Skip to main content
Home

Sign up to Newsletter

  • SEARCH
  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE
PI logo graphic

Direct Access by Government

Learn

Explainer

Telco data and Covid-19: A primer

Explainer

Bluetooth tracking and COVID-19: A tech primer

Report and Analysis

Report
illustration of 2 people alone in a field

Securing Privacy: PI on End-to-End Encryption

PI’s report on end-to-end encryption (E2EE) analyses and defends expanding the use of E2EE to protect our communications.

Continue reading
Long Read
Berlin TV tower behind a net

At the border, asylum seekers are "guilty until proven innocent"

As migration continues to be high on the social and political agenda, Western countries are increasingly adopting an approach that criminalises people at the border. Asylum seekers are often targeted with intrusive surveillance technologies and afforded only limited rights (including in relation to data protection), often having the effect of being treated as “guilty until proven innocent”.

A recent report explains how the central German migration authority uses mobile phone extraction technology in the asylum application procedure, and why it is highly problematic.

Continue reading
Long Read
Telegram from Russia: compliance, & complicity in the Russian government’s attack on privacy

Telegram from Russia: compliance and complicity in the Russian government’s attack on privacy

If you operate an internet company in Russia, you aren’t necessarily surprised to one day open the door to someone, grasping in one hand a bundle of wires and in the other a letter from a government agency demanding access to your servers, with a black box wedged under one arm. Internet companies in
Continue reading
Report
Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism In Kenya

Track, Capture, Kill: Inside Communications Surveillance and Counterterrorism In Kenya

This investigation focuses on the techniques, tools and culture of Kenyan police and intelligence agencies’ communications surveillance practices. It focuses primarily on the use of surveillance for counterterrorism operations. It contrasts the fiction and reality of how communications content and
Continue reading
Long Read
Discussion About Cyber Security In Colombia

Discussion About Cyber Security In Colombia

Written by: Maria del Pilar Saenz With a raft of recent scandals involving proven and possible abuses of surveillance systems by state institutions, there is a clear need to generate policy and practice in Colombia that promotes respect for human rights. It is necessary to keep this in mind as an
Continue reading
View more

News

3rd September 2020

PI’s statement on the ECtHR decision in Privacy International v. UK

16th March 2016

Ghanaian Parliament Needs to Rethink Controversial New Spy Bill

3rd December 2014

Going Dark? The Rule Of Law, The iPhone, And Closet Doors

4th November 2013

Privacy International files OECD complaints against telcos for role in UK mass surveillance program

27th August 2013

Facebook transparency report: Welcomed, but a growing concern over value

8th June 2013

Privacy International files legal challenge against UK government over mass surveillance programmes

14th June 2012

Draft Communications Bill reveals Home Office's mass surveillance plans going ahead - but government remains tongue-tied about how technology will actually work

2nd April 2012

Leaked Liberal Democrat internal briefing on new government surveillance plans reveals MPs being misled on key issues

Examples of Abuse

Want to know how this translate in the real world? Here is the latest example in the news.

Did Mexico Drop $5 Million On This 'Unlimited' Uber-Stealth Spy Tech?

Mexico is one of the biggest buyers of next-generation surveillance technology. And now data leaked to Forbes indicates it's taken an unprecedented step in becoming the first-known buyer of surveillance technology that silently spies on calls, text messages and locations of any mobile phone user
Read more
See more examples of abuse
View more

Get Involved

  • Act with Us
  • Donate
  • Join
Back to top button

Newsletter

Click here to sign-up to our mailing-list!

Mastodon

Follow Us

  • Facebook
  • Instagram
  • Mastodon
  • RSS
  • Twitter
  • Youtube

Navigation

  • SEARCH
  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE

How We Fight

  • Our Global Reach
  • Advocacy and Litigation
  • Research
  • Legal Action
  • Our Demands

About

  • Our Impact
  • Governance
  • People
  • Opportunities
  • Financial
  • Service Status

Privacy

  • How We Use Your Data
  • How We Learned
  • Why Cookies?!

Resources

  • Why Privacy Matters
  • Learn about issues
  • Learn about Data Protection
  • Browse Examples of Abuse
  • Listen to our podcast

Contact Us

62 Britton Street,
London, EC1M 5UY
UK

Charity Registration No: 1147471

Click here to contact us.

Click here for media and press enquiries.