Advanced Search
Content Type: Examples
Under a new contract effective from October 2024 to December 2025, PureTech Systems, which specialises in geospatial AI-boosted video analytics, will deploy its command-and-control software in 22,600 square kilometers of the US border. The software will integrate the sensors attached to existing surveillance towers while retaining the interface already familiar to border agents.https://www.prnewswire.com/news-releases/puretech-systems-inc-awarded-major-command-and-control-contract-by-us-…
Content Type: Long Read
1. What is the issue?Governments and international organisations are developing and accessing databases to pursue a range of vague and ever-expanding aims, from countering terrorism and investigating crimes to border management and migration control.These databases hold personal, including biometric, data of millions if not billions of people, and such data is processed by technologies, including Artificial Intelligence (AI), to surveil, profile, predict future behaviour, and ultimately make…
Content Type: Advocacy
In May 2024, we made a submission for the forthcoming report of the UN Special Rapporteur on the right to education to the General Assembly in October 2024.
Amongst others we recommend the UN Special Rapporteur for this upcoming report to:
Underline the need for a human rights-based approach to all AI systems in the education sector and describe the necessary measures to achieve it.
Reassert that any interference with the right to privacy and the advancement of the right to education due to…
Content Type: Examples
L3Harris is contracted by the U.S. Space Force to develop space surveillance information though a programme known as MOSSAIC (the Maintenance Of Space Situational Awareness Integrated Capabilities). The program is said to provide space surveillance information for military, civil and commercial users.https://www.satellitetoday.com/government-military/2024/04/19/us-space-force-awards-l3harris-contract-option-for-space-surveillance-program/Publication: ViaSatelliteWriter: Rachel Jewett
Content Type: Examples
Israel based company, High Lander, is providing demos of its system, called Orion, to U.S. police departments, suggesting the drones can help in law enforcement, including by performing video surveillance, searching for people or vehicles using AI and thermal sensors. https://theintercept.com/2024/05/17/israel-orione-drone-us-police-louisiana/Publication: The InterceptWriter: Delaney Nolan
Content Type: Examples
Microsoft pitched the use of OpenAI's DALL-E software to support battlefield operations of the US Department of Defense, in seeming contravention of OpenAI's ban against working in the military field. One of the potential use cases proposed by Microsoft is to use DALL-E, OpenAI's image generation model, to train battle management systems. The efficacy, reliability and ethics of such a use of private AI are questioned by various experts. https://theintercept.com/2024/04/10/microsoft-openai-…
Content Type: Examples
Fusion Technology will earn $159.8 million over 5 years to work with the US FBI's Criminal Justice Information Services (CJIS). It will support the FBI in developing the National Data Exchange ("an investigative tool for agencies to search, analyze, and share criminal justice information"), the Law Enforcement Online System (for information sharing between local, state, tribal, federal, and international criminal justice agencies) and "Crime Data apps".https://www.biometricupdate.com/202404/…
Content Type: Examples
US data analytics firm Palantir, known for its numerous contracts with intelligence agencies, military forces, or law enforcement and immigration authorities, has been awarded a £330m contract to run a new mass database for the UK's health service (NHS). The deal comes four years after Palantir was awarded a £1 contract during the Covid-19 pandemic to build an analytics platform for the NHS. People and organisations across the political spectrum have voiced significant privacy and data…
Content Type: Examples
Over 60 US cities and counties use Fusus, a "police technology platform that merges public and private cameras with predictive policing and other surveillance tools". Private surveillance camera owners are encouraged to enroll in a police-led program that enables the police to control these cameras. The result is an expanstion of policed spaces and integration of all private and public surveillance systems in one comprehensive dragnet. And Fusus' platform does not stop at integrating CCTV…
Content Type: Examples
Notorious military tech company Anduril is pushing its technology to the border surveillance market. Along the US-Mexico border, its surveillance towers "use an artificial intelligence system called Lattice to autonomously identify, detect and track “objects of interest”, such as humans or vehicles. The cameras pan 360 degrees and can detect a human from 2.8km away." But border surveillance technology has been shown to lead people to lengthier and more dangerous routes as they seek to avoid…
Content Type: Report
This policy paper seeks to determine the potential for the existing international private military and security companies (PMSC) regulatory framework to support more effective regulation of surveillance services provided by the private sector.In order to achieve this, and given that this paper addresses an issue that is at the intersection of two domains, it seeks to establish a common language and terminology between security sector governance and surveillance practitioners.In…
Content Type: Examples
When the Los Angeles Police Department opted to monitor the messages posted in forums on Neighbors, a companion app to Amazon's Ring doorbell cameras, the system forwarded over 13,000 messages in just over two years. Research shows, however, that this type of surveillance does a poor job of deterring property crime. A study of Neighbors posts in LA also shows that posters typically live in whiter, more affluent districts, and about 30% of posts did not describe criminal activity, just behaviour…
Content Type: Long Read
The rise of racist and xenophobic narratives around the world has led to a ramping up of brutal migration control policies. Indefinite detention, pushbacks of boats at sea, or deportation for offshore processing of asylum claims all now form part of the arsenal deployed by some governments to “appear tough” on and provide "solutions" to immigration. A stark example is the UK’s “hostile environment” policy, announced 10 years ago by then Home Secretary Theresa May and designed to deter migrants…
Content Type: Advocacy
We, the undersigned organisations, seek to draw your attention to aspects of the draft Corporate Sustainability Due Diligence Directive (the Directive), and its application to the use of technology and the technology sector, which require strengthening if the Directive is to realise its full potential in respect of this critical global sector that is today responsible for some of the most egregious human rights harms.
The technology and surveillance industries have ushered in an entirely new…
Content Type: Examples
The energy company Cuadrilla used Facebook to surveil anti-fracking protesters in Blackpool and forwarded the gathered intelligence to Lancashire Police, which arrested more than 450 protesters at Cuadrilla's Preston New Road site over a period of three years in a policing operation that cost more than £12 million. Legal experts have called the relationship between fracking companies and the police "increasingly unhealthy" and called on the ICO and the Independent Office for Police Conduct to…
Content Type: Examples
Emails obtained by EFF show that the Los Angeles Police Department contacted Amazon Ring owners specifically asking for footage of protests against racist police violence that took place across the US in the summer of 2020. LAPD signed a formal partnership with Ring and its associated "Neighbors" app in May 2019. Requests for Ring footage typically include the name of the detective, a description of the incident under investigation, and a time period. If enough people in a neighbourhood…
Content Type: Press release
Meta, the largest provider of social media sites and display advertising in the UK, acquired GIPHY, the largest provider of GIFs. In its report of 30 November 2021 the CMA found that the completed merger between Meta and GIPHY will give rise to a substantial lessening of competition.
The CAT confirmed the CMA's assessment and dismissed all but one of Meta’s appeal grounds, paving the way for Meta to sell GIPHY, as demanded by the CMA.
PI was granted permission to intervene in this case, one of…
Content Type: Explainer
Introduction/Background
Electronic tags have been a key part of criminal justice offender management for over 20 years, being used in the United States since the mid 1980’s and in the UK and some other commonwealth countries since 2003. In 2021 the UK introduced GPS tagging for immigration bail.
The tag is predominantly used to curtail the liberties of individuals. For those on criminal bail its intended use includes managing return into communities while deterring reoffending.
As we explore…
Content Type: Long Read
This piece is a part of a collection of research that demonstrates how data-intensive systems that are built to deliver reproductive and maternal healthcare are not adequately prioritising equality and privacy.
What are they?
Short Message Services (SMS) are being used in mobile health (MHealth) initiatives which aim to deliver crucial information to expecting and new mothers. These initiatives are being implemented in developing countries experiencing a large percentage of maternal and…
Content Type: News & Analysis
Today, the UK High Court has quashed a decision by the Investigatory Powers Tribunal (IPT) and held that section 5 of the Intelligence Services Act (ISA) 1994 does not permit the issue of general warrants to authorise property interference and certain forms of computer hacking.
The Court referred to cases dating back to the 18th century, which demonstrate the common law’s insistence that the Government cannot search private premises without lawful authority even in the national security…
Content Type: Press release
Today, the UK High Court has quashed a decision by the Investigatory Powers Tribunal (IPT), and ruled that section 5 of the Intelligence Services Act (ISA) 1994 does not permit the issuing of general warrants to authorise property interference and certain forms of computer hacking.
The Court referred to cases dating back to the 18th century, which demonstrate the common law’s insistence that the Government cannot search private premises without lawful authority even in the context of national…
Content Type: Examples
Many of the steps suggested in a draft programme for China-style mass surveillance in the US are being promoted and implemented as part of the government’s response to the pandemic, perhaps due to the overlap of membership between the National Security Commission on Artificial Intelligence, the body that drafted the programme, and the advisory task forces charged with guiding the government’s plans to reopen the economy. The draft, obtained by EPIC in a FOIA request, is aimed at ensuring that…
Content Type: Long Read
This week saw the release of a coronavirus tracking app within the United Kingdom, initially to be trialled in the Isle of Wight. Privacy International has been following this closely, along with other ‘track and trace’ apps like those seen in over 30 other countries.
The UK’s app is no different. It is a small part of a public health response to this pandemic. As with all the other apps, it is vital that it be integrated with a comprehensive healthcare response, prioritise people, and…
Content Type: Examples
The whistleblower said they were unable to find any legitimate reason for the high volume of the requests for location information. “There is no other explanation, no other technical reason to do this. Saudi Arabia is weaponising mobile technologies,” the whistleblower claimed.
The data leaked by the whistleblower was also seen by telecommunications and security experts, who confirmed they too believed it was indicative of a surveillance campaign by Saudi Arabia.
The data shows requests for…
Content Type: Examples
Bluetooth utilizes a device pairing mechanism based on elliptic-curve Diffie-Hellman (ECDH) key exchange to allow encrypted communication between devices. The ECDH key pair consists of a private and a public key, and the public keys are exchanged to produce a shared pairing key. The devices must also agree on the elliptic curve parameters being used. Previous work on the "Invalid Curve Attack" showed that the ECDH parameters are not always validated before being used in computing the resulted…
Content Type: Examples
“The BlueBorne attack vector requires no user interaction, is compatible to all software versions, and does not require any preconditions or configurations aside of the Bluetooth being active,” warned the researchers.
“Unlike the common misconception, Bluetooth enabled devices are constantly searching for incoming connections from any devices, and not only those they have been paired with,” they added.
“This means a Bluetooth connection can be established without pairing the devices at all.…
Content Type: Long Read
[Photo credit: Images Money]
The global counter-terrorism agenda is driven by a group of powerful governments and industry with a vested political and economic interest in pushing for security solutions that increasingly rely on surveillance technologies at the expenses of human rights.
To facilitate the adoption of these measures, a plethora of bodies, groups and networks of governments and other interested private stakeholders develop norms, standards and ‘good practices’ which often end up…
Content Type: News & Analysis
A new UK Times report claims that “WhatsApp, Facebook and other social media platforms will be forced to disclose encrypted messages from suspected terrorists, paedophiles and other serious criminals under a new treaty between the UK and the US.”
Several other media outlets have followed up on the report, with headlines such as “UK and US set to sign treaty allowing UK police ‘back door’ access to WhatsApp and other ‘end to end encrypted’ messaging platforms”.
While the…