Special Civil Intelligence Unit to Monitor Digital Calls to Action?

Special Civil Intelligence Unit to Monitor Digital Calls to Action?
September 25, 2025

The announcement by the Ministry of the Interior about the creation of a Special Civil Intelligence Unit to “monitor digital calls” and “prevent outbreaks of violence” is a serious setback for fundamental freedoms in Ecuador. While public security is a legitimate goal, this measure represents a direct threat to freedom of expression, the right to privacy, and freedom of association, pillars of a democratic society.

  1. How they could monitor you

Monitoring public calls: The most basic and effective surveillance focuses on social media. Authorities can track and analyze in real time hashtags, keywords, mentions, and the geolocation of posts. Social media algorithms are designed to amplify content, and that same capability can be used to identify leaders, gathering points, and the pulse of a call. Those who share first are monitored, as they are often the origin points or opinion leaders of a movement.

Infiltration in chat groups: Surveillance is not limited to the public. A common method is infiltration in private chat groups (WhatsApp, Telegram) through informants or undercover agents. A group member may be a state agent who reports in real time the discussions, plans, and names of participants. Manual and profile surveillance: Beyond automated surveillance, manual surveillance remains fundamental. An intelligence unit may assign personnel to manually monitor profiles of leaders, activists, journalists, and organizations. They look for personal information, photos, relationships with other users, and activity patterns that can be used to create detailed profiles.

Advanced Analysis Technology (e.g., Palantir): The State could use data analysis software like Palantir. These systems not only limit themselves to social media, but with prior work, integrate and cross data from multiple sources (public databases, call records, social media information, etc.). This allows them to find patterns, connections, and hidden relationships among individuals, creating a complete map of a social network.

Access to Social Media APIs: Digital platforms offer APIs (Application Programming Interfaces) that allow developers and companies to access large volumes of data. An intelligence unit can use this capability to extract live information, which is then analyzed with automation software to identify patterns, detect trends, and track content viralization.

  1. Risks and precautions in communication

Avoid inciting violence: Language that can be interpreted as incitement to violence is the main legal risk. Authorities can use these posts as evidence to justify arrests, raids, and judicial processes.

Be aware that what you publish can be used against you: Everything shared on the internet leaves a digital trail. Photos, videos, and texts can be analyzed out of context and used to build a case against you.

Be careful in groups: Infiltration is a real risk. Be cautious with the information you share, especially if you don’t know all group members. Don’t assume privacy is absolute.

  1. How to protect yourself?

The best defense is a proactive approach. The following guide does not guarantee total security but significantly reduces risk. Use end-to-end encrypted messaging apps:

Signal is a safer choice than WhatsApp or Telegram. Encryption prevents message content from being read by third parties, including carriers or the government. Manage your digital footprint:

Review your social media privacy settings and restrict your profile visibility.

Be selective with what you post. Avoid sharing personal information, location details, or future plans on public profiles.

Disable geolocation on your phone’s camera if you plan to take photos at an event.

Be critical with information:

Don’t trust suspicious links or files. Phishing attacks are the primary way spyware infiltrates a device.

Use strong, unique passwords and enable two-factor authentication (2FA) on all your accounts.

Digital security is not a guarantee but an ongoing practice. Being informed is the first line of defense to protect your rights in the digital space.

From the Digital Autonomy Center, we affirm that while security is a legitimate goal, it should not be achieved at the expense of freedom of expression, privacy, and freedom of association. These freedoms, enshrined in the Constitution of the Republic of Ecuador (Art. 66, clauses 6 and 13) and the Universal Declaration of Human Rights (Art. 19), are fundamental pillars of our democracy. Therefore, we urge citizens to exercise digital caution as a form of self-care. By taking simple measures such as using encrypted messaging apps, managing privacy on social networks, and being aware of surveillance risks, everyone contributes to defending a free and safe digital space. Excessive surveillance not only restricts our freedoms but also creates a climate of fear that can silence civil society and the press. It is our collective duty to protect these essential rights.

Protecting privacy is defending human rights!