Government

Long Read

An overview of relevant considerations if and when photographing or filming police at a protest (UK edition).

Report

A case study illustrating the use and looming dangers of collection and use of biometrics in the name of counter-terrorism.

Report

A case study illustrating the use and looming dangers of collection and use of biometrics in the name of counter-terrorism.

Explainer

A brief guide to how social media monitoring can be used at a protest, and how you can minimise risks to your data (UK edition)

Explainer

The police can access your mobile phone’s ‘unique identifiers’. Learn how to maintain your anonymity (UK edition).

Explainer

The police can access your digital communications. Learn how to limit the risk.

Explainer

If the police seize your phone during a protest, they can gain access to your location data. Here's how to better control access to your data (UK edition).

Explainer

The police may use facial recognition technology, IMSI catchers, geo-location technology and other tools to identify protesters and add them to databases or watchlists, feeding into their 'predictive policing' tools. Here's what you need to know (UK edition).

Explainer

This guide explains how policing databases can be used at a protest and negatively affect individuals' lives (UK edition)

Explainer

A guide to how police drone technology may be used at protests, and how you can try to maintain anonymity (UK edition).

Explainer

A brief guide to how body worn video cameras can be used at a protest (UK edition).

Explainer

A brief guide to how gait recognition technology can be used at a protest and how you can try to maintain your anonymity (UK edition).

Explainer

A brief guide to how facial recognition technology can be used at a protest and how can you try to maintain your anonymity (UK edition).

Explainer

A brief guide to how hacking can be used at protests and how you can minimise risks to your data (UK edition).

Explainer

A brief guide to how IMSI catchers can be used at a protest and how you can minimise risks to your data (UK edition).

Explainer

This guide explains how the police can access data to your Cloud-based services and the apps that store data in there, such as Slack, Telegram and WhatsApp. (UK edition)