Search
Content type: News & Analysis
This post was written by PI Policy Officer Lucy Purdon.
In 1956, US Presidential hopeful Adlai Stevenson remarked that the hardest part of any political campaign is how to win without proving you are unworthy of winning. Political campaigning has always been a messy affair and now the online space is where elections are truly won and lost. Highly targeted campaign messages and adverts flood online searches and social media feeds. Click, share, repeat; this is what political engagement looks…
Content type: Long Read
The battle for Kenyan voters’ allegiance in the 2017 Presidential election was fought on social media and the blogosphere. Paid advertisements for two mysterious, anonymous sites in particular started to dominate Google searches for dozens of election-related terms in the months leading up to the vote. All linked back to either “The Real Raila”, a virulent attack campaign against presidential hopeful Raila Odinga, or Uhuru for Us, a site showcasing President Uhuru Kenyatta’s accomplishments. As…
Content type: Long Read
Introduction
Why We Are So Concerned about Government Hacking for Surveillance
Scope of Our Safeguards
1. Legality
2. Security and Integrity of Systems
3. Necessity and Proportionality
4. Judicial Authorisation
5. Integrity of information
6. Notification
7. Destruction and Return of Data
8. Oversight and Transparency
9. Extraterritoriality
10. Effective Remedy
Commentary on each
1. Legality
2. Security and Integrity of Systems
3. Necessity and Proportionality
4.…
Content type: People
Alexandrine is Directory of Strategy at Privacy International. She manages and oversees the development and delivery of Privacy International's strategic portfolio aimed at ensuring that innovative solutions serve individual and communities and protection their dignity rather than state power and corporate interest. This portfolio explores issues of digital identity, protecting communities at risk online, the digitisation of access to economic, social and cultural rights, and the use of data…
Content type: Report
When you rent a car at the airport, use a car-share for a family day trip, one of the first things you are likely to do before setting off on your journey, is to connect your phone to the car. You switch on the Bluetooth and see a list of other people’s phones that were previously connected - Mike’s iPhone, Samsung Galaxy, Bikerboy_Troi, Dee Dee. You input your journey into the navigation, perhaps noticing stored locations of previous drivers.
Seems fairly innocuous? Wrong. Your name and…
Content type: Press release
Press Release: New report shows how car rental companies are failing to protect drivers' information
A new report by Privacy International shows how car rental companies and car-share schemes are failing to protect drivers' personal information, such as their location, smart phone contents, and place of residence.
The report is here: https://privacyinternational.org/node/987
Key points
Privacy International (PI) rented a series of internet-connected cars and examined the information which was collected and retained on the rental cars' infotainment system*. Every car PI rented…
Content type: Examples
A US House of Representatives oversight committee was told in March 2017 that photographs of about half of the adult US population are stored in facial recognition databases that can be accessed by the FBI without their knowledge or consent. In addition, about 80% of the photos in the FBI's network are of non-criminals and come from sources such as passports. Eighteen states supply driver's licences under arrangement with the FBI. In response, privacy advocates and politicians called for…
Content type: News & Analysis
13 June 2016
"State capacity to conduct surveillance may depend on the extent to which business enterprises cooperate with or resist such surveillance” notes the Special Rapporteur on freedom of expression in his report on the role of the private sector to respect human rights in the digital age. The Special Rapporteur will present its findings and recommendations to the Human Rights Council on Thursday.
It is no longer sufficient for companies to simply point the finger at…
Content type: News & Analysis
Following the alarming evidence that EU-made electronic surveillance equipment is still being exported to authoritarian countries around the world, we strongly urge all EU member states and institutions to respect their human rights obligations and call on them to prioritise long overdue EU reforms.
We are extremely concerned that little has changed since civil society first recognised the need to modernise current EU rules governing the export of surveillance equipment as far back…
Content type: News & Analysis
7 July 2016
It has been said is that we pay for free services with our personal data. Now, the Privacy Shield exponentially expands this truth and we are paying for the cost of U.S. political dysfunction combined with EU complacency with our privacy. More than four months after the first EU-US Privacy Shield was published on 29 February 2016, a new version has been leaked. Remarkably, it is expected to be adopted.
Four months, two opinions by group of EU data protection…
Content type: News & Analysis
This comment by Privacy International Executive Director Gus Hosein ran in Ciper Chile on 19 May, 2014
The economic benefits of being included in the Visa Waiver Program (VWP) with the US are remarkable. The ease of travel allows for the exchange of tourism between the countries, and other new economic opportunities through reduced friction caused by visa approval processes. Nonetheless, this program is often used as a mechanism to seek more data on the citizenry of participating…
Content type: News & Analysis
17 June 2013
Below is an excerpt of an article that recently appeared in Melbourne, Australia's The Age, written by Carly Nyst, Head of International Advocacy at Privacy International:
"Mass surveillance of a country's citizens by its government can no longer be said to be the preserve of authoritarian and dictatorial states.
The publication last week by The Guardian of classified National Security Agency documents has exposed the extent of surveillance by the US government, throwing…
Content type: News & Analysis
2nd March 2015
UPDATE: Since the original publication of this post in early February, over fifty additional national and international human rights organisations have joined us and called on all governments to support the creation of a UN Special Rapporteur on the Right to Privacy.
This recent wave of support, bringing the total number up to 63, comes at a critical time. As the UN Human Rights Council begins its 28th session in Geneva today, the…
Content type: News & Analysis
The following op-ed appeared in openDemocracy, written by Edin Omanovic, Research Officer at Privacy International:
It's not surprising that some of the states in Central Asia spy on people. Authoritarianism across the world relies on the intrusion into, and lack thereof, of a private sphere. From the KGB to their modern incarnations, the autocracies in the region continue to rely on state surveillance and other entrenched means of political control to stay in power.
New technologies and…
Content type: News & Analysis
The following appeared in the Daily Telegraph, and was written by Carly Nyst, Legal Director of Privacy International:
"Robert Hannigan, the new head of GCHQ, announced his arrival this week with a call for “greater co-operation” with security forces by tech companies. Hannigan’s article in the Financial Times illustrated vividly the destructive ideology that has driven the infiltration by the British and American intelligence agencies into every aspects of the digital realm – an…
Content type: Case Study
Invisible and insecure infrastructure is facilitating data exploitation
Many technologies, including those that are critical to our day-to-day lives do not protect our privacy or security. One reason for this is that the standards which govern our modern internet infrastructure do not prioritise security which is imperative to protect privacy.
What happened?
An example of this is Wi-Fi, which is now on its sixth major revision (802.11ad). Wi-Fi was always designed to be a verbose in…
Content type: Press release
The release of a new report by Privacy International exposes Colombia's intelligence agencies' previously unknown history of developing communications surveillance capabilities outside of lawful authority.
The report “Shadow State: Surveillance law and order in Colombia” reveals, via previously unreleased documents, the Colombian police agencies' and intelligence services' long history developing surveillance systems. Rather than building a well-regulated system of surveillance after Colombia…
Content type: News & Analysis
Privacy International has today written to government ministers, members of the opposition, and oversight bodies reaffirming its call for the UK government to reveal secret intelligence sharing arrangements with the United States.
The original UKUSA agreement — drafted shortly after World War II — allows UK and US agencies to share, by default, any raw intelligence, collection equipment, decryption techniques, and translated documents.
Current arrangements also allow US intelligence agencies…
Content type: News & Analysis
The elections in our midst here, there, and everywhere are increasingly resulting in governments who introduce policies that result in leaps backwards for dignity, equality, civil liberties, and the rule of law. Whether it is Poland or the Philippines, governments are overriding essential safeguards.
This week Britain’s proposed surveillance legislation took another step toward normalising mass surveillance. The United States of America has long promoted mass surveillance and maintains its…
Content type: News & Analysis
This piece originally appeared in Open Democracy here.
As the UK Parliament returns from its summer break, everyone’s back to talking about Brexit. But there’s another policy of existential significance to our democracy that we really need to be talking about. I refer here to the innocuously named ‘Investigatory Powers Bill’. The House of Lords have been debating the ‘bulk powers’ — what we would call the mass surveillance measures — of the Bill over the recent days. We are literally…
Content type: Press release
17 November 2015
A new Privacy International investigation reveals Microsoft's complicity in a serious case of Government persecution in Thailand. It is a shocking example of how Western companies not only work with governments that fall considerably short of international human rights standards, but can actually facilitate abuses of human rights.
In early 2014, a Thai stockbroker, Katha Pachachirayapong, was accused by the Government of spreading rumours on the ill-health of King…
Content type: News & Analysis
Below is the introduction to Privacy International's 2017 International Women's Day report, which highlights the recent work of the PI Network on privacy, surveillance, and gender.
Many of the challenges at the intersection of women’s rights and technology as it relates to privacy and surveillance, come down to control. Such challenges have come sharply into focus as societies trend toward surveillance by default and foster data exploitative ecosystem.
And whilst control, in the context of…
Content type: News & Analysis
7 July 2017
War profiteers are finding the data business easy going. The have wielded their unwarranted influence and applied their business model of causing and then profiting from insecurity and applied it to the digital age; the results have been more profit for them and less liberty for you.
When a politician riles against an evil tech giant for providing ‘safe spaces’ online, it’s a political distraction. The real battle for your data is being fought between the emergent tech…
Content type: News & Analysis
18 October 2013
The following is an excerpt from an article written that originally was published by IFEX, and is written by Carly Nyst, Head of International Advocacy at Privacy International:
The reality of the modern world is that governments – both of our own countries, and of foreign states – have greater capabilities to carry out invasive surveillance of citizens, no matter where they reside or what flag they pledge to. And caught in the cross-fire of the expanding surveillance…
Content type: Press release
Key points
Privacy International has obtained previously unseen government documents that reveal British spy agency GCHQ collects social media information on potentially millions of people.
GCHQ collected and accesses this information by gaining access to private companies’ databases.
Letters obtained by Privacy International reveal that the body tasked with overseeing intelligence agencies’ activities (the Investigatory Powers Commissioner) was kept in the dark as UK intelligence…
Content type: Press release
In today’s latest hearing in our ongoing legal challenge against the collection of massive troves of our personal data by the UK intelligence agencies, shocking new evidence has emerged about GCHQ’s attempts to yet again avoid proper independent scrutiny for its deeply intrusive surveillance activities.
In a truly breath-taking exchange of letters between the Investigatory Powers Commissioner’s Office (“IPCO”) and the Director of Legal Affairs at GCHQ, it has emerged that GCHQ have…
Content type: Long Read
This piece was originally published in Just Security in November 2017.
The upcoming expiration of Section 702 of the Foreign Intelligence Surveillance Act (FISA) has launched a fresh wave of debate on how the statute’s “backdoor search loophole” allows the U.S. government to access Americans’ communications by searching information gathered on foreign intelligence grounds without a warrant. But while discussion about domestic information sharing is important, a critical…
Content type: Landing Page
Working at PIAt Privacy International (PI) we believe that for people to be treated with dignity and to preserve autonomy, we must defend the right for all people everywhere to have access to privacy protection in laws and technologies. The empowerment of the individual is core to our work.Accordingly, PI aims to empower its staff and create a good work environment. PI celebrates diversity in its people, its approaches, and its strategy. People here are looking to change the world by…
Content type: News & Analysis
This is the story of Privacy International's journey to building more secure services. Data collection and administering sensitive data on the open web is risky, and PI had to learn this the hard way.
Many companies say that the privacy of their audiences is their top priority. But do they mean it? Do they invest in it? Doing security on tight budgets is incredibly hard. But it is the natural state of the non-profit sector. We learned this through challenging experiences.…
Content type: News & Analysis
Surveillance in digital spaces is the policing and monitoring of activity of those occupying these spaces. Surveillance affects free speech, privacy and behaviour of digital users. Feminism and a feminist approach to surveillance puts marginalised communities, those that are victims of class discrimination, racial and patriarchal structures, at the centre of discourse around privacy and surveillance.
Surveillance in Pakistan is often seen as an issue of national security. With the National…