Search
Content type: Impact Case Study
What happened
Since the late 1980s governments across the world have been trying to build identity registries. By the early 1990s, there were similar policies being pursued by a number of governments across the Pacific region, with similar technologies from the same companies. In the mid-90s ID cards became a ‘modern’ policy, implementing smart cards. By 9/11 biometric IDs became the preferred solution to undefinable problems. Then came vast databases of biometrics to identify people — with…
Content type: Impact Case Study
[Photo By Ludovic Courtès - Own work, CC BY-SA 3.0]
Last update: 14 December 2022
What is the problem and why it is important
Until the early '10s, the right to privacy had been sidelined and largely unaddressed within the UN human rights monitoring mechanisms, despite being upheld as a fundamental human right in the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights (ICCPR).
Beyond the ICCPR General Comment No.16:…
Content type: News & Analysis
Image was found here.
As part of Privacy International’s mission, we aim to take the issues emerging from our research and that of our partners to new spaces of debate and to the attention of stakeholders at the national, regional and international level.
In April 2018, Privacy International was able to engage for the first time with the African Commission on Human and People's Rights (ACHPR) at its 62nd Ordinary Session, which took place in Nouakchott, Mauritania.
The right to privacy does…
Content type: Call to Action
Support our campaign against unregulated police surveillance technology by sharing our #spypolice posters on social media
Take part in our #spypolice campaign!
Content type: Press release
We found this picture here.
Privacy International has today a issued a formal complaint to the UK Information Commissioner about the police’s use of intrusive ‘mobile phone extraction’ technology, enabling them to download all of the content from a person’s phone — without a warrant, and whether they are suspect, witness or even victim of a crime. Further complaints have also been sent to the Home Office and the Independent Office for Police Conduct, calling for urgent reforms to a totally…
Content type: Advocacy
A new Privacy International report, based on an international collaborative investigation carried out by 40 NGOs in 42 countries, has found alarming weaknesses in the oversight arrangements that are supposed to govern the sharing of intelligence between state intelligence agencies. Privacy International urges governments to enact urgent reforms and improve public understanding about the scope of intelligence sharing and the safeguards and oversight currently in place.
Content type: Advocacy
A new Privacy International report based on an international collaborative investigation carried out by 40 NGOs in 42 countries has found alarming weaknesses in the oversight arrangements that are supposed to govern the sharing of intelligence between state intelligence agencies, including in the UK. Privacy International urges governments to enact urgent reforms and improve public understanding about the scope of intelligence sharing and the safeguards and oversight currently in place.
Content type: Long Read
A major new report published today by Privacy International has identified alarming weaknesses in the oversight arrangements that are supposed to govern the sharing of intelligence between state intelligence agencies.
'Secret Global Surveillance Networks: Intelligence Sharing Between Governments and the Need for Safeguards' is based on an international collaborative investigation carried out by 40 NGOs in 42 countries.
Previously undisclosed documents obtained by PI via litigation in the…
Content type: Report
‘Secret Global Surveillance Networks’ is a major PI report, based on an unprecedented international collaborative investigation carried out by 40 NGOs in 42 countries.
Our research shows that, globally, the sharing of intelligence is alarmingly under-regulated, opening the door to human rights abuses. Intelligence sharing has evolved dramatically with the rise of new surveillance technologies, enabling governments to collect, store, and share vast troves of personal information, including data…
Content type: Long Read
This piece was originally published in Lawfare in April 2018
The United States is party to a number of international intelligence sharing arrangements—one of the most prominent being the so-called “Five Eyes” alliance. Born from spying arrangements forged during World War II, the Five Eyes alliance facilitates the sharing of signals intelligence among the U.S., the U.K., Australia, Canada and New Zealand. The Five Eyes countries agree to exchange by default all signals intelligence…
Content type: News & Analysis
El 10 de mayo de 2018, en el marco del 30º período de sesiones del Examen Periódico Universal (EPU) en el Consejo de Derechos Humanos de las Naciones Unidas, toca la revisión de Colombia, lo que es una oportunidad Colombia y otros Estados para declarar qué acciones han tomado para mejorar la situación de derechos humanos en sus propios países, para cumplir sus obligaciones internacionales en la materia.
Colombia se encuentra actualmente en un punto de inflexión, debido al proceso de transición…
Content type: News & Analysis
On 10 May 2018, Colombia’s human right record will be reviewed as part of the 30th session of the Universal Periodic Review (UPR), under the auspices of the Human Rights Council, which provides the opportunity for each State to declare what actions they have taken to improve the human rights situations in their countries and to fulfil their human rights obligations.
Colombia is at an important turning point in its history as it transitions from four decades of conflict. This provides…
Content type: News & Analysis
We found the image here.
You’d be hard pressed to find an issue relating to human rights or the rule of law that wouldn’t benefit from a greater appreciation of the role of technology plays. Increasingly the practice of law, the waging of politics, and the conduct of social and economic affairs all are altered, modified, and even conducted through technological means. So to is the accumulation and use of power.
This is why at Privacy International, technology is at the core of what we do as…
Content type: News & Analysis
This op-ed originally appeared in the Huffington Post.
As technologies used by the police race ahead of outdated legislation, we are left vulnerable to potential for misuse and abuse of our data
The vast quantities of data we generate every minute of the day and how it can be exploited is challenging democratic and societal norms. The use by UK police forces of technologies that provide access to data on our phones, which document everything we do, everywhere we go, everyone we interact with…
Content type: Long Read
As we said before, Facebook and Cambridge Analytica scandals are a wake-up call for policy makers. And also a global issue. People around the world are concerned by the exploitation of their data. The current lack of transparency into how companies are using people’s data is unacceptable and needs to be addressed.
There is an entire hidden ecosystem of companies harvesting and sharing personal data. From credit scoring and insurance quotations to targeted political communication, this…
Content type: Long Read
In December 2017, Privacy International published an investigation into the use of data and microtargeting during the 2017 Kenyan elections. Cambridge Analytica was one of the companies that featured as part of our investigation.
Due to the recent reporting on Cambridge Analytica and Facebook, we have seen renewed interest in this issue and our investigation. Recently in March of 2018, Channel 4 News featured a report on micro targeting during the 2017 Kenyan Presidential Elections, and the…
Content type: Long Read
Over the past few days we've all learned details about how Cambridge Analytica was able to amass data on voters through the use of an app that would gather data on approximately 50 million Facebook users, including 30 million psychographic profiles.
This is three stories in one.
Yes, this is another story of data that has been exploited for political advantage, again. Political parties and governments continue to want access to social media intelligence and continue to develop profiles…
Content type: Long Read
Image: Eric Jones
The UK government last week hosted hundreds of surveillance companies as it continues to try and identify “technology-based solutions” able to reconcile the need for controls at the Irish border with the need to avoid them.
The annual showcase conference of 'Security and Policing' brings together some of the most advanced security equipment with government agencies from around the world. It is off limits to the public and media.
This year’s event came as EU and UK…
Content type: News & Analysis
Written by Datos Protegidos
04:16: Carolina can´t sleep. She grabs her mobile from the nightstand next to her bed to check her WhatsApp notifications and read some tweets. She decides to disconnect to and tries to go back to sleep.
07:00: Carolina is woken by her mobile phone alarm. She picks it up and checks her social networks and messages again. To her astonishment, she finds a message in a WhatsApp group from her former college classmate Pablo at 5:25 asking if anyone was still…
Content type: News & Analysis
Written by Privacy International
08:27: Jen gets on the London Underground to go to work. She uses her contactless debit card to pay for the tube, so Transport for London knows where she is travelling to and from and her bank knows when she takes the tube.
08:36: The public WiFi on the tube means that even when Jen doesn’t connect to it, her every step inside the underground is tracked. The data will eventually be sold to advertisers.
08:58: Jen arrives at work. As with all the lower…
Content type: Advocacy
On 6 March 2018, Privacy International participated in an interactive dialogue with the UN Special Rapporteur on the right to privacy at the 37th Ordinary Session of the Human Rights Council in Geneva. We highlighted the growing trend of governments embracing hacking to facilitate their surveillance activities, and recommended the development of a human rights analysis of government hacking for surveillance purposes, with the view to forming specific…
Content type: Advocacy
Este informe de terceras partes interesadas es una contribución escrita presentada por Dejusticia, Fundación Karisma y Privacy International (PI). Dejusticia es una organización de derechos humanos colombiana que brinda conocimientos especializados sobre derechos humanos. Fundación Karisma es una organización de la sociedad civil colombiana que busca dar respuesta a las oportunidades y a las amenazas que surgen en el contexto de la tecnología para el desarrollo para el ejercicio de los derechos…
Content type: Advocacy
This stakeholder report is a submission by Dejusticia, Fundación Karisma and Privacy International (PI). Dejusticia is a Colombian human rights organization that provides expert knowledge on human rights. Fundación Karisma is a Colombian civil society organization that seeks to respond to the opportunities and threats that arise in the context of ‘technology for development’ for the exercise of human rights. PI is a human rights organisation that works to advance and promote the right to…
Content type: Press release
Hearing: Cross examination of senior GCHQ official about Intelligence Agencies’ use of massive databases of information about everyone in the UK
When: Monday 26 February 2018, 3.15pm
Where: Royal Courts of Justice, Court 28, Strand, London WC2A 2LL
Summary
This is the first time GCHQ have given open evidence in the Investigatory Powers Tribunal (The Tribunal). It is also the first time they will be cross examined by Privacy International on serious misleading errors they provided in…
Content type: Explainer
Phone networks are divided between two networks: the physical and the mobile. The physical runs on the Public Switched Telephone Network (PSTN) that serves your home phone. Mobile networks are dominant in the age of communication and are used to relay mobile communications to the PSTN. The most prominent mobile networks are GSM networks (Global System for Mobile communications) and are what we use everyday to communicate with one another. Another system is known as CDMA (Code Division Multiple…
Content type: Explainer
Video surveillance technologies are deployed in public and private areas for monitoring purposes. Closed-circuit television (CCTV)– a connected network of stationary and mobile video cameras– is increasingly used in public areas, private businesses and public institutions such as schools and hospitals. Systems incorporating video surveillance technologies have far greater powers than simply what the camera sees. Biometric technologies use the transmitted video to profile, sort and identify…
Content type: Explainer
What is the Global Surveillance Industry?
Today, a global industry consisting of hundreds of companies develops and sells surveillance technology to government agencies around the world. Together, these companies sell a wide range of systems used to identify, track, and monitor individuals and their communications for spying and policing purposes. The advanced powers available to the best equipped spy agencies in the world are being traded around the world. It is a…
Content type: Legal Case Files
Investigatory Powers Tribunal
Case No. IPT/13/92/CH
Status: On Appeal
In July 2013, Privacy International filed a complaint before the Investigatory Powers Tribunal (IPT), challenging two aspects of the United Kingdom's surveillance regime revealed by the Snowden disclosures: (1) UK bulk interception of internet traffic transiting undersea fibre optic cables landing in the UK and (2) UK access to the information gathered by the US through its various bulk surveillance programs. Our complaint…