Search
Content type: Explainer
The ‘Guide to Digital Safety and Privacy at Peaceful Protests’ has been produced by 7amleh - The Arab Center for the Advancement of Social Media.
7amleh has adapted the content of PI's UK Free to Protest guide to fit the Palestinian context. The guide is organized in three sub-guides: (1) a guide to digital safety and privacy at peaceful protests; (2) a guide to surveillance of protesters’ faces and bodies; and (3) a guide to policing databases and predictive policing tools.
This guide was…
Content type: Examples
The 20 years since the 9/11 attacks have fundamentally changed the way the New York Police Department operates, leading it to use facial recognition software, licence plate readers, and mobile X-ray vans, among other surveillance tools for both detecting and blocking potential terrorist attacks and solving minor crimes. Surveillance drones monitor mass protests, antiterrorism officers interrogate protesters, and the NYPD’s Intelligence Division uses antiterror tactics against gang violence and…
Content type: Examples
Clashes between police and lockdown protesters have spawned reports of police brutality in Greece. Mobile phone footage of one such protest in March 2021 suggested that the police are using drones to surveil the protests, and some of those remanded have complained that they’ve been beaten and subjected to threats and sexual harassment while in custody. Disinfaux Collective has identified an individual caught on video throwing a petrol bomb as “either a police officer of the DRASI unit… or,under…
Content type: Examples
Israel is abandoning its longstanding tactic of raiding Palestinian homes for “intelligence mapping” in favour of digitised surveillance that includes a vast and sophisticated 20-year-old network of CCTV, ANPR, and IP cameras throughout the Old City in East Jerusalem (“Mabat 2000”), automated facial recognition-equipped checkpoints (provided by the domestic company AnyVision) between Israel and the occupied West Bank, and drone surveillance at Palestinian protests. The drones over weekly…
Content type: News & Analysis
It is difficult to imagine a more intrusive invasion of privacy than the search of a personal or home computer ... when connected to the internet, computers serve as portals to an almost infinite amount of information that is shared between different users and is stored almost anywhere in the world.
R v Vu 2013 SCC 60, [2013] 3 SCR 657 at [40] and [41].
The controversial Police Crime Sentencing and Courts Bill includes provision for extracting data from electronic devices.
The Bill…
Content type: Long Read
This is based on UK data protection legislation. The UK’s General Data Protection Regulation (UK GDPR) does not apply to processing of personal data for law enforcement purposes by relevant authorities.
What can happen to my personal data at a peaceful protest?
The most common personal data processed at a protest are notes and photographs taken by police officers, along with voice and video recordings taken from body-worn cameras or drones.
Data processing can also happen with…
Content type: Long Read
Photographing or filming incidents involving police and protestors is an important way of holding the police to account for their actions. Members of the public and the media do not need a permit to film or photograph in public places and police have no power to stop them filming or photographing incidents or police personnel.[1]
Can the police stop and search me for filming or taking photographs?
The police have the discretion to ask you to move back if they think you are interfering with…
Content type: Examples
While traditional media sought to criminalize the widespread November 2020 protests in Peru following the Congressional ouster of President Vizcarra, witnesses disseminated videos and photographs of police abuse on social networks. In the fear and uncertainty, many myths also circulated. In Peru, citizens have the right to refuse to allow police to check their cellphones unless they have a court order; slowed or absent wireless connections may simply be due to overload; as public officials,…
Content type: Examples
On November 9, 2020, after a year of escalating tensions, Peruvian president Martín Vizcarra was impeached on the grounds of "moral incapacity" by lawmakers threatened by his anti-corruption investigations and the policy reform he led. The street protests that followed all over the country were coordinated via Instagram, Twitter, WhatsApp, and TikTok (#MerinoNoMeRepresenta) by hundreds of newly-created small, decentralised organisations. The march on November 14 is thought to be the largest in…
Content type: Examples
US Customs and Border Protection Data show that the Department of Homeland Security deployed helicopters, airplanes, and drones over 15 cities, including New York City, Buffalo, Dayton OH, and Philadelphia, where demonstrators assembled to protest the killing of George Floyd and collected at least 270 hours of video surveillance footage. That deployment, which sparked a congressional inquiry, was only part of a nationwide operation that repurposed resources usually sent to the US border to find…
Content type: Examples
According to records obtained under a freedom of information request, the San Francisco Police Department used the camera network belonging to downtown Union Square Improvement District to spy on protesters during the end of May and early June 2020. The high-definition cameras, manufactured by Motorola brand Avigilon, can zoom in on a person's face and are linked to a software analysis system. Motorola is expanding its tool lineup to make it easier for police to gain access to private cameras…
Content type: Examples
Over 2020, EFF supported the right to protest without being surveilled by bringing lawsuits, offering protesters legal support, teaching protesters surveillance self-defence, and providing tools for people on the ground to use to determine what equipment their local police departments are using to spy on activists. Via public records requests, EFF discovered that the San Francisco Police Department gained access to over 400 cameras belonging to the Union Square Business Improvement District to…
Content type: Examples
When Dallas police posted on Twitter asking for videos of the protests taking place after George Floyd's killing, a flood of videos and images of K-pop stars were uploaded to its anonymous iWatch Dallas tip-off app. Law enforcement can call on vast numbers of networked cameras - from cars, food and retail chains that are typically willing to share with police, law enforcement agencies' own networks of surveillance and body cameras as well as object and face recognition software, protesters and…
Content type: Examples
Despite having promised in 2016 not to facilitate domestic surveillance, the AI startup Dataminr used its firehose access to Twitter to alert law enforcement to social media posts with the latest whereabouts and actions of demonstrators involved in the protests following the killing of George Floyd. Dataminr's investors include the CIA and, previously, Twitter itself. Twitter's terms of service ban software developers from tracking or monitoring protest events. Some alerts were sourced from…
Content type: Examples
New data emerged in January 2021 to show that the National Guard deployment of more than 43,350 troops during the nationwide demonstrations following the killing of George Floyd was far more extensive than had been realised, and far greater than the 6,200 troops deployed at the Capitol during the forewarned insurrection. At least 20 military surveillance and reconnaissance helicopters flew over protests in Philadelphia, Minneapolis, Atlanta, and Washington DC, raising concerns about the data…
Content type: Examples
Hundreds of emails and documents obtained in response to a freedom of information request by BuzzFeed News show that US federal agents monitored social media for information on planned Black Lives Matter demonstrations in Minneapolis, Washington DC, Los Angeles, and other cities. Researchers and activists (such as EFF) warned that technology-driven surveillance of protesters could set a dangerous precedent and chill assembly and speech, particularly in the case of Black Lives Matter. The…
Content type: Examples
Human rights activists and Democratic members of the US Congress wrote to top law enforcement officials in the Trump administration to demand they cease surveilling Americans engaging in peaceful protests. Trump and others in his administration called those protesting the killing of George Floyd "domestic terrorists" and "anarchists". Recent efforts to surveil Americans have included facial recognition, automated licence plate readers, and Stingrays, as well as spy planes and drones.
https://…
Content type: Examples
During the Black Lives Matter protests of summer 2020, US police took advantage of a lack of regulation and new technologies to expand the scope of people and platforms they monitor; details typically emerge through lawsuits, public records disclosures, and stories released by police department PR as crime prevention successes. A report from the Brennan Center for Justice highlights New York Police Department threats to privacy, freedom of expression, and due process and the use of a predator…
Content type: Explainer
What is social media monitoring?
Social media monitoring refers to the monitoring, gathering and analysis of information shared on social media platforms, such as Facebook, Twitter, Instagram and Reddit.
It may include snooping on content posted to public or private groups or pages. It may also involve “scraping” – grabbing all the data from a social media platform, including content you post and data about your behaviour (such as what you like and share).
Through scraping and other tools…
Content type: Explainer
What are my 'unique identifiers' and where are they stored?
Your phone and your SIM card contain unique identifiers about you, which can be accessed by the police to identify you.
The IMSI (International Mobile Subscriber Identity) is a unique number associated with your SIM card. It doesn't change, even if you put the SIM card into a different phone.
If you have a mobile phone subscription, the IMSI will be associated with personal information such as your name and address.
The IMEI (…
Content type: Explainer
Where are my communications stored?
Text messages/phone calls: Traditional cellphone communications happen over the cellular network. You usually access those with the text message and phone call apps that are provided as standard on your phone. While phone calls aren’t stored anywhere, text messages are stored locally on your and the recipient’s devices. They might also be temporarily stored by the network provider.
Messaging apps: Messaging platforms enable fairly secure communication…
Content type: Explainer
What is hacking?
Hacking refers to finding vulnerabilities in electronic systems, either to report and repair them, or to exploit them.
Hacking can help to identify and fix security flaws in devices, networks and services that millions of people may use. But it can also be used to access our devices, collect information about us, and manipulate us and our devices in other ways.
Hacking comprises a range of ever-evolving techniques. It can be done remotely, but it can also include physical…
Content type: Examples
At least 27 countries are using data from cellphone companies to track the movements of their citizens, and at least 30 have developed smartphone apps for the public to download. Fewer objections have been raised in countries with greater levels of success in containing the virus. However, although Turkey has one of the worst outbreaks there has been little pushback against the surveillance even though the government is forcibly tracking people over 65, who are not allowed to leave their homes…
Content type: Examples
While the agency that manages residence permits, the Coordination of Government Activities in the Territories, is closed, Israel has instructed Palestinians seeking to verify whether their permits to remain in Israel are still valid to download the app Al Munasiq, which grants the military access to their cellphone data. The app would allow the army to track the Palestinians' cellphone location, as well as access their notifications, downloaded and saved files, and the device's camera. …
Content type: Examples
After police in Bellevue, WA were inundated with calls from local residents reporting suspected violations of the state's week-old stay-at-home order, they asked the public to use the MyBellevue app instead, to keep 911 lines open for emergencies. The police added that they have no plans to charge or arrest violators, but will visit reported hot spots in order to educate the public about the rules. Residents are required to remain at home but there are exceptions for essential industries, trips…
Content type: Examples
Spanish police are using drones to warn people to stay indoors apart from necessary trips after seeing a spike in COVID-19 cases. Human officers control the drones and relay via radio warnings to people to leave public parks and return home.
Source: https://www.businessinsider.com/spanish-police-using-drones-to-ask-people-stay-at-home-2020-3
Writer: Charlie Wood
Publication: BusinessInsider
Content type: Examples
On March 9, SK Telecom began providing South Korea's Gyeongbuk Provincial Police Agency with its Geovision population analysis service and GIRAF platform. The company claims that the combination can analyse mobile geolocation data across the country in real time, create visualisations, and show how many people are in 10x10 metre lattices, enabling police to send officers where they're needed to enforce distancing measures. The company is in talks with the Korean National Police Agency to expand…
Content type: Examples
Together with Norwegian company Simula the Norwegian Institute of Public Health is developping a voluntary app to track users geolocation and slow the spread of Covid-19. Running in the background, the app will collect GPS and Bluetooth location data and store them on a server for 30 days. If a user is diagnosed with the virus, its location data can be user to trace all the phones that have been in close contact with the person. Authorities will use this data to send an SMS only to those phones…
Content type: Examples
The new Singaporean app, TraceTogether, developed by the Government Technology Agency in collaboration with the Ministry of Health was launched on March 20 after eight weeks of development. The app, which can be downloaded by anyone with a Singapore mobile number and a Bluetooth-enabled smartphone, asks users to turn on Bluetooth and location services, and enable push notifications. The app works by exchanging short-distance Bluetooth signals between phones to detect other users within two…
Content type: Examples
Russian prime minister Mikhail Mishustin has ordered the country's Communications Ministry to develop a system, to be built on analysing specific individuals' geolocation data from telecommunications companies that can track people who have come into contact with those who have tested positive for the novel coronavirus. The data will also be passed to regional-level task forces fighting the virus's spread; officials are also tasked with finding a way to notify those who may have come into…