hacking Team, and was …
Content type:
Content type:
Content type:
… IMSI catchers. IMSI catchers are a type of mobile phone surveillance technology, which mimic mobile phone base … technology, especially when it can be used for mass surveillance - like IMSI catchers, PI is frustrated by many … use of IMSI catchers as part of our work challenging mass surveillance. …
Content type:
… countries — including authoritarian regimes — with surveillance capabilities. In this section, you can read our report ‘Teach ’em to Phish: State Sponsors of Surveillance’, as well as access a range of other resources … countries — including authoritarian regimes — with surveillance capabilities. ’Teach ‘em to Phish’ warns that …
Content type:
… Governments share our data amongst each other. Surveillance, by its very nature, impacts on personal privacy. Sharing surveillance intelligence with other governments greatly … states can use intelligence sharing as a way of outsourcing surveillance to each other, bypassing any constraints and …
Content type:
… Agency, urging the immediate investigation of the unlawful surveillance of three Bahraini activists living in the UK by … the activists and had their computers infected with the surveillance Trojan FinFisher. These findings were published … aware of, and actively facilitating, the Bahraini regime’s surveillance of targets located outside Bahrain through the …
Content type:
… hacked and infected with FinSpy, a commercially-developed surveillance software. In the dossier submitted to the …
Content type:
… a company that exports “FinFisher” (or “FinSpy”) intrusive surveillance software, and Trovicor GmbH, a German company … of Siemens) which also sells internet monitoring and mass surveillance products. The complaint against Trovicor asked … OECD Guidelines for Multinational Enterprises by exporting surveillance products to Bahrain, where the authorities use …
Content type:
… a company that exports “FinFisher” (or “FinSpy”) intrusive surveillance software, and Trovicor GmbH, a German company … of Siemens) which also sells internet monitoring and mass surveillance products. The complaint against Gamma … OECD Guidelines for Multinational Enterprises by exporting surveillance products to Bahrain, where the authorities use …
Content type:
… (GCHQ) access to their fibre optic networks for the Tempora surveillance program. Privacy International argued that by …
Content type:
… in the Police Code which, taken together, enable the mass surveillance state through indiscriminate monitoring and … the provisions make compulsory the installation of surveillance cameras in public transport vehicles, enable the police to access private surveillance systems capturing public spaces, and render any …
Content type:
Content type:
Content type:
Content type:
… Court of Human Rights challenging the compatibility of surveillance measures enacted as part of anti-terrorism … the National Security Services to undertake sweeping secret surveillance activities, including secret recording of … of the persons affected. Hungarian law made the exercise of surveillance powers solely conditional upon the …
Content type:
… relating to all means of electronic communication (mass surveillance of electronic communications) for the purpose …
Content type:
… Gong, (ii) knew that the Chinese government was seeking a surveillance tool to target the Falun Gong specifically and …
Content type:
… How EdTech is turning schools into mass surveillance spaces. Educational spaces are increasingly … (EdTech) being deployed is being used as a form of surveillance that undermines students’ privacy and human … into environments where students are under constant surveillance, much like individuals in “high security” …
Content type:
Content type:
… Aerial surveillance refers to the systematic monitoring of an area … balloons or other aerial platforms equipped with surveillance technologies. Despite its widespread use, aerial surveillance remains weakly regulated, without appropriate …
Content type:
… Court of Human Rights (ECtHR). The case concerns the surveillance of activists prior to the United Nations … of their role as such. We further demonstrated how the surveillance technologies deployed by the Polish security …
Content type:
… to constant monitoring and identification by dystopian surveillance technology. FRT is an extremely intrusive surveillance technology which uses video cameras in public … to restrict its use. Unchecked and indiscriminate mass surveillance will inevitably follow. Concerned by the threat …
Content type:
… ://www.politico.eu/article/france-eu-precedent-2024-olympics-surveillance/ ) qui autorise notamment le déploiement d’une surveillance invasive par intelligence artificielle (IA), aussi appelée “vidéosurveillance algorithmique” pendant les Jeux et jusqu’en …