Search
Content type: Long Read
9th April 2019
(In order to click the hyperlinks in the explainer below, please download the pdf version at the bottom of the page).
Content type: Long Read
27th March 2019
(In order to click the hyperlinks in the explainer below, please download the pdf version at the bottom of the page).
Content type: Long Read
20th August 2019
This blog is about our new Twitter bot, called @adversarybot. If you want to follow the account, please do watch the pinned 'Privacy Policy' tweet before you do so.
Content type: News & Analysis
22nd October 2019
Privacy International has been doing work on the UK-based digital identity company, Yoti. We have raised concerns about their use of user data for their 'Yoti Age Scan' product. As we say in our analysis:
Yoti Age Scan is just one example of digital identity. The issues ... can be used to reflect on wider issues relating to the use of data gathered in the course of identity services: how do we want the identity industry to treat our data? What is the future for this market, and how do we…
Content type: Long Read
4th February 2019
Over the past year, the Privacy International Network has uncovered, campaigned, and advocated on how trends in surveillance and data exploitation are increasingly affecting our right to privacy.
To celebrate Data Privacy Day on 28 January, we shared a full week of stories and research, exploring how countries are addressing data governance, and the implications for our security and privacy.
Monday - Exposing Harms, Fighting Back
It is often communities who are already the most marginalised…
Content type: Examples
12th August 2019
In February 2019, the World Food Programme, a United Nations aid agency, announced a five-year, $45 million partnership with the data analytics company Palantir. WFP, the world's largest humanitarian organisation focusing on hunger and food security, hoped that Palantir, better known for partnering with police and surveillance agencies, could help analyse large amounts of data to create new insights from the data WFP collects from the 90 million people in 80 countries to whom it distributes 3…
Content type: Examples
7th May 2019
The rise of social media has also been a game changer in the tracking of benefits claimants. In the UK in 2019, a woman was jailed after she was jailed for five months after pictures of her partying in Ibiza emerged on social media. She had previously sued the NHS for £2.5 million, after surviving a botched operation. She had argued the operation had left her disabled and the “shadow of a former self” but judges argued that the pictures suggested otherwise.
https://www.dailymail.co.uk/news/…
Content type: Examples
7th May 2019
The rise of social media has also been a game changer in the tracking of benefits claimants. Back in 2009, the case of Nathalie Blanchard a woman in Quebec who had lost her disability insurance benefits for depression because she looked “too happy” on her Facebook pictures had made the news.
https://abcnews.go.com/Technology/AheadoftheCurve/woman-loses-insurance-benefits-facebook-pics/story?id=9154741
Author: Ki Mae Heussner
Publication: ABC News
Content type: Examples
13th November 2019
A woman was killed by a spear to the chest at her home in Hallandale Beache, Florida, north of Miami, in July. Witness "Alexa" has been called yet another time to give evidence and solve the mystery. The police is hoping that the smart assistance Amazon Echo, known as Alexa, was accidentally activated and recorded key moments of the murder. “It is believed that evidence of crimes, audio recordings capturing the attack on victim Silvia Crespo that occurred in the main bedroom … may be found on…
Content type: Long Read
28th June 2019
Everyday objects and devices that can connect to the Internet -- known as the Internet of Things (IoT) or connected devices -- play an increasing role in crime scenes and are a target for law enforcement. Exploiting new technologies that are in our homes and on our bodies as part of criminal investigations and for use as evidence, raises new challenges and risks that have not been sufficiently explored.
We believe that a discussion on the exploitation of IoT by law enforcement would benefit…
Content type: Explainer
5th August 2019
Recently the role of social media and search platforms in political campaigning and elections has come under scrutiny. Concerns range from the spread of disinformation, to profiling of users without their knowledge, to micro-targeting of users with tailored messages, to interference by foreign entities, and more. Significant attention has been paid to the transparency of political ads - what are companies doing to provide their users globally with meaningful transparency into how they're being…
Content type: News & Analysis
3rd April 2019
PI has today written to Google, Instagram, Snapchat, TicTok, Twitter, YouTube, and WhatsApp to ask for more information about their steps to tell people why they are seeing ads. Facebook recently announced expanding the company's ad transparency measures to include more information about why an ad or content appears in a user's newsfeed. While Facebook has a lot more to do, it is important that all technology companies provide advertising transparency.
Recently, we have seen how platforms…
Content type: News & Analysis
4th October 2019
Photo by Daniel Jensen on Unsplash
Everyone is talking about Facebook's end-to-end encryption plans and the US, UK and Australian government's response. Feeling lost? Here is what you need to know.
What's Facebook trying to do?
First let's be clear: Facebook has many faults when it comes to privacy. It's also suffered a number of security failures recently. See here for instance.
In response to their successive failures to protect your privacy, Facebook announced in their 'pivot to privacy…
Content type: Examples
9th February 2019
In 2018, WhatsApp founder Brian Acton responded to the Cambridge Analytica scandal by tweeting "It is time. #deletefacebook." He also left the company, walking away from $850 million in unvested stock rather than accede to Facebook's plans to add advertising and commercial messaging, a purpose at odds with WhatsApp's encrypted environment. In 2014, Acton and his co-founder Jan Koum, sold WhatsApp to Facebook for $22 billion. Acton's wanted instead to monetise WhatsApp by charging users tiny…
Content type: News & Analysis
14th May 2019
Privacy International welcomes WhatsApp's immediate reaction after the revelation that Israeli cyber intelligence company NSO group had exploited a vulnerability in their software. We encourage all WhatsApp users to update their app as soon as possible. However, we believe WhatsApp needs to be much more transparent with their users. We haven't seen a notification on the app itself that would inform users about both, the bug, and the fix. The current version merely states that you can now see…
Content type: News & Analysis
30th April 2019
A mobile device is a huge repository of sensitive data, which could provide a wealth of information about its owner and many others with whom the user interacts.
Companies like Cellebrite, MSAB and Oxygen Forensics sell software and hardware to law enforcement. Once your phone is connected to one of these mobile phone extraction tools, the device extracts, analyses and presents the data contained on the phone.
What data these tools can extract and what method is used will depend on the…
Content type: Examples
3rd May 2019
Virginia Eubanks explains what we can draw from understanding the experience of surveillance of marginalised groups: it is a civil rights issue, technologies carry the bias of those who design them, people are resisting and why we need to move away from the privacy rights discourse.
https://prospect.org/article/want-predict-future-surveillance-ask-poor-communities
Author: Virginia Eubanks
Publication: The American Prospect
Content type: Examples
3rd May 2019
In the United States, monitoring efforts to combat public benefits fraud are often part of a broader approach that focuses on stigmatizing people receiving benefits and reducing their number, rather than ensuring that the maximum number of people who are eligible receive benefits. However, fraud constitutes less than 1% of the benefits disbursed through the Supplemental Nutrition Assistance Program (SNAP), which are also known as food stamps, and less than 2% of unemployment insurance payments…
Content type: Examples
25th February 2019
In 2018, Wells Fargo disclosed that due to a computer bug that remained undiscovered for nearly five years 600 customers were granted more expensive mortgage loans than they could have qualified for. About 400 of them went on to lose their homes. The announcement reignited the public anger and distrust created by the bank's 2016 fake accounts scandal, which was attributed to a hard-driving, aggressive, pervasive sales culture that is difficult to change.
https://www.ft.com/content/dbc1d692-…
Content type: Long Read
23rd July 2019
image from portal gda (cc)
Many people are still confused by what is 5G and what it means for them. With cities like London, New York or San Francisco now plastered with ads, talks about national security, and the deployment of 5G protocols being treated like an arms race, what happens to our privacy and security?
5G is the next generation of mobile networks, which is meant to be an evolution of the current 4G protocols that mobile providers have deployed over the last decade, and there are…
Content type: News & Analysis
14th January 2019
Federal law enforcement is deploying powerful computer hacking tools to conduct domestic criminal and immigration investigations.
By Alex Betschen, Student Attorney, Civil Liberties & Transparency Clinic, University at Buffalo School of Law
Hacking by the government raises grave privacy concerns, creating surveillance possibilities that were previously the stuff of science fiction. It also poses a security risk, because hacking takes advantage of unpatched vulnerabilities in our devices…
Content type: News & Analysis
16th September 2019
Photo by Sharon McCutcheon on Unsplash
In May, the United Nations Special Rapporteur on extreme poverty and human rights, Philip Alston invited all interested governments, civil society organisations, academics, international organisations, activists, corporations and others, to provide written input for his thematic report on the human rights impacts, especially on those living in poverty, of the introduction of digital technologies in the implementation of national social protection…
Content type: Long Read
4th February 2019
During the last World Economic Forum in Davos, the CEO of Microsoft joined the chorus of voices calling for new global privacy rules, saying the following in regard to the new European General Data Protection Regulation (GDPR):
“My own point of view is that it's a fantastic start in treating privacy as a human right. I hope that in the United States we do something similar, and that the world converges on a common standard."
We have come a long way. From tech companies fighting and…
Content type: News & Analysis
6th February 2019
Dear will.i.am,
We saw your piece in the Economist and were very excited to learn that you care about privacy as much as we do. At PI we expose government and corporate bad behaviours, we disrupt their plans, and identify a hopeful path forward.
That’s why we very much agree with you that people need much more protection, transparency and control over their personal data. Cheers for: “I want to have it clearly explained in plain language who has access to my camera, to my photos, who’s…
Content type: Examples
12th August 2019
In December 2018 Walmart was granted a patent for a new listening system for capturing and analysing sounds in shopping facilities. The system would be able to compare rustling shopping bags and cash register beeps to detect theft, monitor employee interactions with customers, and even listen to what customers are saying about products. The company said it had no plans to deploy the system in its retail stores. However, the patent shows that, like the systems in use in Amazon's cashier-less Go…
Content type: Examples
17th May 2019
A vulnerability in Amadeus, the customer reservation system used by 144 of the world's airlines, was only superficially patched after a team reported the vulnerability in 2018. As a result, an attacker could alter online strangers' Passenger Name Records, which contain all the details of the passengers and flights, and are used by government security agencies to check against the no-fly list. Bug hunter Noam Rotem discovered that a web script hosted by individual airlines accepts passengers'…
Content type: News & Analysis
17th October 2019
CC: BY (Kirill Sharkovski)-SA
Este artículo fue escrito por Jamila Venturini, Coordinadora regional de Derechos Digitales. El artículo fue publicado por primera vez aquí. This article is available in English.
La implementación de programas que condicionan el acceso a servicios básicos por medio de vigilancia estatal y privada agudizan la inequidad imperante en el continente.
Mientras la brecha entre ricos y pobres se incrementa en el mundo, América Latina sigue siendo la región donde la…
Content type: Video
9th September 2019
Research by Privacy International revealed some menstruation apps share sensitive personal data, including their user's health data and data about their sexual lives. Christopher Weatherhead - Technology lead at Privacy International - interviews Eva Blum-Dumontet, project manager for "No Body's Business But Mine" about the findings of the research.