Advanced Search
Content Type: News & Analysis
Privacy International and Metamorphosis have today written to authorities in Macedonia to provide information and call for assurances regarding government surveillance in Macedonia.
For over two years, Macedonia has endured a prolonged and severe political crisis - including wide scale protests and acts of violence against parliamentarians - following reports that the governing party had been unlawfully intercepting the phone calls of some 20,000 people, including, activists, journalists…
Content Type: News & Analysis
Privacy International (PI) has today written to the Danish Ministry of Foreign Affairs following further concerning reports about the export of internet surveillance equipment from the country.
We are calling for the government to carry out a full re-assessment of the human rights risks associated with the export of such internet surveillance equipment, and to revoke all licenses where there is a risk to human rights or if the law governing surveillance in the destination country is…
Content Type: News & Analysis
Photo Credit: MoD UK
‘Security’ in the policy world has practically no currency without a specific prefix. For example, we could discuss 'national' security as distinct from 'consumer' security or 'energy' security. ‘Cyber’ security is the new prefix on the policy block, and it is gradually forcing a rethink on what it means to be secure in a modern society. In the course of Privacy International’s work globally, we have observed that many governments frame cyber security as national security…
Content Type: News & Analysis
Image source: AFP
Earlier this month, the Kenyan daily The Star reported that UK-based data analytics firm Cambridge Analytica had been quietly contracted by President Uhuru Kenyatta’s party in a bid to win himself a second term in office. State House officials were quick to deny the claims, while the company itself issued no comment.
Cambridge Analytica has exploded onto the scene following revelations that its psychometric profiling techniques were used and reportedly played a role in…
Content Type: News & Analysis
This week the United States Congress voted to strip away one of the country’s few safeguards of the right to privacy by repealing rules which would have limited internet service provider’s ability to use or share customers’ data without customers’ approval.
Meanwhile, last week, 6,500 kilometers away in Geneva, the United Nations Human Rights Council called on states to strengthen customers’ control over their data and develop legislation to address harm from the sale or corporate sharing of…
Content Type: Report
This investigation focuses on the techniques, tools and culture of Kenyan police and intelligence agencies’ communications surveillance practices. It focuses primarily on the use of surveillance for counterterrorism operations. It contrasts the fiction and reality of how communications content and data is intercepted and how communications data is fed into the cycle of arrests, torture and disappearances.
Communications surveillance is being carried out by Kenyan state actors, essentially…
Content Type: State of Privacy
Introduction
Acknowledgment
The State of Surveillance in Thailand is the result of a collaboration by Privacy International and Thai Netizen Network.
Right to Privacy
The constitution
Thailand experienced a coup d'etat in May 2014. According to Mishari Muqbil and Arthit Suriyawongkul, “their [the junta's] modus operandi seems to be the direct command of ministries and semi-governmental organisations to carry out tasks irrespective of existing legislation.”
Following…
Content Type: News & Analysis
This guest piece was written by Elonnai Hickok, Amber Sinha and Vanya Rakesh of the Centre for Internet and Society. It does not necessarily reflect the views or position of Privacy International.
In 2009, the Government of India set up the Unique Identification Authority of India (UIDAI) as an attached office of the erstwhile Planning Commission of India via an executive order. The mandate of the UIDAI was to assign a 12-digit unique identification (UID) number (…
Content Type: News & Analysis
An investigation released by Privacy International this week reveals the Facebook shut-down Thailand experienced in May 2014, at the height of the military coup, may have had more to do with attempting to surveil online communications, rather than censoring Facebook users. This revelation indicates there could be more to other previous internet shutdowns that have happened during times of political unrest.
In May 2014, following months of protest, the Thai military overthrew the…
Content Type: Report
This investigation looks at how surveillance is being conducted in Thailand. The first part of the investigation focuses on the ties between telecommunication companies and the state, and the second part of the investigation focuses on attacks conducted in order to attempt to circumvent encryption.
Content Type: Long Read
In July 2015, representatives of a private company met in a parking lot in Pretoria, South Africa to sell phone tapping technology to an interested private buyer. What they did not know was that this buyer was a police officer. The police had been tipped off that the company was looking to offload the surveillance technology, an IMSI catcher, to anyone who would buy it. It is illegal to operate such surveillance technology as a private citizen in South Africa, and illegal to buy…
Content Type: Report
Privacy International’s investigation contains evidence of the Syrian government’s ambitious plans and projects to monitor the national communications infrastructure, the technical details of which are revealed for the first time. Hundreds of original documents also highlight surveillance trade in this region leading up to and during the Arab Spring, which involved companies from around the world.
Content Type: Press release
Caroline Wilson Palow, General Counsel at Privacy International
“The passage of the Investigatory Powers Act is a major blow to the privacy of people in the UK and all over the world. It sets a world-leading precedent, but not one of which the Government should be proud. Instead of reining in the unregulated mass surveillance practices that have for years been conducted in secret and with questionable legal authority, the IPA now enshrines them in law. Widespread surveillance is an antithesis…
Content Type: Press release
Privacy International has today written to government ministers, members of the opposition, and oversight bodies reaffirming its call for the UK government to reveal secret intelligence sharing arrangements with the United States.
The original UKUSA agreement — drafted shortly after World War II — allows UK and US agencies to share, by default, any raw intelligence, collection equipment, decryption techniques, and translated documents.
Current arrangements also allow US…
Content Type: Advocacy
This week, from 17th-20th October 2016, the Kingdom of Morocco will be hosting the 38th International Conference of Data Protection and Privacy Commissioners (ICDPPC).
And two scenarios could play out…
Scenario one — like many other occasions, this will be used as wonderfully strategic PR stunt, whereby participants will be whisked directly from the airport to their hotel to the conference venue, and will be enchanted by the genuinely warm Moroccan hospitality. But they will leave…
Content Type: Press release
Key points
Bulk Communications Data (BCD) collection, commenced in March 1998, unlawful until November 2015
Bulk Personal Datasets regime (BPD), commenced c.2006, unlawful until March 2015
Everyone’s communications data collected unlawfully, in secret and without adequate safeguards until November 2015
We maintain that even post 2015, bulk surveillance powers are not lawful
As the Investigatory Powers Bill is set to become law within weeks, we argue that the authorisation and…
Content Type: Long Read
On 17 October 2016, the Investigatory Powers Tribunal handed down judgment in a case brought by Privacy International against the Foreign Secretary, the Home Secretary and the three Security and Intelligence Agencies (MI5, MI6 and GCHQ).
The case concerned the Agencies’ acquisition and use of bulk personal datasets (‘BPD’) – datasets that contain personal data about individuals, the majority of whom are unlikely to be of intelligence interest, such as passport databases and finance-related…
Content Type: Press release
PI Research Officer Edin Omanovic said:
“The European Commission has proposed sweeping updates [PDF] to trade regulations in an effort to modernise the EU’s export control system and to ensure that the trade in surveillance technology does not facilitate human rights abuses or internal repression.
Privacy International welcomes the intentions of the proposed changes in terms of protecting human rights as it does all such moves. More than half of the world’s surveillance…
Content Type: Press release
Key points
Privacy International, Liberty, Amnesty International, and seven other human rights organizations challenge UK mass surveillance and UK access to US mass surveillance at the European Court of Human Rights
This is the first case before the European Court of Human Rights to directly challenge UK and US mass surveillance revealed by the Snowden disclosures
National courts and oversight bodies have failed to rein in mass surveillance practices that impact hundreds of millions of…
Content Type: Long Read
This report examines the emergence of social media based surveillance in Thailand, carried out potentially by people’s own networks of friends and family. It looks at the severe impact this has on personal privacy and points to potential solutions.
In May 2014, Thailand experienced a military coup – its second in eight years. A military government led by General Prayut Chan-o-cha seized power and overthrew the administration of Prime Minister Yingluck Shinawatra. The Army declared martial…
Content Type: Advocacy
After the adoption of the EU General Data Protection Regulation, the Data Protection Directive for Law Enforcement Agencies, the EU-US Privacy Shield, your understandable EU privacy policy fatigue is excused.
But when a coalition of tech and telecom industries calls for a relatively obscure EU directive to be repealed, it may unintentionally trigger an atypical Streisand effect: if companies, which often so cavalier to individuals’ privacy, want to get rid of the EU e-privacy…
Content Type: Advocacy
Privacy International has today written to Danish ministers and authorities seeking urgent assurances following a report published two days ago in Information showing that the government has approved the export of an internet surveillance system to China.
The report, which relies in part on documents obtained from the Danish Business Authority – the department which oversees exports of surveillance technology – shows that the government has authorised a company based in…
Content Type: Press release
Previously secret official documents, containing new revelations about the Government's mass surveillance regime, have today been disclosed as a result of litigation brought by Privacy International against the Intelligence Agencies (MI5, MI6, GCHQ). These documents shed further light on the secretive bulk data collection regime operating under section 94 of the Telecommunications Act 1984 and the Bulk Personal Data-set regime.
Documents available:…
Content Type: Press release
Tomorrow, on 26 July, the main hearing will begin in Privacy International's legal challenge against MI6, MI5, and GCHQ's collection of bulk communications data and bulk personal datasets. Previously secret documents will be made public at the hearing, and Privacy International will brief attending journalists about the significance of the disclosed documents.
The hearing will include references to important documents detailing the collection of data on every citizen in the…
Content Type: News & Analysis
When it comes to tackling corruption, we need to critically engage with the role of technology. One technology in particular is biometrics, a technology that identifies and stores on a database the identity of an individual through some physical characteristic, usually fingerprints or an iris scan. Biometrics is increasingly being used in ID and voter registration schemes. It is a technology that raises privacy and data protection issues but notwithstanding…
Content Type: News & Analysis
Another committee-led scrutiny. Another list of changes that need to be made to the Investigatory Powers Bill. This seems familiar.
The Joint Committee on Human Rights has weighed in with scrutiny of the Investigatory Powers Bill prior to the Bill’s debate and vote in the House of Commons on the 6 and 7 June. The recommendations the report contains once again raise questions about the fitness of the Bill to be passed in its current form.
The Committee identified thematic warrants - which…
Content Type: Press release
Privacy International, the leading global privacy rights NGO, has today filed a Judicial Review at the UK High Court, challenging the Investigatory Powers Tribunal's (IPT) decision that the Government can issue general hacking warrants. This decision means that British intelligence agency GCHQ can continue to hack into the computers and phones of broad classes of people - including those residing in the UK. The Investigatory Powers Bill, currently being debated in Parliament, seeks to…
Content Type: News & Analysis
Should the European Union agree to legitimise trade with a country that refuses to adhere to European legal standards? This is the fundamental question that will be addressed at tomorrow’s meeting among European privacy regulators when they publish their opinion on the data-sharing agreement known as the ‘Privacy Shield’, the replacement to the failed ‘Safe Harbour’ agreement.
Background
Many of the world’s largest companies, such as Google and Facebook, store their customers’ data in…
Content Type: News & Analysis
PI's full analysis can be read here
On 29 February 2016, the European Commission and the US government released the details of the proposed EU-U.S. “Privacy Shield”. The “Privacy Shield” replaces the now defunct so-called “Safe Harbor”.
The Privacy Shield is in fact a significant number of documents from various parts of the U.S. administration, which merely outline the existing, weak U.S. safeguards applicable to personal data of EU citizens. These documents are…
Content Type: Advocacy
Introduction
On 29 February 2016, the European Commission and the US government released the details of the proposed EU-U.S. “Privacy Shield”. The “Privacy Shield” replaces the now defunct so-called “Safe Harbor”.
The Privacy Shield is in fact a significant number of documents from various parts of the U.S. administration, which merely outline the existing, weak U.S. safeguards applicable to personal data of EU citizens. These documents are meant to serve as the basis for an “adequacy”…