Search
Content type: Explainer
Introduction/Background
Electronic tags have been a key part of criminal justice offender management for over 20 years, being used in the United States since the mid 1980’s and in the UK and some other commonwealth countries since 2003. In 2021 the UK introduced GPS tagging for immigration bail.
The tag is predominantly used to curtail the liberties of individuals. For those on criminal bail its intended use includes managing return into communities while deterring reoffending.
As we explore…
Content type: Long Read
In a roundtable available on YouTube, co-hosted with Garden Court Chambers, Privacy International brought together immigration law practitioners to discuss how they’ve used privacy and data protection law to seek information or redress for their clients.
Index:
1. UK Border 2025
2. Super-complaint and judicial review challenge to data sharing
3. Mobile phone seizure and extraction
4. Freedom of Information Act requests
The dystopian future: UK Border 2025
To set the scene on how the…
Content type: Explainer
An array of digital technologies are being deployed in the context of border enforcement. Satellite and aerial surveillance are part of the surveillance toolkit and yet, they are also used by organisations seeking to hold government actions to account and improve efficacy of their own work. To effectively critique state use and delve into potential benefits of satellite and aerial surveillance, we must first understand it.
In this explainer we dig into a technology which many are aware of for…
Content type: Examples
Sidestepping the need to obtain a search warrant, the US Department of Homeland Security (DHS) has been accessing smartphone location data by buying it from private marketing that typically embed tracker in apps. This data, which maps the movement of millions of cellphones in America, was collected from ordinary cellphone apps, to which users gave access to their location. In this particular instance, it was used by the DHS to search for undocumented immigrants according to the Wall Street…
Content type: Report
Privacy International has released a report summarising the result of its research into the databases and surveillance tools used by authorities across the UK’s borders, immigration, and citizenship system.
The report uses procurement, contractual, and other open-source data and aims to inform the work of civil society organisations and increase understanding of a vast yet highly opaque system upon which millions of people rely.
It also describes and maps…
Content type: Explainer
At first glance, infrared temperature checks would appear to provide much-needed reassurance for people concerned about their own health, as well as that of loved ones and colleagues, as the lockdown is lifted. More people are beginning to travel, and are re-entering offices, airports, and other contained public and private spaces. Thermal imaging cameras are presented as an effective way to detect if someone has one of the symptoms of the coronavirus - a temperature.
However, there is little…
Content type: Long Read
Over the last two decades we have seen an array of digital technologies being deployed in the context of border controls and immigration enforcement, with surveillance practices and data-driven immigration policies routinely leading to discriminatory treatment of people and undermining peoples’ dignity.
And yet this is happening with little public scrutiny, often in a regulatory or legal void and without understanding and consideration to the impact on migrant communities at the border and…
Content type: Examples
Up to 30 charities and organisations have written to home secretary Priti Patel calling for a number of amendments on Tuesday - a year exactly until the scheme ends.
Under current arrangements, EU citizens have been told to apply by June if they wish to continue living and working in Britain.The letter said: “We are concerned that the government has not taken appropriate steps or made the adequate adjustments to the EUSS necessary to protect EU citizens and family members from Covid-19. We…
Content type: Examples
On March 14 a group of immigrant advocacy groups wrote to the government asking for the Home Office to release all 1,500 to 2,000 detainees in order to protect them from a coronavirus outbreak in the UK's seven removal centres and two short-term holding centres.. On March 21, the Home Office said it had released 300 of the detainees. The charity Detention Action launched a legal action to compel the Home Office to release the most vulnerable detainees and test all detainees. The Home Office…
Content type: Examples
Under a new protocol, international passengers arriving at Lime's Jorge Chavez International Airport or by ship at Callao Port, is referred to medical staff if they are arriving from places with confirmed cases, even if they are asymptomatic. Passengers who show symptoms in transit are transferred to isolation areas, where they receive care. The passengers are also required to supply personal information so they can be surveilled over the following days.
Source: https://andina.pe/ingles/…
Content type: Long Read
The European Union (EU) spends billions on research and development aimed at driving economic growth and jobs, as well as furthering the bloc’s broader agenda. Within the current budget, known as Horizon 2020 and covering the years 2014-2020, some €80 billion has been made available for research in a huge number of areas, ranging from finding cures for diseases to helping keep the earth viable for life.
From the same budget, it also funds a lot of projects aimed at developing surveillance…
Content type: Examples
A 17-year-old Palestinian resident of Lebanon, Ismail B. Ajjawi, was deported shortly after he arrived at Boston Airport, where he was due to start attending Harvard University the following week.
Immigration officers subjected him to hours of questioning — at one point leaving to search his phone and computer — according to a written statement by Ajjawi. According to the student, his visa was revoked because of content posted by some social media contacts.
The student alleges that…
Content type: Examples
In December 2018, Florida citizen Peter Sean Brown filed a federal lawsuit against the Monroe County Sheriff's offices for arresting and detaining him for three weeks claiming he was an illegal alien from Jamaica. Even though Brown offered to show the sheriff his birth certificate and explained he had been wrongfully detained 20 years before and the jail's own records listed his birthplace as Philadelphia, PA, the sheriff relied on a form sent by Immigration and Customs Enforcement. Brown…
Content type: Examples
In December 2018, in the wake of the Windrush scandal, the National Police Council, which represents police chiefs across England and Wales agreed to cease passing on to deportation authorities information about people suspected of being in the country illegally. The measures also ban officers from checking the police national computer solely to check on immigration status. Police said they believed that their too-close relationship with immigration authorities in aid of the government's "…
Content type: Examples
In a report released in December 2018, the UK's National Audit Office examined the management of information and immigrant casework at the Home Office that led to the refusal of services, detention, and removal of Commonwealth citizens who came to the UK and were granted indefinite leave to remain between 1948 and 1973, the so-called "Windrush generation" but never given documentation to prove their status. The NAO concludes that the Home Office failed to adequately consider its duty of care in…
Content type: Examples
In November 2018 reports emerged that immigrants heading north from Central America to the US border are more and more often ensuring they are accompanied by children because "family units" are known to be less likely to be deported, at least temporarily, and smugglers charge less than half as much when a minor is in the group because their risk is less. Some parents have given their children - sometimes for cash - to other adults such as a relative, godparent, or, sometimes, unrelated person.…
Content type: Examples
In November 2018, researchers at Sweden's University of Lund, the US's Worcester Polytechnic Institute, and the UK's Oxford University announced that in August the US State Department had begun using a software program they had designed that uses AI to find the best match for a refugee's needs, including access to jobs, medical facilities, schools, and nearby migrants who speak the same language. Known as "Annie MOORE", refugees matched by the program were finding jobs within 90 days about a…
Content type: Examples
In 2017, US Immigration & Customs Enforcement (ICE) announced that it would seek to use artificial intelligence to automatically evaluate the probability of a prospective immigrant “becoming a positively contributing member of society.” In a letter to acting Department of Homeland Security Secretary Elaine Duke, a group of 54 concerned computer scientists, engineers, mathematicians, and researchers objected to ICE’s proposal and demanded that ICE abandon this approach because it would be…
Content type: Examples
US Immigrations & Customs Enforcement (ICE) used social media monitoring to track groups and people in New York City associated with public events opposing the Trump administration’s policies, including ones related to immigration and gun control. The investigative branch of ICE created and circulated a spreadsheet, entitled ‘Anti-Trump Protest Spreadsheet 07/31/2018,” that provided details of events planned between July 31, 2018, and August 17, 2018. The spreadsheet pulled data from…
Content type: Examples
The US government created a database of more than 50 journalists and immigrant rights advocates, many of whom were American citizens, associated with the journey of migrants travelling from Central America to the Mexico-US border in late 2018. Officials from Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), the US Border Patrol, Homeland Security Investigations, and the Federal Bureau of Investigation (FBI) had access to this database. This list allowed the…
Content type: Examples
A private intelligence company, LookingGlass Cyber Solutions, used social media to monitor more than 600 “Family Separation Day Protests” held across the United States on June 30, 2018, to oppose the Trump administration’s policy family separation policy. The policy was part of a “zero tolerance” approach to deter asylum seekers from coming to the United States by separating children from their parents. After collecting information about these protests through Facebook, including the precise…
Content type: Examples
In September 2018 the UK's Information Commissioner found that it was likely that during 2017 a number of migrant rough sleepers were reported to the Home Office enforcement teams by the homelessness charity St. Mungo's. The finding followed a complaint from the Public Interest Law Unit. The charity claimed it passed on these details when people wanted to return home. The Home Office halted its policy of deporting migrant rough sleepers in December 2017 and the government was to pay hundreds of…
Content type: Examples
In 2015, IBM began testing its i2 Enterprise Insight Analysis software to see if it could pick out terrorists, distinguish genuine refugees from imposters carrying fake passports, and perhaps predict bomb attacks. Using a scoring system based on several data sources and a hypothetical scenario, IBM tested the system on a fictional list of passport-carrying refugees. The score is meant to act as a single piece of data to flag individuals for further scrutiny using additional…
Content type: Case Study
Our connected devices carry and communicate vast amounts of personal information, both visible and invisible.
What three things would you grab if your house was on fire? It’s a sure bet your mobile is going to rank pretty high. It’s our identity, saying more about us than we perhaps realise. It contains our photos, calendar, internet browsing, locations of where we go, where we’ve been, our emails, social media. It holds our online banking, notes with half written poems, shopping lists, shows…