GLOBAL REPRESSION MONITOR
1,029
332
85
112
ML-Powered Insights
Machine learning analysis of case patterns and legal actors.
Surveillance Supply Chain
Mapping the corporate entities and origins of technology used in political arrests.
Top Complicit Vendors
Tech Origin
Verified Incidents
Surveillance-to-Prison Pipeline
Our machine learning models analyze news reports to detect the specific surveillance vectors used by authoritarian regimes. This diagram visualizes the correlation between specific technologies (like facial recognition or IMSI catchers) and the judicial charges that follow.
AI-Detected Surveillance Vectors
AI analysis of arrest reports reveals the primary surveillance methods used by authorities (excluding cases where the method is unknown).
Methods of Surveillance
*Based on AI analysis of arrest reports.
The Digital Panopticon
Data indicates a pivot from physical raids to algorithmic persecution. The graph displays the specific technologies and methods identified in case files.
Arrests Over Last 12 Months
Persecution Categories
Urgency Breakdown
Top Arrest Locations
Data Sources
Common Criminal Charges
| Article | Description | Frequency |
|---|---|---|
| 207.3 | Public dissemination of deliberately false information about the Armed Forces | 203 |
| 205.2 | Public incitement to or justification of terrorism | 131 |
| 280.3 | Public actions aimed at discrediting the Armed Forces | 99 |
| 30 | Preparation for and Attempted Crime | 62 |
| 275 | High Treason | 61 |
| 214 | Vandalism | 56 |
| 205 | Terrorist Act | 54 |
| 318 | Violence Against a Representative of Authority | 53 |