Advanced Search
Content Type: Report
Wednesday, January 25, 2017
This investigation looks at how surveillance is being conducted in Thailand. The first part of the investigation focuses on the ties between telecommunication companies and the state, and the second part of the investigation focuses on attacks conducted in order to attempt to circumvent encryption.
Content Type: Long Read
Thursday, August 9, 2018
Creative Commons Photo Credit: Source
In the midst of continued widespread public outrage at the US government’s brutal ‘zero-tolerance’ policy around immigration – multiple data and analytics companies have quietly avoided answering questions about their role in feeding the US Immigration and Customs Enforcement (ICE) agency’s data backbone. These companies are bidding to work with an agency that has time and time again shown itself to be a brutal and problematic.
Privacy International has…
Content Type: Report
Sunday, May 24, 2020
It is common for families with no recourse to public funds who attempt to access support from local authorities to have their social media monitored as part of a 'Child in Need' assessment.
This practice appears to be part of a proactive strategy on the part of local authorities to discredit vulnerable families in order to refuse support. In our experience, information on social media accounts is often wildly misinterpreted by local authorities who make serious and unfounded allegations…
Content Type: Long Read
Sunday, May 24, 2020
It is common for families with no recourse to public funds who attempt to access support from local authorities to have their social media monitored as part of a ‘Child in Need’ assessment.
This practice appears to be part of a proactive strategy on the part of local authorities to discredit vulnerable families in order to refuse support. In our experience, information on social media accounts is often wildly misinterpreted by local authorities who make serious and unfounded allegations…
Content Type: Long Read
Friday, December 4, 2020
In 2019, we exposed the practices of five menstruation apps that were sharing your most intimate data with Facebook and other third parties. We were pleased to see that upon the publication of our research some of them decided to change their practices. But we always knew the road to effective openness, transparency, informed consent and data minimisation would be a long one when it comes to apps, which for the most part make profit from our menstrual cycle and even sometimes one’s desire to…
Content Type: Report
Thursday, May 5, 2005
This report investigates the probable effect of the proposed UK national Identity Card system on people who are marginalised, who suffer social disadvantage or exclusion, and those who are disabled. The work focuses on the biometrics element of the government’s proposals (specifically facial recognition, ngerprinting and iris scanning).
The Report provides a specific assessment of the recently published biometrics trial conducted by the UK Passport Service (UKPS), and compares these findings…
Content Type: Long Read
Thursday, May 7, 2020
This week saw the release of a coronavirus tracking app within the United Kingdom, initially to be trialled in the Isle of Wight. Privacy International has been following this closely, along with other ‘track and trace’ apps like those seen in over 30 other countries.
The UK’s app is no different. It is a small part of a public health response to this pandemic. As with all the other apps, it is vital that it be integrated with a comprehensive healthcare response, prioritise people, and…
Content Type: Long Read
Thursday, October 15, 2015
We hate to say we told you so.
Privacy International has for years warned that powerful surveillance technologies are used to facilitate serious human rights abuses with insufficient technological and legal safeguards against abuse.
We now have the most solid evidence to date that we were right. Our latest investigation uncovers disturbing evidence that substantiates our long held concerns.
Today Privacy International publishes an investigation (PDF) into communications surveillance in…
Content Type: Report
Wednesday, March 15, 2017
This investigation focuses on the techniques, tools and culture of Kenyan police and intelligence agencies’ communications surveillance practices. It focuses primarily on the use of surveillance for counterterrorism operations. It contrasts the fiction and reality of how communications content and data is intercepted and how communications data is fed into the cycle of arrests, torture and disappearances.
Communications surveillance is being carried out by Kenyan state actors, essentially…
Content Type: Report
Wednesday, February 24, 2016
Privacy International's new investigation (available in English and in Arabic), 'THE PRESIDENT'S MEN? Inside the Technical Research Department', sheds light on the Technical Research Department, a secret unit of the Egyptian intelligence infrastructure that has purchased surveillance equipment from German/Finnish manufacturer of monitoring centres for telecommunication surveillance, Nokia Siemens Networks, and Italian malware manufacturer, Hacking Team.
Content Type: Long Read
Thursday, October 10, 2019
Photo by Nadine Shaabana on Unsplash
Digital identity providers
Around the world, we are seeing the growth of digital IDs, and companies looking to offer ways for people to prove their identity online and off. The UK is no exception; indeed, the trade body for the UK tech industry is calling for the development of a “digital identity ecosystem”, with private companies providing a key role. Having a role for private companies in this sector is not necessarily a problem: after all, government…
Content Type: Long Read
Wednesday, December 14, 2016
In July 2015, representatives of a private company met in a parking lot in Pretoria, South Africa to sell phone tapping technology to an interested private buyer. What they did not know was that this buyer was a police officer. The police had been tipped off that the company was looking to offload the surveillance technology, an IMSI catcher, to anyone who would buy it. It is illegal to operate such surveillance technology as a private citizen in South Africa, and illegal to buy it without a…
Content Type: Long Read
Wednesday, April 3, 2019
Cellebrite, a surveillance firm marketing itself as the “global leader in digital intelligence”, is marketing its digital extraction devices at a new target: authorities interrogating people seeking asylum.
Israel-based Cellebrite, a subsidiary of Japan’s Sun Corporation, markets forensic tools which empower authorities to bypass passwords on digital devices, allowing them to download, analyse, and visualise data.
Its products are in wide use across the world: a 2019 marketing brochure (…
Content Type: State of Privacy
Thursday, March 14, 2019
Introduction
Acknowledgment
The State of Surveillance in Tunisia is the result of an ongoing collaboration by Privacy International and partners.
Key privacy facts
1. Constitutional privacy protection: The constitution contains an explicit protection of the right to privacy.
2. Data protection law: A draft law on the protection of personal data designed to replace the previous Law No. 63 was approved in March 2018 and came into force on May 25, 2018.
3. Data protection agency: Tunisia…
Content Type: State of Privacy
Saturday, January 26, 2019
Table of contents
Introduction
Right to Privacy
Communication Surveillance
Data Protection
Identification Schemes
Policies and Sectoral Initiatives
Introduction
Acknowledgement
The State of Privacy in Uganda is the result of an ongoing collaboration by Privacy International and Unwanted Witness.
Key privacy facts
1. Constitutional privacy protection: The constitution contains an explicit protection of the right to privacy (Art. 27).
2. Data protection law: There is no specific law or…
Content Type: State of Privacy
Tuesday, March 14, 2017
Introduction
Acknowledgment
The State of Surveillance in Thailand is the result of a collaboration by Privacy International and Thai Netizen Network.
Right to Privacy
The constitution
Thailand experienced a coup d'etat in May 2014. According to Mishari Muqbil and Arthit Suriyawongkul, “their [the junta's] modus operandi seems to be the direct command of ministries and semi-governmental organisations to carry out tasks irrespective of existing legislation.”
Following the coup, in July…
Content Type: State of Privacy
Saturday, January 26, 2019
Table of contents
Introduction
Right to Privacy
Communication Surveillance
Data Protection
Identification Schemes
Policies and Sectoral Initiatives
Introduction
Acknowledgment
The State of Privacy in South Africa is the result of an ongoing collaboration by Privacy International and the Right2Know coalition.
Key Privacy Facts
1. Constitutional privacy protections: Section 14 of the Constitution of the Republic of South Africa protects the right to privacy.
2. Data protection laws:…
Content Type: State of Privacy
Saturday, January 26, 2019
Table of contents
Introduction
Right to Privacy
Communication Surveillance
Data Protection
Identification Schemes
Policies and Sectoral Initiatives
Introduction
Acknowledgement
The State of Privacy in the Philippines is the result of an ongoing collaboration by Privacy International and Foundation for Media Alternatives.
Key privacy facts
1. Constitutional privacy protection: The constitution contains an explicit protection of the right to privacy (Art. III, section 3).
2. Data…
Content Type: State of Privacy
Saturday, January 26, 2019
Table of contents
Introduction
Right to Privacy
Data Protection
Identification Schemes
Policies and Sectoral Initiatives
Introduction
Acknowledgment
The State of Privacy in Pakistan is the result of an ongoing collaboration by Privacy International and the Digital Rights Foundation.
Between 2014-2016, Bytes for All contributed to previous versions of the 'Data Protection' sections of this briefing.
Key Privacy Facts
1. Constitutional privacy protections: Article 14(1) of the…
Content Type: State of Privacy
Saturday, January 26, 2019
Table of contents
Introduction
Right to Privacy
Communication Surveillance
Data Protection
Identification Schemes
Policies and Sectoral Initiatives
Introduction
Acknowledgment
The State of Surveillance in Morocco is the result of an ongoing collaboration by Privacy International and its partners.
Key privacy facts
1. Constitutional privacy protection: The constitution contains an explicit protection of the right to privacy.
2. Data protection law: There is a data protection law in…
Content Type: State of Privacy
Saturday, January 26, 2019
Table of contents
Introduction
Right to Privacy
Communication Surveillance
Data Protection
Identification Schemes
Policies and Sectoral Initiatives
Introduction
Acknowledgement
The State of Privacy in Mexico is the result of an ongoing collaboration by Privacy International and Red in Defensa de los Derechos Digitales (R3D) in Mexico.
Key Privacy Facts
1. Constitutional privacy protections: The right to privacy is enshrined in article 6 of the Mexican constitution.
2. Data protection…
Content Type: State of Privacy
Saturday, January 26, 2019
Table of contents
Introduction
Right to Privacy
Communication Surveillance
Data Protection
Identification Schemes
Policies and Sectoral Initiatives
Introduction
Acknowledgement
The State of Privacy in Kenya is the result of an ongoing collaboration by Privacy International and the National Coalition of Human Rights Defenders - Kenya.
Key Privacy Facts
1. Constitutional privacy protections: Article 31 of the Kenyan Constitution specifically protects the right to privacy.
2. Data…
Content Type: State of Privacy
Saturday, January 26, 2019
Table of contents
Introduction
Right to Privacy
Communication Surveillance
Data Protection
Identification Schemes
Policies and Sectoral Initiatives
Introduction
Acknowledgement
The State of Privacy in Jordan is the result of an ongoing collaboration by Privacy International and 7iber.
Key privacy facts
1. Constitutional privacy protections: Article 18 of the Jordanian constitution contains an explicit mention of privacy.
2. Data protection laws: There is currently no data protection…
Content Type: State of Privacy
Saturday, January 26, 2019
Table of contents
Introduction
Right to Privacy
Communication Surveillance
Data Protection
Identification Schemes
Policies and Sectoral Initiatives
Introduction
Acknowledgment
The State of Privacy in Indonesia is the result of an ongoing collaboration by Privacy International and The Institute for Policy Research and Advocacy (ELSAM).
Key privacy facts
Key privacy facts
1. Constitutional privacy protection: The constitution does not explicitly mention privacy.
2. Data protection law…
Content Type: State of Privacy
Saturday, January 26, 2019
Table of contents
Introduction
Right to Privacy
Communication Surveillance
Data Protection
Identification Schemes
Policies and Sectoral Initiatives
Introduction
Acknowledgement
The State of Privacy in India is the result of an ongoing collaboration by Privacy International and the Centre for Internet & Society.
Key Privacy Facts
1. Constitutional privacy protections: In 2017, the Indian Supreme Court ruled that the Indian constitution guarantees a right to privacy.
2. Data…
Content Type: State of Privacy
Saturday, January 26, 2019
Table of contents
Introduction
Right to Privacy
Communication Surveillance
Data Protection
Identification Schemes
Policies and Sectoral Initiatives
Introduction
Acknowledgment
The State of Surveillance in Egypt is the result of an ongoing collaboration by Privacy International and its partners.
Key privacy facts
1. Constitutional privacy protection: The constitution contains an explicit protection of the right to privacy.
2. Data protection law: In August 2018, the Cabinet approved a…
Content Type: State of Privacy
Saturday, January 26, 2019
Introduction
Acknowledgement
The State of Surveillance in Chile is the result of an ongoing collaboration between Privacy International and its Chilean partners Derechos Digitales and Fundación Datos Protegidos.
Key Privacy Facts
1. Constitutional privacy protections: Article 19 of Chile's constitution protects the right to a private life. It was reformed in 2018 to add a specific right to the protection of personal data.
2. Data protection laws: In 1999 Chile became the first South…
Content Type: Long Read
Sunday, May 24, 2020
Dear Sir/Madam,
Freedom of information act request
RE: Social media monitoring / social media intelligence
FOIA REQUEST
For definition of social media intelligence please see background explanation below. We further note the comments of the Office of Surveillance Commissioners Annual Report 2016 cited below.
1. In 2016 the Rt Hon Lord Judge, then Chief Surveillance Commissioner, wrote to all Local Authorities regarding use of social media in investigations. Please confirm whether you are…
Content Type: Long Read
Thursday, October 3, 2019
An analysis of what Facebook, Google, and Twitter have done to provide users with political ad transparency as of September 2019. Our full analysis is linked below.
Recently the role of social media and search platforms in political campaigning and elections has come under scrutiny. Concerns range from the spread of disinformation, to profiling of users without their knowledge, to micro-targeting of users with tailored messages, to interference by foreign entities, and more. Significant…
Content Type: Report
Tuesday, October 31, 2017
The smart city market is booming. National and local governments all over the world expect their cities to become more efficient, more sustainable, cleaner and safer by integrating technology, increasing data generation and centralising data to provide better services. From large multinationals to small start-ups, companies want their slice of the multi-billion dollars per year pie of municipal budgets and long-term government contracts.
But do smart cities even exist? And are our cities…