Search
Content type: Examples
Google has settled a case brought in 2020 by the parents of an Illinois girl who sued the company in state court alleging that it had violated two sections of the Biometric Information Privacy Act. The case also alleged that Google had violated the law by failing to obtain parental consent to collect, store, and use biometric data belonging to millions of children and had illegally harvest other data such as physical location, website histories, personal contact lists, passwords, and…
Content type: Examples
Chromebooks, which many schools purchased at the beginning of the pandemic because of their lower cost compared to PCs and Macs, are proving expensive as their prices rise, the cost of repairs bites, and Google's expiration policy means many models are about to become e-waste. A study from US PIRG finds that doubling the Chromebooks' lifespan could save public schools $1.8 billion. Older Macs and PCs, by contrast, can go on being used and have resale value. Article: Chromebooks expire to…
Content type: Examples
Google is working to extend the lifespan of Chromebooks by providing software updates for up to a decade. The new policy, which will begin in 2024, will ensure that no current Chromebook expires in the next two years. The expiration dates were proving expensive for schools, which were having to spend millions of dollars on replacements because unsupported Chromebooks can't be used for mandatory state testing. Article: Google extends life of ChromebooksPublication: Wall Street JournalWriter…
Content type: Examples
When Dallas police posted on Twitter asking for videos of the protests taking place after George Floyd's killing, a flood of videos and images of K-pop stars were uploaded to its anonymous iWatch Dallas tip-off app. Law enforcement can call on vast numbers of networked cameras - from cars, food and retail chains that are typically willing to share with police, law enforcement agencies' own networks of surveillance and body cameras as well as object and face recognition software, protesters and…
Content type: Examples
Many of the steps suggested in a draft programme for China-style mass surveillance in the US are being promoted and implemented as part of the government’s response to the pandemic, perhaps due to the overlap of membership between the National Security Commission on Artificial Intelligence, the body that drafted the programme, and the advisory task forces charged with guiding the government’s plans to reopen the economy. The draft, obtained by EPIC in a FOIA request, is aimed at ensuring that…
Content type: Examples
US state and local authorities are using data from a host of location tracking companies, some of them little-known, such as X-Mode Social, Foursquare Labs, Cuebiq, Unacast, Phunware, and SafeGraph, to help them decide how and when to reopen. Many of these companies are part of the adtech industry and collect location data from unrelated apps to which users have given permission to access their location. Apple’s and Google’s refusal to allow contact tracing apps using their system to access…
Content type: Examples
Contact tracing apps will only work effectively if people trust them and install them in sufficient numbers. Soon after its launch, however, the North Dakota contact tracing app people were already dropping it after posting complaints in the Google App store. In a survey of 798 Americans, researchers at Microsoft Research, Johns Hopkins University, and the University of Zurich found that nearly half said they would not install a COVID-19 contact tracing app that has false negatives or could…
Content type: Examples
US government agencies are considering a range of tracking and surveillance technologies as part of efforts to control the spread of the novel coronavirus. These include: geolocation tracking and facial recognition systems to analyse photos, both to enable contact tracing. Palantir is working with the Centers for Disease Control and Prevention to model the virus outbreak, and other companies that scrape public social media data have contracts in place with CDC and the National Institutes of…
Content type: Examples
Three years ago, the Alphabet subsidiary Verily developed a software platform, Project Baseline, to run clinical trials on a group of volunteers who agree to share their medical data with a group of researchers at pharmaceutical companies and research hospitals. In early March, Verily began considering whether and how the software could be used to help detect COVID-19. To date, the site is in beta mode, and consists of a questionnaire that links local Bay Area residents to three testing sites.…
Content type: News & Analysis
Maddie Stone, formally a Senior reverse engineer and tech lead on the Android security team, shockingly revealed a number of examples of how pre-installed apps on Android devices can undermine users privacy and security in her BlackHat USA talk in August 2019. The video of the talk only recently became available to the public in late December 2019.
The apps in question come preloaded on a device when it is purchased and often can't be removed. Stone reveals a litany of abuses carried out by…
Content type: Examples
After four years of negotiation, in 2017 Google began paying Mastercard millions of dollars for access to the latter's piles of transaction data as part of its "Stores Sales Measurement" service. Google, which claimed to have access to 70% of US credit and debit cards through partners, said that double-blind encryption prevents both partners from seeing the other's users' personally identifiable information. Mastercard said the company shares transaction trends with merchants and their service…
Content type: Advocacy
Privacy International has today sent letters to leading social media platforms to ask what they're doing to protect their users' from dangerous surveillance by government immigration authorities.
The letter comes following the implementation of plans by US authorities to require nearly all visa applicants to hand over identifiers of all social media accounts they have used in the previous five years, or face “serious immigration consequences”.
The move not only represents…
Content type: News & Analysis
The first half of 2018 saw two major privacy moments: in March, the Facebook/ Cambridge Analytica scandal broke, followed in May by the EU General Data Protection Regulation ("GDPR") taking effect. The Cambridge Analytica scandal, as it has become known, grabbed the attention and outrage of the media, the public, parliamentarians and regulators around the world - demonstrating that yes, people do care about violations of their privacy and abuse of power. This scandal has been one of…
Content type: Examples
A December 2018 report prepared by the Oxford Internet Institute's Computational propaganda Research Project and the network analysis firm Graphika for the US Senate Intelligence Committee found that the campaign conducted by Russia's Internet Research Agency during the 2016 US presidential election used every major social media platform to deliver messages in words, images, and videos to help elect Donald Trump - and stepped up efforts to support him once he assumed office. The report relied…
Content type: Long Read
During the last World Economic Forum in Davos, the CEO of Microsoft joined the chorus of voices calling for new global privacy rules, saying the following in regard to the new European General Data Protection Regulation (GDPR):
“My own point of view is that it's a fantastic start in treating privacy as a human right. I hope that in the United States we do something similar, and that the world converges on a common standard."
We have come a long way. From tech companies fighting and…
Content type: Examples
In September 2018, Google warned a selection of US senators and their aides that their Gmail accounts were being targeted by foreign government hackers. Google has issued warnings of phishing attempts by state-sponsored actors since 2012, though getting a notice does not mean the account has been compromised.
https://www.cnet.com/news/google-warns-us-senators-of-foreign-hackers-targeting-their-gmail-accounts/
Writer: Richard Nieva
Publication: CNet
Content type: News & Analysis
Taylor Swift may be tracking you, particularly if you were at her Rose Bowl show in May.
According to an article published by Vanity Fair, at Swift’s concert at the California stadium, fans were drawn to a kiosk where they could watch rehearsal clips. At the same time – and without their knowledge - facial-recognition cameras were scanning them, and the scans were then reportedly sent to a “command post” in Nashville, where they were compared to photos of people who are known…
Content type: News & Analysis
Creative Commons Photo Credit: Source
Just about everyone in Washington has found something to dislike about the tech industry: Democrats especially, are worried about foreign interference in the 2016 election — meanwhile some Republicans are more concerned about bias against conservatives of platforms and on top of it all President Trump has been tweeting about antitrust and competition.
Privacy International is a vocal critic of data exploitation more generally, and the systemic…
Content type: Examples
A former Facebook insider explains to Wired Magazine why it's almost certain that the Trump campaign's skill using the site's internal advertising infrastructure was more important in the 2016 US presidential election than Russia's troll farm was. The first was the ads auction; the second a little-known product called Custom Audience and its accompanying Lookalike Audiences. Like Google's equivalent, Facebook's auction has advertisers bid with an ad, an ideal user specification, and a bid for…
Content type: News & Analysis
Simply put, the National Security Agency is an intelligence agency. Its purpose is to monitor the world's communications, which it traditionally collected by using spy satellites, taps on cables, and placing listening stations around the world.
In 2008, by making changes to U.S. law, the U.S. Congress enabled the NSA to make U.S. industry complicit in its mission. No longer would the NSA have to rely only on international gathering points. It can now go to domestic companies who hold massive…
Content type: Press release
Privacy International has filed a federal lawsuit seeking to compel disclosure of records relating to a 1946 surveillance agreement between the US, UK, Australia, Canada and New Zealand, known as the “Five Eyes alliance”.* We are represented by Yale Law School’s Media Freedom and Information Access Clinic (MFIA). The most recent publicly available version of the Five Eyes surveillance agreement dates from 1955. Our complaint was filed before the U.S. District Court for the District of Columbia…
Content type: Long Read
Disclaimer: This piece was written in April 2017. Since publishing, further information has come out about Cambridge Analytica and the company's involvement in elections.
Recently, the data mining firm Cambridge Analytica has been the centre of tons of debate around the use of profiling and micro-targeting in political elections. We’ve written this analysis to explain what it all means, and the consequences of becoming predictable to companies and political campaigns.
What does…
Content type: Long Read
This piece was written by Ashley Gorski, who is an attorney at the American Civil Liberties Union, and PI legal officer Scarlet Kim and originally appeared in The Guardian here.
In recent weeks, the Hollywood film about Edward Snowden and the movement to pardon the NSA whistleblower have renewed worldwide attention on the scope and substance of government surveillance programs. In the United States, however, the debate has often been a narrow one, focused on the…
Content type: Long Read
This week, Privacy International, together with nine other international human rights NGOs, filed submissions with the European Court of Human Rights. Our case challenges the UK government’s bulk interception of internet traffic transiting fiber optic cables landing in the UK and its access to information similarly intercepted in bulk by the US government, which were revealed by the Snowden disclosures. To accompany our filing, we have produced two infographics to illustrate the…
Content type: Press release
Key points
Privacy International, Liberty, Amnesty International, and seven other human rights organizations challenge UK mass surveillance and UK access to US mass surveillance at the European Court of Human Rights
This is the first case before the European Court of Human Rights to directly challenge UK and US mass surveillance revealed by the Snowden disclosures
National courts and oversight bodies have failed to rein in mass surveillance practices that impact hundreds of millions of…
Content type: Long Read
This piece originally appeared here.
On both sides of the Atlantic, we are witnessing the dramatic expansion of government hacking powers. In the United States, a proposed amendment to Rule 41 of the Federal Rules of Criminal Procedure would permit the government to obtain a warrant, in certain circumstances, to hack unspecified numbers of electronic devices anywhere in the world. Meanwhile, across the pond, the British Parliament is currently debating the Investigatory…
Content type: News & Analysis
Remember when the world didn't know what Prism was? Those were the days. While privacy advocates, civil libertarians, and technologists had suspected or posited the existence of an extensive surveillance regime operated by the U.S. government, few knew the details and the extent of the operation.
Undoubtedly, we know more now than we did a week ago about the National Security Agency's covert operations and how the agency routinely spies on nearly anyone in the world. The public, many…
Content type: News & Analysis
Image source
This is a guest post by Zoë Blackler.
If you want to know how the UK came to be the most watched nation in the world, with CCTV on every corner, you need to go back to 1942: the now ubiquitous policing aid was first developed for use in missile testing by the German military.
Tear gas, GPS trackers, pain rays, and surveillance drones - technologies developed by the military for use against foreign enemies have a habit of finding their way into the hands…
Content type: News & Analysis
Should the European Union agree to legitimise trade with a country that refuses to adhere to European legal standards? This is the fundamental question that will be addressed at tomorrow’s meeting among European privacy regulators when they publish their opinion on the data-sharing agreement known as the ‘Privacy Shield’, the replacement to the failed ‘Safe Harbour’ agreement.
Background
Many of the world’s largest companies, such as Google and Facebook, store their customers’ data in…