Privacy

40 mins

Right to Privacy: Data and Surveillance

Privacy International
Abstract:
Want to know why people keep chatting about metadata? Or why your phone is head over heels attracted to attaching to a surveillance device called an IMSI Catcher? Then this course is for you.
About this course:
The threats to the right to privacy are varied and powerful. This course is going to help you understand the revealing nature of metadata, and also introduce you to important categories surveillance technologies: network and tactical. You’ll also be told about how these technologies have been used against opponents and activists around the world
What do I learn:
You’ll learn about the fundamentals of communication networks, the different protections metadata receives in countries around the world, the technologies that conduct surveillance technologies and the Adversary who operates these surveillance technologies.
What do I need to know:
If you are completely new to the topic, it would be advisable to take the course Right to Privacy: Introduction and Principles first. If you are already familiar with technologies and the right to privacy then this course is at a suitable level for you.

Trainers

Privacy International

Privacy International is committed to fighting for the right to privacy across the world. We litigate to ensure that surveillance is consistent with the rule of law. And advocate for strong national, regional, and international laws that protect privacy, conducting research to catalyse policy change.

Matthew Rice

Matthew Rice is the Scotland Director at Open Rights Group. He was previously an Advocacy Officer at Privacy International working across the organisation engaging with international partners and strengthening their capacity on communications surveillance issues.

1.1 Introduction to course
2.1 Metadata: Defined and Explained
2.2 How is data generated and stored?
2.3 How is data communicated?
2.4 Quiz: Metadata vs Content
2.5 Quiz: IMEI and IMSI
3.1 Threats to the right to privacy: Key concepts
3.2 Who are the actors?
3.3 Network Surveillance
3.4 Case study: Macedonia - Society on tap
3.5 Quiz: Network Surveillance
4.1 Tactical Surveillance: Surveillance your phone loves to connect to
4.2 How your device can become a spy
4.3 Quiz: Tactical Surveillance - True or False?
4.4 Case study: Intrusion Technology - Their Eyes on Me
4.5 Quiz: Case Study
5.1 Conclusion

Related courses

  • 35 mins

    Privacy

    Right to Privacy: Introduction and Principles

    Privacy International

    35 mins

    Privacy International
  • 40 mins

    Privacy

    Researching Privacy

    Privacy International

    40 mins

    Privacy

    Researching Privacy

    Privacy International

Suggested reading

Skip to navigation
0
0
  • Privacy
  • Terms