Advanced Search
Content Type: News & Analysis
This post was written by PI Policy Officer Lucy Purdon.
In 1956, US Presidential hopeful Adlai Stevenson remarked that the hardest part of any political campaign is how to win without proving you are unworthy of winning. Political campaigning has always been a messy affair and now the online space is where elections are truly won and lost. Highly targeted campaign messages and adverts flood online searches and social media feeds. Click, share, repeat; this is what political engagement looks…
Content Type: Long Read
The battle for Kenyan voters’ allegiance in the 2017 Presidential election was fought on social media and the blogosphere. Paid advertisements for two mysterious, anonymous sites in particular started to dominate Google searches for dozens of election-related terms in the months leading up to the vote. All linked back to either “The Real Raila”, a virulent attack campaign against presidential hopeful Raila Odinga, or Uhuru for Us, a site showcasing President Uhuru Kenyatta’s accomplishments. As…
Content Type: Report
When you rent a car at the airport, use a car-share for a family day trip, one of the first things you are likely to do before setting off on your journey, is to connect your phone to the car. You switch on the Bluetooth and see a list of other people’s phones that were previously connected - Mike’s iPhone, Samsung Galaxy, Bikerboy_Troi, Dee Dee. You input your journey into the navigation, perhaps noticing stored locations of previous drivers.
Seems fairly innocuous? Wrong. Your name and…
Content Type: News & Analysis
20 June 2016
Privacy International joins DRF and A19 in reiterating our serious concerns about the proposed Prevention of Electronic Crimes Bill which is currently being discussed in the Senate in Pakistan. While we note that the Bill adopted by the National Assembly in April 2016 includes some improvements compared to the earlier version, the Bill as currently drafted introduces a series of new provisions that pose a grave risk to freedom of expression and privacy in Pakistan…
Content Type: News & Analysis
7 July 2016
It has been said is that we pay for free services with our personal data. Now, the Privacy Shield exponentially expands this truth and we are paying for the cost of U.S. political dysfunction combined with EU complacency with our privacy. More than four months after the first EU-US Privacy Shield was published on 29 February 2016, a new version has been leaked. Remarkably, it is expected to be adopted.
Four months, two opinions by group of EU data protection…
Content Type: News & Analysis
7 July 2017
War profiteers are finding the data business easy going. The have wielded their unwarranted influence and applied their business model of causing and then profiting from insecurity and applied it to the digital age; the results have been more profit for them and less liberty for you.
When a politician riles against an evil tech giant for providing ‘safe spaces’ online, it’s a political distraction. The real battle for your data is being fought between the emergent tech…
Content Type: News & Analysis
Early on Wednesday morning the Prevention of Electronic Crimes Bill was approved by Pakistan’s National Assembly. The Bill, which is almost universally acknowledged as “controversial” had been criticised by opposition members, industry and civil society at numerous stages. Civil society organisations from around the world released two joint statements in April and December last year expressing their concerns. Despite the chorus of criticism, very little has changed in the Bill during its…
Content Type: Press release
Key points
Privacy International has obtained previously unseen government documents that reveal British spy agency GCHQ collects social media information on potentially millions of people.
GCHQ collected and accesses this information by gaining access to private companies’ databases.
Letters obtained by Privacy International reveal that the body tasked with overseeing intelligence agencies’ activities (the Investigatory Powers Commissioner) was kept in the dark as UK intelligence…
Content Type: Report
Financial services are changing, with technology being a key driver. It is affecting the nature of financial services, from credit and lending through to insurance, and even the future of money itself.
The field of fintech is where the attention and investment is flowing. Within it, new sources of data are being used by existing institutions and new entrants. They are using new forms of data analysis.
These changes are significant to this sector and the lives of people it serves. This…
Content Type: Press release
In today’s latest hearing in our ongoing legal challenge against the collection of massive troves of our personal data by the UK intelligence agencies, shocking new evidence has emerged about GCHQ’s attempts to yet again avoid proper independent scrutiny for its deeply intrusive surveillance activities.
In a truly breath-taking exchange of letters between the Investigatory Powers Commissioner’s Office (“IPCO”) and the Director of Legal Affairs at GCHQ, it has emerged that GCHQ have…
Content Type: Press release
The European Court of Human Rights will hear a landmark case on surveillance tomorrow (7 November) as part of a challenge to the lawfulness of the UK’s surveillance laws and its intelligence agencies’ mass surveillance practices.
See the attached briefing for case background and historical information.
The case, described by campaigners as a “watershed moment for people’s privacy and freedom of expression across the world”, is being brought by Amnesty International, Liberty, Privacy…
Content Type: Report
The smart city market is booming. National and local governments all over the world expect their cities to become more efficient, more sustainable, cleaner and safer by integrating technology, increasing data generation and centralising data to provide better services. From large multinationals to small start-ups, companies want their slice of the multi-billion dollars per year pie of municipal budgets and long-term government contracts.
But do smart cities even exist? And are our cities…
Content Type: News & Analysis
October 31st 2017 will mark the 3rd World Cities Day (we will forgive if you did not know that), with the general theme “Better City, Better Life.” On this date, PI will be launching its latest report “Smart Cities: Utopian Vision, Dystopian Reality”. This is an opportunity for us to ask: who exactly are our cities going to become better for?
Technology is often given as an answer when we are not sure what the question is. Cities are no exception to that. The current…
Content Type: Press release
On 5 October 2017, Privacy International will appear before the UK Court of Appeal to continue its challenge to the British government's large scale hacking powers. The case questions the decision by the Investigatory Powers Tribunal (IPT) to sanction the UK government's power to hack broad categories of people or property without any individualised suspicion.
TIMELINE AND KEY POINTS
- Privacy International began fighting bulk government hacking in 2014 at the…
Content Type: News & Analysis
Privacy International and Metamorphosis have today written to authorities in Macedonia to provide information and call for assurances regarding government surveillance in Macedonia.
For over two years, Macedonia has endured a prolonged and severe political crisis - including wide scale protests and acts of violence against parliamentarians - following reports that the governing party had been unlawfully intercepting the phone calls of some 20,000 people, including, activists, journalists…
Content Type: News & Analysis
Privacy International (PI) has today written to the Danish Ministry of Foreign Affairs following further concerning reports about the export of internet surveillance equipment from the country.
We are calling for the government to carry out a full re-assessment of the human rights risks associated with the export of such internet surveillance equipment, and to revoke all licenses where there is a risk to human rights or if the law governing surveillance in the destination country is…
Content Type: News & Analysis
Photo Credit: MoD UK
‘Security’ in the policy world has practically no currency without a specific prefix. For example, we could discuss 'national' security as distinct from 'consumer' security or 'energy' security. ‘Cyber’ security is the new prefix on the policy block, and it is gradually forcing a rethink on what it means to be secure in a modern society. In the course of Privacy International’s work globally, we have observed that many governments frame cyber security as national security…
Content Type: News & Analysis
Image source: AFP
Earlier this month, the Kenyan daily The Star reported that UK-based data analytics firm Cambridge Analytica had been quietly contracted by President Uhuru Kenyatta’s party in a bid to win himself a second term in office. State House officials were quick to deny the claims, while the company itself issued no comment.
Cambridge Analytica has exploded onto the scene following revelations that its psychometric profiling techniques were used and reportedly played a role in…
Content Type: News & Analysis
This week the United States Congress voted to strip away one of the country’s few safeguards of the right to privacy by repealing rules which would have limited internet service provider’s ability to use or share customers’ data without customers’ approval.
Meanwhile, last week, 6,500 kilometers away in Geneva, the United Nations Human Rights Council called on states to strengthen customers’ control over their data and develop legislation to address harm from the sale or corporate sharing of…
Content Type: Report
This investigation focuses on the techniques, tools and culture of Kenyan police and intelligence agencies’ communications surveillance practices. It focuses primarily on the use of surveillance for counterterrorism operations. It contrasts the fiction and reality of how communications content and data is intercepted and how communications data is fed into the cycle of arrests, torture and disappearances.
Communications surveillance is being carried out by Kenyan state actors, essentially…
Content Type: State of Privacy
Introduction
Acknowledgment
The State of Surveillance in Thailand is the result of a collaboration by Privacy International and Thai Netizen Network.
Right to Privacy
The constitution
Thailand experienced a coup d'etat in May 2014. According to Mishari Muqbil and Arthit Suriyawongkul, “their [the junta's] modus operandi seems to be the direct command of ministries and semi-governmental organisations to carry out tasks irrespective of existing legislation.”
Following…
Content Type: News & Analysis
This guest piece was written by Elonnai Hickok, Amber Sinha and Vanya Rakesh of the Centre for Internet and Society. It does not necessarily reflect the views or position of Privacy International.
In 2009, the Government of India set up the Unique Identification Authority of India (UIDAI) as an attached office of the erstwhile Planning Commission of India via an executive order. The mandate of the UIDAI was to assign a 12-digit unique identification (UID) number (…
Content Type: News & Analysis
An investigation released by Privacy International this week reveals the Facebook shut-down Thailand experienced in May 2014, at the height of the military coup, may have had more to do with attempting to surveil online communications, rather than censoring Facebook users. This revelation indicates there could be more to other previous internet shutdowns that have happened during times of political unrest.
In May 2014, following months of protest, the Thai military overthrew the…
Content Type: Report
This investigation looks at how surveillance is being conducted in Thailand. The first part of the investigation focuses on the ties between telecommunication companies and the state, and the second part of the investigation focuses on attacks conducted in order to attempt to circumvent encryption.
Content Type: Long Read
In July 2015, representatives of a private company met in a parking lot in Pretoria, South Africa to sell phone tapping technology to an interested private buyer. What they did not know was that this buyer was a police officer. The police had been tipped off that the company was looking to offload the surveillance technology, an IMSI catcher, to anyone who would buy it. It is illegal to operate such surveillance technology as a private citizen in South Africa, and illegal to buy…
Content Type: Report
Privacy International’s investigation contains evidence of the Syrian government’s ambitious plans and projects to monitor the national communications infrastructure, the technical details of which are revealed for the first time. Hundreds of original documents also highlight surveillance trade in this region leading up to and during the Arab Spring, which involved companies from around the world.
Content Type: Press release
Caroline Wilson Palow, General Counsel at Privacy International
“The passage of the Investigatory Powers Act is a major blow to the privacy of people in the UK and all over the world. It sets a world-leading precedent, but not one of which the Government should be proud. Instead of reining in the unregulated mass surveillance practices that have for years been conducted in secret and with questionable legal authority, the IPA now enshrines them in law. Widespread surveillance is an antithesis…
Content Type: Press release
Privacy International has today written to government ministers, members of the opposition, and oversight bodies reaffirming its call for the UK government to reveal secret intelligence sharing arrangements with the United States.
The original UKUSA agreement — drafted shortly after World War II — allows UK and US agencies to share, by default, any raw intelligence, collection equipment, decryption techniques, and translated documents.
Current arrangements also allow US…
Content Type: Advocacy
This week, from 17th-20th October 2016, the Kingdom of Morocco will be hosting the 38th International Conference of Data Protection and Privacy Commissioners (ICDPPC).
And two scenarios could play out…
Scenario one — like many other occasions, this will be used as wonderfully strategic PR stunt, whereby participants will be whisked directly from the airport to their hotel to the conference venue, and will be enchanted by the genuinely warm Moroccan hospitality. But they will leave…
Content Type: Press release
Key points
Bulk Communications Data (BCD) collection, commenced in March 1998, unlawful until November 2015
Bulk Personal Datasets regime (BPD), commenced c.2006, unlawful until March 2015
Everyone’s communications data collected unlawfully, in secret and without adequate safeguards until November 2015
We maintain that even post 2015, bulk surveillance powers are not lawful
As the Investigatory Powers Bill is set to become law within weeks, we argue that the authorisation and…