Search
Content type: Report
24th May 2020
It is common for families with no recourse to public funds who attempt to access support from local authorities to have their social media monitored as part of a 'Child in Need' assessment.
This practice appears to be part of a proactive strategy on the part of local authorities to discredit vulnerable families in order to refuse support. In our experience, information on social media accounts is often wildly misinterpreted by local authorities who make serious and unfounded allegations…
Content type: News & Analysis
6th April 2020
Lockdowns and quarantines are an extraordinary measure that help in slowing down the global COVID-19 pandemic, and protecting the population.
However, they come at an even higher cost to some individuals, such as victims of domestic violence, persons in a vulnerable situation, and human rights defenders, who face specific threats that are exacerbated by measures taken by governments to address the global pandemic.
In that context, states should adopt special measures to keep those people…
Content type: Explainer
24th May 2020
Social media platforms are a vast trove of information about individuals, including their personal preferences, political and religious views, physical and mental health and the identity of their friends and families.
Social media monitoring, or social media intelligence (also defined as SOCMINT), refers to the techniques and technologies that allow the monitoring and gathering of information on social media platforms such as Facebook and Twitter which provides valuable intelligence to others…
Content type: Advocacy
24th February 2020
TEDIC, InternetLab, Derechos Digitales, Fundación Karisma, Dejusticia, Asociación por los Derechos Civiles and Privacy International welcome the call made by the Special Rapporteurship on Economic, Social, Cultural and Environmental Rights (ESCER) of the Inter-American Commission on Human Rights (IACHR) to inform the preparation of the Annual Report of the ESCER for the year 2019, which will be presented to the Organization of American States (OAS) during 2020.
This submission aims to outline…
Content type: Examples
19th March 2020
The "safety guidance texts" sent by health authorities and district offices in South Korea are causing information overload and have included embarrassing revelations about infected people's private lives. A text may include, for example, a link to trace the movements of people who have recently been diagnosed with the virus. Clicking on the link takes the user to the website of a district office that lists the places the patient had visited before testing positive. In one case, a man in his…
Content type: Long Read
24th May 2020
Dear Sir/Madam,
Freedom of information act request
RE: Social media monitoring / social media intelligence
FOIA REQUEST
For definition of social media intelligence please see background explanation below. We further note the comments of the Office of Surveillance Commissioners Annual Report 2016 cited below.
1. In 2016 the Rt Hon Lord Judge, then Chief Surveillance Commissioner, wrote to all Local Authorities regarding use of social media in investigations. Please confirm whether you are…
Content type: Advocacy
24th February 2020
TEDIC, InternetLab, Derechos Digitales, la Fundación Karisma, Dejusticia, la Asociación por los Derechos Civiles y Privacy International acogen el llamado de la Relatoría Especial sobre Derechos Económicos, Sociales, Culturales y Ambientales (DESCA) de la Comisión Interamericana de Derechos Humanos (CIDH) de enviar información para la elaboración del Informe Anual sobre DESCA del año 2019, que se presentará ante la Organización de los Estados Americanos (OEA) en 2020.
El objeto de este…
Content type: Video
27th March 2020
We can’t believe we’re having to say this, but the hours after giving birth are private. If you’re a parent, you may have heard of Bounty, a sales and marketing company allowed access to hospital maternity wards and approach women who have just given birth. This doesn’t happen on any other hospital ward. Can you imagine coming round from major surgery to find a stranger trying to sell you stuff? The physical invasion of privacy is bad enough, but delving into the company’s relationship with…
Content type: Advocacy
7th May 2020
Privacy International responded to the call for submissions of the Working Group on the use of mercenaries as a means of violating human rights and impeding the exercise of the rights of peoples to self-determination on role of private military and security companies in immigration and border management and the impact on the protection of the rights of all migrants.
This submission builds on PI’s research and reporting highlighting examples of the involvement of private companies in…
Content type: News & Analysis
24th February 2020
In mid-2019, MI5 admitted, during a case brought by Liberty, that personal data was being held in “ungoverned spaces”. Much about these ‘ungoverned spaces’, and how they would effectively be “governed” in the future, remained unclear. At the moment, they are understood to be a ‘technical environment’ where personal data of unknown numbers of individuals was being ‘handled’. The use of ‘technical environment’ suggests something more than simply a compilation of a few datasets or databases.
The…
Content type: Report
24th May 2020
SUMMARY
In the UK, local authorities* are looking at people’s social media accounts, such as Facebook, as part of their intelligence gathering and investigation tactics in areas such as council tax payments, children’s services, benefits and monitoring protests and demonstrations.
In some cases, local authorities will go so far as to use such information to make accusations of fraud and withhold urgently needed support from families who are living in extreme poverty.
THE PROBLEM
Since 2011…
Content type: Advocacy
1st June 2020
Last week, Privacy International joined more than 30 UK charities in a letter addressed to the British Prime Minister Boris Johnson, following his recent declaration, asking him to lift No Recourse to Public Funds (NRPF) restrictions.
Since 2012, a ‘NRPF condition’ has been imposed on all migrants granted the legal right to live and work in the UK. They are required to pay taxes, but they are not permitted to access the public safety net funded by those taxes.
This is not a topic we are known…
Content type: Examples
22nd March 2020
The Israeli prime minister, Benjamin Netanyahu, has authorised the country's internal security agency to use a previously secret tranche of mobile phone geolocation data, gathered to combat terrorism, to retrace the movements of individuals with confirmed cases of the coronavirus and identify people they've interacted with who should be quarantined. After Parliament's Secret Services Subcommittee ended its discussions without approving the measure, Netanyahu said the government would approve…
Content type: Long Read
24th May 2020
Online covert activity
3.10 The growth of the internet, and the extent of the information that is now available online, presents new opportunities for public authorities to view or gather information which may assist them in preventing or detecting crime or carrying out other statutory functions, as well as in understanding and engaging with the public they serve. It is important that public authorities are able to make full and lawful use of this information for their statutory purposes. Much…
Content type: Long Read
24th May 2020
The Chief Surveillance Commissioner, The Rt Hon Sir Christopher Rose’s Annual Report 2011 - 12 did not refer to social networks but to overt investigations using the internet as a surveillance tool, stating that:
“5.17 A frequent response to my Inspectors’ enquiries regarding a reduction in directed surveillance is that ‘overt’ investigations using the Internet suffice. My Commissioners have expressed concern that some research using the Internet may meet the criteria of directed…
Content type: Examples
1st April 2020
An engineering and computer science professor and his team from The Ohio State University discovered a design flaw in low-powered Bluetooth devices that leaves them susceptible to hacking.
Zhiqiang Lin, associate professor of computer science and engineering at the university, found the commonly used Bluetooth Low Energy devices, such as fitness trackers and smart speakers, are vulnerable when they communicate with their associated apps on the owner’s mobile phone.
"There is a fundamental…
Content type: Long Read
19th May 2020
Covid Apps are on their way to a phone near you. Is it another case of tech-solutionism or a key tool in our healthcare response to the pandemic? It’s fair to say that nobody quite knows just yet.
We’ve been tracking these apps since the early days. We’ve been monitoring Apple and Google closely, have been involved in the UK’s app process, our partners in Chile and Peru have been tracking their governments’ apps, and more.
Of course privacy concerns arise. But only a simplistic analysis would…
Content type: Examples
24th March 2020
The Belgian Minister of Public Health has approved a programme under which telephone companies Proximus and Telenet will transfer some of their their data to the private third-party company Dalberg Data Insights in order to help combat the coronavirus epidemic; Orange has also agreed "in principle". The details are still to be agreed pending a legal and technical analysis of the proposed project. So far it has been reported that location data and real-time tracking would be used to assess the…
Content type: Examples
21st March 2020
A phone-tracking system used by SAPOL for criminal investigations was used to better understand where a coronavirus-infected 60-year-old couple, who had travelled from Wuhan to visit relatives, roamed in Adelaide in order to identify people who might have been exposed, according to the South Australian police commissioner. Police used a program that only requires a phone number to initiate a download of where the phone has been used; to use it they must meet a legislative threshold requiring…
Content type: Examples
21st March 2020
Hakob Arshakyan, Armenia's minister of the high technology industry, has convened a research group comprising experts in IT and AI has been convened to collect and analyse data on the spread of coronavirus, compare it with the data collected by international partners, and develop forecasts. The minister believes that the research group's work will help provide accurate and reliable information that will help coordinate and manage containment efforts. As of March 19, Armenia had confirmed 122…
Content type: Long Read
8th July 2020
Over the last two decades we have seen an array of digital technologies being deployed in the context of border controls and immigration enforcement, with surveillance practices and data-driven immigration policies routinely leading to discriminatory treatment of people and undermining peoples’ dignity.
And yet this is happening with little public scrutiny, often in a regulatory or legal void and without understanding and consideration to the impact on migrant communities at the border and…