Search
Content type: News & Analysis
1st December 2017
13 June 2016
"State capacity to conduct surveillance may depend on the extent to which business enterprises cooperate with or resist such surveillance” notes the Special Rapporteur on freedom of expression in his report on the role of the private sector to respect human rights in the digital age. The Special Rapporteur will present its findings and recommendations to the Human Rights Council on Thursday.
It is no longer sufficient for companies to simply point the finger at intelligence and…
Content type: News & Analysis
21st April 2017
Dear Politicians,
With elections coming up and quite a few cringe-worthy comments that have come from many of you and from all sides of the political spectrum, we figured it was time to have a chat about encryption.
First, let’s say what you shouldn’t do:
call for boycotts of companies because they protect their users’ data even from the companies themselves.
say something like “we’ll develop a Manhattan-level project on this” (which, as we’ll remind you, ended up with the creation of a…
Content type: Long Read
30th October 2017
Government hacking is unlike any other form of existing surveillance technique. Hacking is an attempt to understand a system better than it understands itself, and then nudging it to do what the hacker wants. Fundamentally speaking, hacking is therefore about causing technologies to act in a manner the manufacturer, owner or user did not intend or did not foresee.
Governments can wield this power remotely, surreptitiously, across jurisdictions, and at scale. A single hack can affect many…
Content type: News & Analysis
12th October 2017
We found this image here.
On 11 October, the LIBE Committee of the European Parliament votes on the draft e-privacy regulation. As the landscape of generation, collection, and other processing of data in the digital sphere evolves, the proposal seeks to update the rules on confidentiality and security of electronic communications and online activities.
Unsurprisingly, companies whose business models rely on tracking individuals online have been busy lobbying against the new regulation. The…
Content type: Report
25th January 2017
This investigation looks at how surveillance is being conducted in Thailand. The first part of the investigation focuses on the ties between telecommunication companies and the state, and the second part of the investigation focuses on attacks conducted in order to attempt to circumvent encryption.
Content type: Landing Page
23rd November 2017
We fight for the right to privacy of everyone everywhere. People must have access to privacy protection without regard to citizenship, race and ethnicity, economic status, gender, age, education.
We are building a global movement. We are supporting civil society partners in countries across the Global South, who constitute our international network of privacy advocates and researchers. Together we are building expertise on law and technology that investigates local developments and advocates…
Content type: Landing Page
23rd November 2017
PI supports people everywhere to protect privacy, dignity, and freedom.
We target companies and governments that don’t respect your right to be free from their prying technologies. We expose their practices to public scrutiny. We pursue them in court. With you, we fight in the public interest, demanding better rules and stronger technologies globally. We help other organisations around the world. We help you learn how to protect yourself, your loved ones, and everyone else around the world…
Content type: News & Analysis
1st December 2017
14th August 2017
We found the image here.
We work to collect the minimum amount of data that we need from you to do our jobs within the resources we have, and to protect and use that data in an ethical manner. We are expanding the ways we engage with our supporters, by rebuilding our technical services to ensure that we continue to live up to that commitment.
Here we explain what data we have access to, what we collect, and how we work to protect your data. This piece is more explanatory…
Content type: News & Analysis
18th December 2017
We work to collect the minimum amount of data that we need from you to do our jobs within the resources we have, and to protect and use that data in an ethical manner. We are expanding the ways we engage with our supporters, by rebuilding our tech services to ensure that we continue to live up to that commitment.
Here we explain what data we have access to, what we collect, and how we work to protect your data. This piece is more explanatory than our policy statement which is available here.…
Content type: News & Analysis
1st December 2017
There are three good reasons why security is so hard for NGOs. First, we are afraid to speak about meaningful security. Second, we focus on the wrong areas of security and in turn spend money and prioritise the wrong things. Third, we struggle to separate the world we want from the worlds we build within our own organisations. At PI we have failed and struggled with each of these for over 20 years. Out of exhaustion, we decided to do something about it: we are building an open framework, a…
Content type: Advocacy
17th November 2017
Thornsec is a piece of software developed by Privacy International’s Tech Team which is an automated way to deploy, test, and audit internal and external services for an organisation, saving a lot of time and creating a sustainable security model. We are using this software to run all of Privacy International’s services – website, calendar, project management tools, Tor hidden services, VPNs. The whole system runs on two servers and the whole cost is around US$1000 to set up.
Thornsec is…
Content type: Advocacy
19th October 2017
Privacy International has today submitted comments to a U.S. government consultation on whether the US Department of Homeland Security (DHS) should keep the social media details of individuals travelling to the US in so-called “Alien Files” documenting all immigrants.
We’ve urged that they don’t, and that they review and stop all similar social media surveillance by the DHS.
The systematic surveillance of social media is an increasingly dangerous trend around the world, including in Thailand…
Content type: Long Read
9th February 2017
This piece was orignally published in Slate in February 2017
In 2015, the FBI obtained a warrant to hack the devices of every visitor to a child pornography website. On the basis of this single warrant, the FBI ultimately hacked more than 8,700 computers, resulting in a wave of federal prosecutions. The vast majority of these devices—over 83 percent—were located outside the United States, in more than 100 different countries. Now, we are in the midst of the first cases to work their way…
Content type: News & Analysis
6th April 2017
This week the United States Congress voted to strip away one of the country’s few safeguards of the right to privacy by repealing rules which would have limited internet service provider’s ability to use or share customers’ data without customers’ approval.
Meanwhile, last week, 6,500 kilometers away in Geneva, the United Nations Human Rights Council called on states to strengthen customers’ control over their data and develop legislation to address harm from the sale or corporate sharing of…
Content type: News & Analysis
2nd June 2017
Image source: AFP
Earlier this month, the Kenyan daily The Star reported that UK-based data analytics firm Cambridge Analytica had been quietly contracted by President Uhuru Kenyatta’s party in a bid to win himself a second term in office. State House officials were quick to deny the claims, while the company itself issued no comment.
Cambridge Analytica has exploded onto the scene following revelations that its psychometric profiling techniques were used and reportedly played a role in both…
Content type: Opportunities
31st October 2017
Our volunteer programme is currently on hold - but when we do have opportunites we'll post them here, so keep an eye out!
Want to volunteer for a charity that holds governments and companies to account on their intrusions into our private lives? Then apply to join Privacy International’s volunteer program!
Privacy International is a London-based charity committed to fighting for the right to privacy across the world.
In our volunteer program, you won’t be making coffee or doing the…
Content type: News & Analysis
20th December 2017
This post was written by PI Technologist Ed Geraghty.
At the very heart of ThornSec’s design is that we assume our security will fail. There is nothing perfect on this earth (except kittens). The entire point is to fail well. For charities and NGOs that are fragile, poorly resourced, and often at risk, this is relatively novel thinking. We prepare for that with a strict adherence to good security practice.
It is exactly this element of novelty that makes us more open than your average Open…
Content type: News & Analysis
25th October 2017
The United States Department of Homeland Security (DHS) has contracted one of the world’s largest arms companies to manage a huge expansion of its biometric surveillance programme.
According to a presentation seen by Privacy International, the new system, known as Homeland Advanced Recognition Technology (HART), will scoop up a whopping 180 million new biometric transactions per year by 2022.
It will replace the Automated Biometric Identification System (IDENT), which currently stores…
Content type: News & Analysis
1st December 2017
2nd March 2015
UPDATE: Since the original publication of this post in early February, over fifty additional national and international human rights organisations have joined us and called on all governments to support the creation of a UN Special Rapporteur on the Right to Privacy.
This recent wave of support, bringing the total number up to 63, comes at a critical time. As the UN Human Rights Council begins its 28th session in Geneva today, the Council has perhaps the most significant…
Content type: News & Analysis
1st December 2017
Early on Wednesday morning the Prevention of Electronic Crimes Bill was approved by Pakistan’s National Assembly. The Bill, which is almost universally acknowledged as “controversial” had been criticised by opposition members, industry and civil society at numerous stages. Civil society organisations from around the world released two joint statements in April and December last year expressing their concerns. Despite the chorus of criticism, very little has changed in the Bill during its…
Content type: Examples
1st December 2017
In 2017, Uber began a programme experimenting with using psychology and social science insights to influence when, where, and how long its drivers work. Among other techniques, Uber auto-loaded the next fare to encourage the driver equivalent of binge TV-watching; reminded drivers when they're close to their earnings targets to keep them from logging off; and used game-style graphics and small-value awards to keep drivers at the wheel. The company also had male managers adopt female personas…
Content type: Examples
1st December 2017
For some months in 2017, in one of a series of high-risk missteps, Uber violated Apple's privacy guidelines by tagging and identifying iPhones even after their users had deleted Uber's app. When Apple discovered the deception, CEO Tim Cook told Uber CEO Travis Kalanick to cease the practice or face having the Uber app barred from the App Store.
External Link to Story
https://www.nytimes.com/2017/04/23/technology/travis-kalabnick-pushes-uber-and-himself-to-the-precipice.html
Content type: News & Analysis
30th June 2017
The Privacy International Network recently submitted joint stakeholder reports for seven partner countries - India, South Africa, Morocco, Tunisia, Brazil, the Philippines and Indonesia - as part of the 27th session of the Universal Periodic Review (1 to 12 May 2017).
Communications surveillance was a major area of concern, as we observed that these policies and practices remain largely opaque, complex and vague. In some countries, they fail to meet human rights standards and principles of…
Content type: Report
15th March 2017
This investigation focuses on the techniques, tools and culture of Kenyan police and intelligence agencies’ communications surveillance practices. It focuses primarily on the use of surveillance for counterterrorism operations. It contrasts the fiction and reality of how communications content and data is intercepted and how communications data is fed into the cycle of arrests, torture and disappearances.
Communications surveillance is being carried out by Kenyan state actors, essentially…
Content type: Landing Page
23rd November 2017
In this section you will find a wide range of content that we hope you will find useful in learning more about how technology, privacy, autonomy and freedom are deeply interconnected. We also provide some guides on steps you can take to enhance your privacy - although, we need to be clear that few, if any, watertight measures exist, which is why we continue to press for better regulation, better safeguards and better technological solutions.
Content type: People
15th December 2017
Tomaso leads Privacy International's policy development, as well as our advocacy and policy team. He develops the organisation's international advocacy with the UN, the EU, and other relevant intergovernmental bodies. Previously he worked for Child Soldiers International and for Amnesty International’s (AI) International Secretariat, in the International Law and Policy Program, where he was legal and policy advisor. His main responsibilities included providing advice on international human…
Content type: News & Analysis
1st December 2017
31 October 2016
This piece originally appeared in The Guardian here.
This government’s “neither confirm nor deny” mantra over the extent of its surveillance powers has been replaced with a new one: “Never apologise, never explain.” On Monday, the tribunal tasked with hearing complaints against our intelligence agencies found that for more than a decade our intelligence agencies had been unlawfully amassing, in bulk, vast amounts of our personal data.
The official public response from the…
Content type: News & Analysis
1st December 2017
The following article written by Carly Nyst, Privacy International's Legal Director, originially appeared on the Future Tense blog on Slate:
The news that the CIA is no longer using vaccination programs as a front for spying operations may come as a relief to many humanitarian workers. Yet their fears should not be completely assuaged, because the CIA’s activities—which undoubtedly threatened the safety of humanitarian workers and those they seek to help—pale in comparison to the surveillance…
Content type: Long Read
11th July 2017
This piece was originally published in Lawfare in July 2017.
The United Kingdom has been a key partner in the United States’ efforts to reform the process that law enforcement officials use to make cross-border requests for data. These efforts address both foreign governments’ requests for data stored in the U.S. and reciprocal requests by the U.S. government for data stored abroad. As part of these efforts, the U.S. and the U.K. have negotiated a draft bilateral agreement (“U.S.-U.K.…