Hey Alexa, who are you sharing my data with?
Commuters on the Shanghai Metro all on their smartphones in March, 2019.
China's social credit system has been described as a 'dystopian nightmare straight out of Black Mirror' but many citizens think it will help fight fraud and bring about a better society.
The Northern Territory government is expanding the CCTV surveillance network.
Darwin is one of the aspiring 'smart cities' that is adopting Chinese technology that can identify and track individuals. Add changes in Australian law, and we have the makings of a surveillance state.
Technology can significantly improve governments’ surveillance abilities.
Even governments in democracies with strong traditions of rule of law find themselves tempted to abuse these new abilities.
If you're worried your phone is recording your private conversations, look closer at the data you've already agreed to give away.
If you feel like you’re being watched, it could be your smartphone spying on you.
Experts describe their research into how smartphones collect and share private personal information with tracking companies and advertisers.
Companies are compiling your smartphone data into shockingly intimate profiles that can be used against you.
Do you care if your data is being used by third parties?
Many users of digital platforms resign themselves to being monitored. That's surveillance apathy - and it's worse in society's most marginalised groups.
Who’s collecting your data, and what are they using your data for?
Brian A. Jackson/Shutterstock.com
What governments and companies think they know about us – whether or not it's accurate – has real power over our actual lives.
Do you know who has the rights to access your digital data? And who might be interested in acquiring that information?
West Point-US Military Academy/Flickr
Sooner or later, China will recognise the value of digital assets. This adds to the urgency of citizens ensuring they control the data trails that tell the world what they think and do.
UK politicians are planning very different approaches to data privacy, security and surveillance.