A/HRC/48/Add.xx data obtained from digital devices necessarily leads to reliable evidence is flawed.69 Governments have also resorted to social media intelligence, the techniques and technologies that allow companies or governments to monitor social media networking sites.70 Some of these activities are undertaken directly by government officials themselves but in some instances, governments call on companies to provide them with the tools and/or knowhow to undertake this surveillance.71 31. During the COVID-19 pandemic, the proliferation of contact-tracing apps has raised concerns that sharing information about areas with high concentrations of infections could reinforce the existing social stigmatization of disproportionately infected groups and communities, with a particular disparate impact on the basis of race, ethnicity, national origin and citizenship status. 72 32. One submission detailed concerning practices regarding seizure of digital data in Germany. 73 Pursuant to the amended Asylum Act (Asylgesetz, “AsylG”) § 15, asylum seekers unable to produce a valid passport or equivalent document must surrender all data carriers—not only mobile phones but also laptops, USB sticks, and even fitness wristbands— along with login information to be “read out” by BAMF to confirm identity or nationality. 74 The Law also empowers BAMF to share the data with other government agencies, such as security authorities and intelligence services.75 If determined necessary, the readout takes place before the asylum hearing upon request by the Asylum Procedures Secretariat with the asylum applicant’s signed consent,76 although the submission notes that applicants are “under exceptional pressure to follow governmental requests” for fear of negative consequences that could result from their asylum procedure. 77 This routine practice affected more than half of all first-time asylum applicants in the past two years,78 and certain nationalities more than others raising serious concerns of de facto national origin discrimination. 33. This invasive data extraction from personal devices is unprecedented, targets only asylum seekers, and the legalization of these measures was based on racist and xenophobic assumptions in political discourse.79 The submission further highlights that data carrier evaluations have proven unsuitable to verify the identity or national origin of the asylum seeker with any degree of certainty, or to prevent abuse of asylum procedures.80 Approximately a quarter of attempted readouts fail technically, and even if readouts are successful, most of the evaluation reports are unusable because the set of data reviewed is too small or otherwise inconclusive.81 Among 21,505 mobile phones successfully read out in 2018 and 2019, only about 118 cases, or 0.55%, indicated a contradiction. 82 Furthermore, since neither the algorithms nor training data are known to the public, judges and other decision-makers cannot properly assess their reliability.83 34. Although regulations such as the European Union’s General Data Protection Regulation (“GDPR”) seek to protect data and privacy, some States create exemptions in the immigration enforcement context. Two submissions noted relevant GDPR exemptions in the UK Data Protection Act of 2018.84 Under this “immigration exemption,” an entity with the power to process data, known as a “data controller,” may circumvent core rights of an 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 GFF, Submission. PI et al., Submission. Ibid. https://policyoptions.irpp.org/magazines/april-2020/five-ways-a-covid-19-contact-tracing-app-couldmake-things-worse/. GFF, Submission. Ibid. Ibid. Ibid. Ibid. Ibid. Ibid. Ibid. Ibid. Ibid. Ibid. Ibid.; Platform for International Cooperation on Undocumented Migrants (“PICUM”), Submission. 11

Select target paragraph3