Search
Content type: News & Analysis
As Amnesty International and Forbidden Stories continue to publish crucial information about the potential targets of NSO Group’s spyware, we know this much already: something needs to be done.
But what exactly needs to be done is less obvious. Even though this is not the first time that the world has learned about major abuses by the surveillance industry (indeed, it’s not even the first time this month), it’s difficult to know what needs to change.
So how can the proliferation and use of…
Content type: Examples
When Dallas police posted on Twitter asking for videos of the protests taking place after George Floyd's killing, a flood of videos and images of K-pop stars were uploaded to its anonymous iWatch Dallas tip-off app. Law enforcement can call on vast numbers of networked cameras - from cars, food and retail chains that are typically willing to share with police, law enforcement agencies' own networks of surveillance and body cameras as well as object and face recognition software, protesters and…
Content type: Video
Links
Find more of Dr Thompson's work and her book 'An Organ of Murder: Crime, Violence, and Phrenology in Nineteenth-Century America'
Or you can find her on twitter
You can see the 'Good and Bad heads' picture in her article 'Rediscovering “Good” and “Bad” Heads in the Phrenological Present'
Find out more about Physogs and Photofit in Courtney's article in Endeavour
You can listen to our podcast on Facial Recognition
And you can support us
You can listen and subscribe to…
Content type: Video
This podcast was recorded before the US Federal Trade Commission told a company called 'Ever' to delete any facial recognition algorithms they developed without consent
Links:
The original article
Info on how to do your own Data Subject Access Request
And the template from the ICO
Info on how to request your data be deleted
Find more from Ann Cavoukian
Find out more about the ACLU's legal challenge in Illinois
Find out more about Robert Julian-Borchack William's case…