Search
Content type: Long Read
The fourth edition of PI’s Guide to International Law and Surveillance provides the most hard-hitting past and recent results on international human rights law that reinforce the core human rights principles and standards on surveillance. We hope that it will continue helping researchers, activists, journalists, policymakers, and anyone else working on these issues.The new edition includes, among others, entries on (extra)territorial jurisdiction in surveillance, surveillance of public…
Content type: Examples
While traditional media sought to criminalize the widespread November 2020 protests in Peru following the Congressional ouster of President Vizcarra, witnesses disseminated videos and photographs of police abuse on social networks. In the fear and uncertainty, many myths also circulated. In Peru, citizens have the right to refuse to allow police to check their cellphones unless they have a court order; slowed or absent wireless connections may simply be due to overload; as public officials,…
Content type: Examples
As police began treating every 2019 Hong Kong protest as an illegal assembly attracting sentences of up to ten years in jail, facial recognition offered increased risk of being on the streets, as protesters could be identified and arrested later even if they were in too large a crowd to be picked up at the time. By October, more than 2,000 people had been arrested, and countless others had been targeted with violence, doxxing, and online harassment. On the street, protesters began using…
Content type: Examples
Both protesters and police during the 2019 Hong Kong protests used technical tools including facial recognition to counter each other's tactics. Police tracked protest leaders online and sought to gain access to their phones on a set of Telegram channels. When police stopped wearing identification badges, protesters began to expose their identities online on another. The removal of identification badges has led many to suspect that surveillance techniques are being brought in from mainland…
Content type: Examples
On November 9, 2020, after a year of escalating tensions, Peruvian president Martín Vizcarra was impeached on the grounds of "moral incapacity" by lawmakers threatened by his anti-corruption investigations and the policy reform he led. The street protests that followed all over the country were coordinated via Instagram, Twitter, WhatsApp, and TikTok (#MerinoNoMeRepresenta) by hundreds of newly-created small, decentralised organisations. The march on November 14 is thought to be the largest in…
Content type: Examples
Protesters in Tunisia have faced hate messages, threats, and other types of harassment on social media, and been arrested when they complain to police. Arrests and prosecutions based on Facebook posts are becoming more frequent, and in street protests law enforcement appears to target LGBTQ community members for mistreament. In a report, Human Rights Watch collected testimonies to document dozens of cases in which LGBTQ people were harassed online, doxxed, and forcibly outed; some have been…
Content type: Examples
Documents acquired under the Government Information (Public Access) Act 2009 reveal that staff and student protests against cuts at the University of Sydney were surveilled by both the university administration and police, who have been widely criticised for using excessive force at education protests. The university administration conducted "risk reviews" of protests and looked for links between education protest organisers and other political organisations. Emails include screenshots of…
Content type: Examples
Despite having promised in 2016 not to facilitate domestic surveillance, the AI startup Dataminr used its firehose access to Twitter to alert law enforcement to social media posts with the latest whereabouts and actions of demonstrators involved in the protests following the killing of George Floyd. Dataminr's investors include the CIA and, previously, Twitter itself. Twitter's terms of service ban software developers from tracking or monitoring protest events. Some alerts were sourced from…
Content type: Examples
Peruvian police have used force, arbitrary arrests, undercover infiltrators, tear gas, and forced disappearance against marchers protesting the removal of president Martín Vizcarra. Three protesters have been killed, more than 60 have disappeared, and hundreds have been injured. While the traditional media has either ignored the protests or depicted them as criminal, social media and the internet have been crucial in documenting police abuses via shared images and video. Police have begun using…
Content type: Examples
During the Black Lives Matter protests of summer 2020, US police took advantage of a lack of regulation and new technologies to expand the scope of people and platforms they monitor; details typically emerge through lawsuits, public records disclosures, and stories released by police department PR as crime prevention successes. A report from the Brennan Center for Justice highlights New York Police Department threats to privacy, freedom of expression, and due process and the use of a predator…
Content type: Examples
After governments in many parts of the world began mandating wearing masks when out in public, researchers in China and the US published datasets of images of masked faces scraped from social media sites to use as training data for AI facial recognition models. Researchers from the startup Workaround, who published the COVID19 Mask image Dataset to Github in April 2020 claimed the images were not private because they were posted on Instagram and therefore permission from the posters was not…
Content type: Long Read
Over the last two decades we have seen an array of digital technologies being deployed in the context of border controls and immigration enforcement, with surveillance practices and data-driven immigration policies routinely leading to discriminatory treatment of people and undermining peoples’ dignity.
And yet this is happening with little public scrutiny, often in a regulatory or legal void and without understanding and consideration to the impact on migrant communities at the border and…
Content type: Explainer
Social media platforms are a vast trove of information about individuals, including their personal preferences, political and religious views, physical and mental health and the identity of their friends and families.
Social media monitoring, or social media intelligence (also defined as SOCMINT), refers to the techniques and technologies that allow the monitoring and gathering of information on social media platforms such as Facebook and Twitter which provides valuable intelligence to others…
Content type: Examples
The risk detection company Dataminr has created an AI system that analyses social media posts to predict the next hotspots for COVID-19 outbreaks. The company claims it successfully predicted spikes seven to 13 days before they occurred - in the UK, in London, Hertfordshire, Essex, and Kent, and in 14 US states. Rather than measuring aggregated data, the system looks for unique posts from individuals who say they have symptoms, have tested positive, or been exposed, as well as first-hand…
Content type: Examples
The consumer and market trends insight company StatSocial announced Crisis Insights, which it claims tracks rapidly changing consumer audience dynamics to help US brands and CMOs respond effectively to the ongoing coronavirus epidemic and economic slowdown. StatSocial's Silhouette social data platform monitors and analyses more than 1.3 billion social accounts covering more than 70% of US households. Crisis Insights is intended to identify the changing dynamics of customers and consumers who…
Content type: Examples
Facebook's scientists are analysing location data about compliance with social distancing recommendations in various countries using information from a private vault of location information its apps have collected. The analysis shows that only "very modest" changes in habits in the US, France, and the UK, and much more substantial change in Spain and Italy between mid-February and mid-March. Other companies such as Google and Apple, may also be able to contribute insights into public behaviour…
Content type: Examples
Russia has set up a coronavirus information centre to to monitor social media for misinformation about the coronavirus and spot empty supermarket shelves using a combination of surveillance cameras and AI. The centre also has a database of contacts and places of work for 95% of those under mandatory quarantine after returning from countries where the virus is active. Sherbank, Russia's biggest bank, has agreed to pay for a free app that will provide free telemedicine consultations.
Source:…
Content type: Long Read
Valentine’s Day is traditionally a day to celebrate relationships, but many relationships that begin romantically can quickly become controlling, with partners reading emails, checking texts and locations of social media posts. This can be just the beginning.
Today, Friday 14th February, Privacy International and Women’s Aid are launching a series of digital social media cards giving women practical information on how to help stay safe digitally from control and abuse.
Did you know…
Content type: Long Read
The European Union (EU) spends billions on research and development aimed at driving economic growth and jobs, as well as furthering the bloc’s broader agenda. Within the current budget, known as Horizon 2020 and covering the years 2014-2020, some €80 billion has been made available for research in a huge number of areas, ranging from finding cures for diseases to helping keep the earth viable for life.
From the same budget, it also funds a lot of projects aimed at developing surveillance…
Content type: Examples
A 17-year-old Palestinian resident of Lebanon, Ismail B. Ajjawi, was deported shortly after he arrived at Boston Airport, where he was due to start attending Harvard University the following week.
Immigration officers subjected him to hours of questioning — at one point leaving to search his phone and computer — according to a written statement by Ajjawi. According to the student, his visa was revoked because of content posted by some social media contacts.
The student alleges that…
Content type: Examples
In February 2019, after investigative journalists used social media posts to investigate the country's hidden role in conflicts such as those in Ukraine and Syria, Russia began moving to ban its soldiers from posting any information that would expose their whereabouts or their role in the military. The ban would include photographs, video, geolocation data, and other information, and prohibit soldiers from sharing information about other soldiers and their relatives.
https://www.reuters.com/…
Content type: Examples
The US Department of Homeland Security awarded a $113 million contract to General Dynamics to carry out the Visa Lifecycle Vetting Initiative (VLVI), a renamed version of the Extreme Vetting Initiative and part of a larger effort called the National Vetting Enterprise. In May 2018, public outrage led the DHS to back away from a machine learning system that would monitor immigrants continuously; however, the reason it gave was that the technology to automate vetting did not yet exist. These…
Content type: Examples
In October 2018, the Singapore-based startup LenddoEFL was one of a group of microfinance startups aimed at the developing world that used non-traditional types of data such as behavioural traits and smartphone habits for credit scoring. Lenddo's algorithm uses numerous data points, including the number of words a person uses in email subject lines, the percentage of photos in a smartphone's library that were taken with a front-facing camera, and whether they regularly use financial apps on…
Content type: Examples
In 2017, US Immigration & Customs Enforcement (ICE) announced that it would seek to use artificial intelligence to automatically evaluate the probability of a prospective immigrant “becoming a positively contributing member of society.” In a letter to acting Department of Homeland Security Secretary Elaine Duke, a group of 54 concerned computer scientists, engineers, mathematicians, and researchers objected to ICE’s proposal and demanded that ICE abandon this approach because it would be…
Content type: Examples
US Immigrations & Customs Enforcement (ICE) used social media monitoring to track groups and people in New York City associated with public events opposing the Trump administration’s policies, including ones related to immigration and gun control. The investigative branch of ICE created and circulated a spreadsheet, entitled ‘Anti-Trump Protest Spreadsheet 07/31/2018,” that provided details of events planned between July 31, 2018, and August 17, 2018. The spreadsheet pulled data from…
Content type: Examples
The US government created a database of more than 50 journalists and immigrant rights advocates, many of whom were American citizens, associated with the journey of migrants travelling from Central America to the Mexico-US border in late 2018. Officials from Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), the US Border Patrol, Homeland Security Investigations, and the Federal Bureau of Investigation (FBI) had access to this database. This list allowed the…
Content type: Examples
A private intelligence company, LookingGlass Cyber Solutions, used social media to monitor more than 600 “Family Separation Day Protests” held across the United States on June 30, 2018, to oppose the Trump administration’s policy family separation policy. The policy was part of a “zero tolerance” approach to deter asylum seekers from coming to the United States by separating children from their parents. After collecting information about these protests through Facebook, including the precise…
Content type: Examples
Bahrain has warned its citizens and residents could face legal action simply for following social media accounts it deems anti-government, which raises concerns about the ability of Bahraini citizens and residents to exercise their fundamental rights and freedoms. In May 2019, a state terrorism law was expanded to criminalise anyone “promoting, glorifying, justifying, approving or supporting acts which constitute terrorist activities,” whether within or outside Bahrain. The government’s…
Content type: Explainer
Could an app you have never even heard of put you at risk? This is what happened to Chloe (real name has been changed), an investigative journalist exposed by an app that her source was using.
Her source was using TrueCaller, an app that aims to identify phone numbers so users can filter out calls, even if it is from a number they have never encountered before. TrueCaller relies on users tagging numbers who are calling them. And when your number is tagged there is no way for you to know that…
Content type: Case Study
Photo by Roger H. Goun
Chloe is an investigative journalist working for an international broadcast service; we will call the TV show she works for The Inquirer. She travels around the world to work with local journalists on uncovering stories that make the headlines: from human trafficking to drug cartels and government corruption. While her documentaries are watched by many and inspire change in the countries she works in, you would not know who Chloe is if we were to tell you her real name.…