Search
Content type: News & Analysis
Between 15th-19th of September, in the week leading up the first year aniversary of the 13 Necessary and Proportionate Principles, Privacy International and the coalition behind the 13 Principles will be conducting a Week of Action explaining some of the key guiding principles for surveillance law reform. Every day, we'll take on a different part of the principles, exploring what’s at stake and what we need to do to bring intelligence agencies and the police back under the rule of law. You can…
Content type: News & Analysis
Today’s report on the right to privacy in the digital age by the UN High Commissioner on Human Rights, commissioned by the General Assembly in December 2013, marks an historic turning point in the international discourse around privacy and surveillance.
Privacy International believes the report will dramatically change the international conversation on the implications of surveillance and intelligence for human rights. Most importantly, it puts beyond doubt that the very existence of…
Content type: News & Analysis
The following is an excerpt from an Op-Ed written in the New Zealand Herald by Privacy International's Legal Officer Anna Crowe:
Since the release of documents by Edward Snowden nearly a year ago, New Zealand has often been seen as a passive participant in the Five Eyes intelligence-sharing alliance, not unlike a good kid hanging out with the wrong crowd.
However, Snowden documents released last month and the news that New Zealand appears to be sharing intelligence…
Content type: News & Analysis
The reforms announced today, while positive in some respects, are completely inadequate to address the heart of the problem. Privacy International welcomes steps to minimise the data collected and retained on non-Americans, and the call to increase transparency around requests made to communications service providers. However, in the face of mass surveillance, unaccountable intelligence sharing, arbitrary expansions of the definition of ’national security’, and debased encryption standards…