System Analytics // v3.0
GLOBAL REPRESSION MONITOR
▼
Documented Prisoners
982
Urgent / Critical
317
Torture Reports
82
Intl. Attention
98
Surveillance Supply Chain
Mapping the corporate entities and origins of technology used in political arrests.
103 Verified Links
Top Complicit Vendors
Tech Origin
4Countries
Verified Incidents
Surveillance-to-Prison Pipeline
Our machine learning models analyze news reports to detect the specific surveillance vectors used by authoritarian regimes. This diagram visualizes the correlation between specific technologies (like facial recognition or IMSI catchers) and the judicial charges that follow.
Loading Pipeline Data...
AI-Detected Surveillance Vectors
AI analysis of arrest reports reveals the primary surveillance methods used by authorities (excluding cases where the method is unknown).
Methods of Surveillance
*Based on AI analysis of arrest reports.
The Digital Panopticon
Data indicates a pivot from physical raids to algorithmic persecution. The graph displays the specific technologies and methods identified in case files.
Dominant VectorSocial Media Monitoring
Arrests Over Last 12 Months
Persecution Categories
Urgency Breakdown
Top Arrest Locations
Data Sources
Common Criminal Charges
| Article | Description | Frequency |
|---|---|---|
| 207.3 | Public dissemination of deliberately false information about the Armed Forces | 205 |
| 205.2 | Public incitement to or justification of terrorism | 130 |
| 280.3 | Public actions aimed at discrediting the Armed Forces | 99 |
| 30 | Preparation for and Attempted Crime | 59 |
| 275 | High Treason | 58 |
| 214 | Vandalism | 56 |
| 205 | Terrorist Act | 54 |
| 318 | Violence Against a Representative of Authority | 53 |