Search
Content type: Long Read
15th October 2020
As more and more of us feel compelled to cover our faces with masks, companies that work on facial recognition are confronted with a new challenge: how to make their products relevant in an era where masks have gone from being seen as the attribute of those trying to hide to the accessory of good Samaritans trying to protect others.
Facewatch is one of those companies. In May 2020, they announced they had developed a new form of facial recognition technology that allows for the…
Content type: Long Read
11th November 2019
Sitting on the ground inside an unadorned courtyard in Koira Tegui, one of Niamey’s most popular districts, Halimatou Hamadou shows a copy of what, she’s been told, is a certificate of birth.
The 33 year old woman, who’s unable to read and write, received it days earlier during a crowded public ceremony at a nearby primary school.
“It’s my first document ever,'' she says, with surprise.
Thanks to the paper, she’ll be able to take part in a crucial passage for the future of Niger: the…
Content type: Report
18th September 2019
In September 2019, Privacy International filed 10 access to documents requests to EU bodies regarding the transfer of surveillance capabilities to non-EU countries. The requests seek documents providing information on the transfer of personal data, surveillance technology, training, financing, and legislation to non-EU countries. The requests were submitted to:
Frontex
Europol
The European Union Agency for Law Enforcement Training
The Directorate-General for Economic and Financial Affairs…
Content type: Long Read
17th July 2019
By Valentina Pavel, PI Mozilla-Ford Fellow, 2018-2019
Our digital environment is changing, fast. Nobody knows exactly what it’ll look like in five to ten years’ time, but we know that how we produce and share our data will change where we end up. We have to decide how to protect, enhance, and preserve our rights in a world where technology is everywhere and data is generated by every action. Key battles will be fought over who can access our data and how they may use it. It’s time to take…
Content type: Long Read
11th July 2019
Photo By: Cpl. Joel Abshier
‘Biometrics’ describes the physiological and behavioural characteristics of individuals. This could be fingerprints, voice, face, retina and iris patterns, hand geometry, gait or DNA profiles. Because biometric data is particularly sensitive and revealing of individual’s characteristics and identity, it can be applied in a massive number of ways – and has the potential to be gravely abused.
Identification systems across the world increasingly rely on biometric…
Content type: Long Read
20th February 2019
(In order to click the hyperlinks in the explainer below, please download the pdf version at the bottom of the page).
Content type: Long Read
28th January 2019
The Privacy International Network is celebrating Data Privacy Week, where we’ll be talking about how trends in surveillance and data exploitation are increasingly affecting our right to privacy. Join the conversation on Twitter using #dataprivacyweek.
It is often communities who are already the most marginalised who are at risk because of the privacy invasions of data-intensive systems. Across the globe, we see the dangers of identity systems; the harms of online violence against women and the…
Content type: Report
7th May 2018
The use of biometric technology in political processes, i.e. the use of peoples’ physical and behavioural characteristics to authenticate claimed identity, has swept across the African region, with 75% of African countries adopting one form or other of biometric technology in their electoral processes. Despite high costs, the adoption of biometrics has not restored the public’s trust in the electoral process, as illustrated by post-election violence and legal challenges to the results of the…
Content type: Long Read
18th March 2018
Image: Eric Jones
The UK government last week hosted hundreds of surveillance companies as it continues to try and identify “technology-based solutions” able to reconcile the need for controls at the Irish border with the need to avoid them.
The annual showcase conference of 'Security and Policing' brings together some of the most advanced security equipment with government agencies from around the world. It is off limits to the public and media.
This year’s event came as EU and UK Brexit…
Content type: Long Read
1st November 2017
Photo Credit: AU UN IST / Tobin Jones
El 25 de septiembre 2017, el presidente de Paraguay objetó la totalidad de una propuesta de Ley denominada “que regula la activación del servicio de telefonía móvil”, disponiendo la creación de un registro de huellas dactilares de todos los usuarios de servicios móviles, y la desconexión dentro de un año a todos quienes no se hayan incorporado a este registro, todo ello bajo la excusa de disminuir los robos de identidad en la activación de líneas móviles…
Content type: Report
1st November 2013
Information technology transfer is increasingly a crucial element of development and humanitarian aid initiatives:
social protection programmes are incorporating digitised Management Information Systems and electronic transfers,
registration and electoral systems are deploying biometric technologies,
the proliferation of mobile phones is facilitating access to increased amounts of data, and
technologies are being transferred to support security and rule of law efforts.
Many of these…
Content type: Report
22nd September 2013
New technologies may hold great benefits for the developing world, but without strong legal frameworks ensuring that rights are adequately protected, they pose serious threats to populations they are supposed to empower.
This is never more evident than with the rapid and widespread implementation of biometric technology. Whilst concerns and challenges are seen in both developed and developing countries when it comes to biometrics, for the latter they are more acute due the absence of laws or…
Content type: Report
5th May 2005
This report investigates the probable effect of the proposed UK national Identity Card system on people who are marginalised, who suffer social disadvantage or exclusion, and those who are disabled. The work focuses on the biometrics element of the government’s proposals (specifically facial recognition, ngerprinting and iris scanning).
The Report provides a specific assessment of the recently published biometrics trial conducted by the UK Passport Service (UKPS), and compares these findings…
Content type: Report
14th July 1996
The evolution of information technology is likely to result in intimate interdependence between humans and technology. This fusion has been characterized in popular science fiction as chip implantation. It is, however, more likely to take the form of biometric identification using such technologies as fingerprints, hand geometry and retina scanning.
Some applications of biometric identification technology are now cost-effective, reliable, and highly accurate. As a result, biometric systems…
Content type: Report
5th July 1996
The evolution of information technology is likely to result in intimate interdependence between humans and technology. This fusion has been characterized in popular science fiction as chip implantation. It is, however, more likely to take the form of biometric identification using such technologies as fingerprints, hand geometry and retina scanning.
Some applications of biometric identification technology are now cost-effective, reliable, and highly accurate. As a result, biometric systems are…
Content type: Report
5th January 1996
Proposals for identity (ID) cards have provoked public outrage and political division in several countries. In this paper Simon Davies analyses the key elements of public opposition to ID Card schemes, and profiles the massive 1987 Australian campaign against a national ID card.