Skip to main content
Home

Sign up to Newsletter

  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE
PI logo graphic

Direct Access by Government

Learn

Explainer

Telco data and Covid-19: A primer

Explainer

Bluetooth tracking and COVID-19: A tech primer

Report and Analysis

Report
illustration of 2 people alone in a field

Securing Privacy: PI on End-to-End Encryption

PI’s report on end-to-end encryption (E2EE) analyses and defends expanding the use of E2EE to protect our communications. It defines E2EE, delves into its human rights implications, briefly addresses some prominent proposals for government access to E2EE content, and concludes with PI’s recommendations regarding E2EE.

Continue reading
Long Read
Berlin TV tower behind a net

At the border, asylum seekers are "guilty until proven innocent"

As migration continues to be high on the social and political agenda, Western countries are increasingly adopting an approach that criminalises people at the border. Asylum seekers are often targeted with intrusive surveillance technologies and afforded only limited rights (including in relation to data protection), often having the effect of being treated as “guilty until proven innocent”.

A recent report explains how the central German migration authority uses mobile phone extraction technology in the asylum application procedure, and why it is highly problematic.

Continue reading
Long Read
Telegram from Russia: compliance, & complicity in the Russian government’s attack on privacy

Telegram from Russia: compliance and complicity in the Russian government’s attack on privacy

If you operate an internet company in Russia, you aren’t necessarily surprised to one day open the door to someone, grasping in one hand a bundle of wires and in the other a letter from a government agency demanding access to your servers, with a black box wedged under one arm. Internet companies in
Continue reading

News

3rd September 2020

PI’s statement on the ECtHR decision in Privacy International v. UK

16th March 2016

Ghanaian Parliament Needs to Rethink Controversial New Spy Bill

3rd December 2014

Going Dark? The Rule Of Law, The iPhone, And Closet Doors

4th November 2013

Privacy International files OECD complaints against telcos for role in UK mass surveillance program

27th August 2013

Facebook transparency report: Welcomed, but a growing concern over value

8th June 2013

Privacy International files legal challenge against UK government over mass surveillance programmes

Examples of Abuse

Want to know how this translate in the real world? Here is the latest example in the news.

Did Mexico Drop $5 Million On This 'Unlimited' Uber-Stealth Spy Tech?

Mexico is one of the biggest buyers of next-generation surveillance technology. And now data leaked to Forbes indicates it's taken an unprecedented step in becoming the first-known buyer of surveillance technology that silently spies on calls, text messages and locations of any mobile phone user
Read more
See more examples of abuse

Get Involved

  • Act with Us
  • Donate
  • Join
Back to top button

Newsletter

Click here to sign-up to our mailing-list!

Mastodon

Follow Us

  • Facebook
  • Instagram
  • Mastodon
  • RSS
  • Twitter
  • Youtube

Navigation

  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE

How We Fight

  • Our Global Reach
  • Advocacy and Litigation
  • Research
  • Legal Action
  • Our Demands

About

  • Our Impact
  • Governance
  • People
  • Opportunities
  • Financial
  • Service Status

Privacy

  • How We Use Your Data
  • How We Learned
  • Why Cookies?!

Resources

  • Why Privacy Matters
  • Learn about issues
  • Learn about Data Protection
  • Browse Examples of Abuse
  • Listen to our podcast

Contact Us

62 Britton Street,
London, EC1M 5UY
UK

Charity Registration No: 1147471

Click here to contact us.

Click here for media and press enquiries.