Search
Content type: Video
**Language advisory: Gus does several swearwords this episode including one f-word at 9:45
From surveillance drones to cameras to wiretapping and more - the EU are providing technologies that will be used to crush political and civil freedoms and undermine democracy without urgent reforms
Find out more:
https://privacyinternational.org/long-read/4288/borders-without-borders-how-eu-exporting-surveillance-bid-outsource-its-border
https://privacyinternational.org/…
Content type: Long Read
Tucked away in a discrete side street in Hungary’s capital, the European Union Agency for Law Enforcement Training (CEPOL) has since 2006 operated as an official EU agency responsible for developing, implementing, and coordinating training for law enforcement officials from across EU and non-EU countries.
Providing training to some 29,000 officials in 2018 alone, it has seen its budget rocket from €5 million in 2006 to over €9.3 million in 2019, and offers courses in everything from…
Content type: Video
Find out more on our website: https://privacyinternational.org/long-read/4206/qa-eus-top-court-rules-uk-french-and-belgian-mass-surveillance-regimes-must-respect
And make sure we can keep taking these fights to court: support.privacyinternational.org
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Content type: Press release
Today, the European Court of Human Rights (ECtHR) has handed down a decision in a case brought by Privacy International and a coalition of internet and communications service providers and campaign groups including the Chaos Computer Club (Germany), GreenNet (UK), Jinbonet (Korea), May First/People Link (US), and Riseup (US) (the “coalition”).The case challenges the conduct of hacking operations abroad by one of the UK’s intelligence agencies, the Government Communications…
Content type: Examples
Mexico is one of the biggest buyers of next-generation surveillance technology. And now data leaked to Forbes indicates it's taken an unprecedented step in becoming the first-known buyer of surveillance technology that silently spies on calls, text messages and locations of any mobile phone user, via a long-vulnerable portion of global telecoms networks known as Signalling System No. 7 (SS7).
The revelation was contained in what an anonymous source close claimed was…
Content type: Examples
An engineering and computer science professor and his team from The Ohio State University discovered a design flaw in low-powered Bluetooth devices that leaves them susceptible to hacking.
Zhiqiang Lin, associate professor of computer science and engineering at the university, found the commonly used Bluetooth Low Energy devices, such as fitness trackers and smart speakers, are vulnerable when they communicate with their associated apps on the owner’s mobile phone.
"There is a fundamental…
Content type: Examples
The coronavirus action plan announced on March 3, alongside many measures for managing the NHS in the crisis, will also allow the Investigatory Powers Commissioner to appoint judicial commissioners (JCs) on a temporary basis in the event that there are insufficient JCs available to operate the system under the Investigatory Powers Act 2016. The Home Secretary, at the request of the Investigatory Powers Commissioner, will also be allowed to vary the time allowed for urgent warrants to be…
Content type: Press release
Caroline Wilson Palow, General Counsel at Privacy International
“The passage of the Investigatory Powers Act is a major blow to the privacy of people in the UK and all over the world. It sets a world-leading precedent, but not one of which the Government should be proud. Instead of reining in the unregulated mass surveillance practices that have for years been conducted in secret and with questionable legal authority, the IPA now enshrines them in law. Widespread surveillance is an antithesis…
Content type: Long Read
This week, Privacy International, together with nine other international human rights NGOs, filed submissions with the European Court of Human Rights. Our case challenges the UK government’s bulk interception of internet traffic transiting fiber optic cables landing in the UK and its access to information similarly intercepted in bulk by the US government, which were revealed by the Snowden disclosures. To accompany our filing, we have produced two infographics to illustrate the…
Content type: Press release
Today Sir Stanley Burnton, the Interception of Communications Commissioner, published a highly critical review of the use of Section 94 of the Telecommunications Act 1984 for gathering vast amounts of our communications data in bulk. This obscure clause pre-dates the internet era, but has been used for nearly two decades for mass surveillance. Today is the first time that these powers have been criticised by an independent statutory body. IOCCO is critical of the Government's use of these…
Content type: Long Read
1984: A broad law, a broad power and a whole lot of secrecy
In the wake of litigation brought by Privacy International (‘PI’) and as the Government prepared to introduce the Draft Investigatory Powers Bill (‘IP Bill’) in November 2015, there was a cascade of ‘avowals’- admissions that the intelligence agencies carry out some highly intrusive surveillance operations under powers contained in outdated and confusing legislation.
It is disappointing that it has been almost six months since…
Content type: News & Analysis
This guest piece was written by Jane Duncan of the Right2Know Campaign. It does not necessarily reflect the views or position of Privacy International.
On 23rd March the United Nations Human Rights Committee released its assessment on South Africa’s compliance with the International Covenant on Civil and Political Rights (ICCPR). The report includes a blistering attack on the Government for failing to respect the privacy of the communications of users and makes…
Content type: Long Read
Written by: Maria del Pilar Saenz
With a raft of recent scandals involving proven and possible abuses of surveillance systems by state institutions, there is a clear need to generate policy and practice in Colombia that promotes respect for human rights. It is necessary to keep this in mind as an emerging public policy discussion on cybersecurity led by CONPES (The National Council for Economic and Social Policy) begins in Colombia. This series of reforms will serve as the policy basis…
Content type: Long Read
This guest piece was written by Jessamine Pacis of the Foundation for Media Alternatives. It does not necessarily reflect the views or position of Privacy International.
Introduction
With a history immersed in years of colonialism and tainted by martial law, Philippine society is no stranger to surveillance. Even now, tales of past regimes tracking their citizens’ every move find their way into people’s everyday conversations. This, for the most part, has kept Filipinos…
Content type: Long Read
Written by: Centre for Internet and Society
This guest piece was written by representatives of the Centre for Internet and Society (CIS). It does not necessarily reflect the views or position of Privacy International.
Introduction
As part of the State of the Surveillance project, CIS conducted a review of surveillance law, policy, projects, and trends in India. Below we provide a snap shot of key legal provisions governing surveillance in India and touch on…
Content type: Press release
Today’s report by the Joint Committee on the Investigatory Powers Bill is the third committee report that concludes that the Home Office has failed to provide a coherent surveillance framework.
The Joint Committee on the Investigatory Powers Bill today published a 198 page report following a short consultation period between November and January. Their key findings are that:
- the definitions in the bill need much work, including a meaningful and comprehensible…