Educational

Examples, Explainer, Educational Case Study, Course, Guide

Long Read

The CrowdStrike incident earlier this year had major implications for governments and businesses across the world. Here, we look at what it tells us about the security and robustness of the modern internet. 

Long Read

Support systems are undergoing significant digitisation and automation under the banner of efficiency. Privacy International calls for the impacts of these innovations on the rights of people with disabilities to be comprehensively assessed and addressed.

Report

New briefing details the growth of the private intelligence industry in the UK and what needs to be done about it.

Explainer
‘Free to Protest: The protestor’s guide to police surveillance and how to avoid it’ (UK edition) is a collection of bite-sized guides about high-tech police surveillance capabilities at protests, including tips and strategies about how you can protect yourself from being identified, tracked and
Long Read

The concept of privacy is essential for Indigenous peoples to exercise their right to autonomy and self-determination, enabling them to better protect their cultural heritage and prevent external control, exploitation, and surveillance of their lands and identities.

Long Read
Introduction Harnessing new digital technology to improve people’s health is now commonplace across the world. Countries and international organisations alike are devising digital health strategies and looking to emerging technology to help solve tricky problems within healthcare. At the same time
Long Read

This piece highlights concerns over the increasing use of data-intensive technologies in educational spaces (EdTech) and examines - among other things - how their unchecked implementation can jeopardize students' rights and education through potential privacy violations, discrimination, and the lack of student input in the adoption of these technologies.

Long Read

Surveillance databases are on the rise all around us and with them comes a wider array of issues. Here we begin to unpack these concerns and discuss some of the prominent global drivers of this trend.

Long Read

A glimpse into what you can find in the new version of PI’s Guide to International Law and Surveillance. From surveillance of public spaces to spyware and encryption, it’s got everything!

Explainer

Who are the workers behind the training datasets powering the biggest LLMs on the market? In this explainer, we delve into data labeling as part of the AI supply chain, the labourers behind this data labeling, and how this exploitative labour ecosystem functions, aided by algorithms and larger systemic governance issues that exploit microworkers in the gig economy.

Video

What do you know about cryptography? Have you ever wanted to get a better understanding of some of the maths behind encryption? This week we speak to Ed, a Senior Technologist at PI, about some of the history and basics of encryption.

23 May 2023
According to police plans to enhance “school safety”, security cameras and facial recognition will monitor children in Hong Kong in class and around educational facilities. The move is part of a trend also found in China, India, and the US toward mining children’s data, even though few benefits have
Video

Jason Domino, sex worker and content creator, shares his tips to protect your privacy and security on platforms.

Video

Nate Bartram's security and privacy tips, privacy activist and content creator, share his privacy and security tips including using compartmentalisation, multiple online identities and more

Video

Jason Domino, sex worker and content creator, shares his tips to protect your privacy and security on platforms.

Video

Nate Bartram's security and privacy tips, privacy activist and content creator, share his privacy and security tips including using a VPN, 2FA and more