Search
Content type: News & Analysis
Today Advocate General (AG) Campos Sánchez-Bordona of the Court of Justice of the European Union (CJEU), issued his opinions (C-623/17, C-511/18 and C-512/18 and C-520/18) on how he believes the Court should rule on vital questions relating to the conditions under which security and intelligence agencies in the UK, France and Belgium could have access to communications data retained by telecommunications providers.
The AG addressed two major questions:
(1) When states seek to impose…
Content type: News & Analysis
Photo: The European Union
On 2 September 2019, Privacy International, together with 60 other organisations, signed an open letter to the European Parliament to express our deep concern about upcoming EU policy proposals which undermine the EU’s founding values of human rights, peace and disarmament.
Since 2017, the EU has diverted funds towards security research and security capacity-building in countries around the world. The proposal for the EU's next budget (2021-2027) will…
Content type: Long Read
Six years after NSA contractor Edward Snowden leaked documents providing details about how states' mass surveillance programmes function, two states – the UK and South Africa – publicly admit using bulk interception capabilities.
Both governments have been conducting bulk interception of internet traffic by tapping undersea fibre optic cables landing in the UK and South Africa respectively in secret for years.
Both admissions came during and as a result of legal proceedings brought by…
Content type: Long Read
Privacy International is celebrating Data Privacy Week, where we’ll be talking about privacy and issues related to control, data protection, surveillance and identity. Join the conversation on Twitter using #dataprivacyweek.
Exercising the right to privacy extends to the ability of accessing and controlling our data and information, the way it is being handled, by whom, and for what purpose. This right is particularly important when it comes to control of how States perform these activities.…
Content type: Long Read
“This is my personal opinion,” concedes Branko, a taxi driver in Skopje, the Republic of Macedonia's capital. “It was done by America to stop Putin building his gas pipe line through Macedonia.”
“This is just politics,” he advises, skeptically.
It's a common reaction to the wiretapping scandal in Macedonia. Beginning in February last year when opposition leader Zoran Zaev posted a series of wiretaps online that he called 'bombs' – they seemingly showed that for years the phone calls of some…
Content type: Press release
Governments across Central Asia have deployed advanced surveillance systems, including monitoring centres capable of spying on an entire country's communications, according to a new investigative report published today by Privacy International.
The comprehensive report, “Private Interests: Monitoring Central Asia”, contains personal accounts taken by Privacy International detailing how Central Asian governments use electronic surveillance technology to spy on activists and…
Content type: Press release
Privacy International, Reporters Without Borders, Digitale Gesellschaft, FIDH, and Human Rights Watch welcome news that the European Commission will move ahead and add specific forms of surveillance technology to the EU control list on dual use items, thus taking steps to finally hold companies to account who sell spy equipment and enable human rights abuses.
These important steps demonstrate that policymakers are beginning to wake up to the real harm that exists…
Content type: News & Analysis
While the initial disclosures by Edward Snowden revealed how US authorities are conducting mass surveillance on the world's communications, further reporting by the Guardian newspaper uncovered that UK intelligence services were just as involved in this global spying apparatus. Faced with the prospect of further public scrutiny and accountability, the UK Government gave the Guardian newspaper an ultimatum: hand over the classified documents or destroy them.
The Guardian decided that having the…
Content type: News & Analysis
Two new categories of surveillance systems were added into the dual-use goods and technologies control list of the Wassenaar Arrangement last week in Vienna, recognising for the first time the need to subject spying tools used by intelligence agencies and law enforcement to export controls.
While there are many questions that still need to be answered, Privacy International cautiously welcomes these additions to the Wassenaar Arrangement. Undoubtedly, these new…
Content type: News & Analysis
Privacy International is pleased to announce the Surveillance Industry Index, the most comprehensive publicly available database on the private surveillance sector.
Over the last four years, Privacy International has been gathering information from various sources that details how the sector sells its technologies, what the technologies are capable of and in some cases, which governments a technology has been sold to. Through our collection of materials and brochures at surveillance trade…
Content type: News & Analysis
Through our Big Brother Incorporated project, Privacy International over the past two years has been campaigning against the export of surveillance technologies by Western companies to repressive regimes. One of the seminal moments of this campaign was in 2011, when we partnered with Wikileaks to release the SpyFiles, which catalogued hundreds of brochures, presentations, marketing videos, and technical specifications exposing the inner workings of the international trade in…
Content type: News & Analysis
The government of Pakistan has repeatedly shown it is relentless when it comes to deploying measures to censor and spy on its own citizens. Today, a report released by Citizen Lab reveals another repressive tool being used to control and prevent information being accessed on the internet -- this time with help from the Canadian web-filtering company, Netsweeper.
According to the report "O Pakistan, We Stand on Guard for Thee: An Analysis of Canada-based Netsweeper’s Role in Pakistan’s…
Content type: News & Analysis
In order to lawfully conduct communications surveillance (“lawful interception”) in the U.S. and Western Europe, a law enforcement agency must seek authorisation from a court and produce an order to a network operator or internet service provider, which is then obliged to intercept and then to deliver the requested information. In contrast, Russian Federal Security Service operatives (FSB) can conduct surveillance directly by utilising lawful interception equipment called SORM.
SORM
SORM is…
Content type: News & Analysis
For the past 18 months, I've been investigating the export of surveillance technologies from Western countries to despotic regimes, but I never thought I'd see a democratic government proposing to install the kind of mass surveillance system favoured by Al-Assad, Mubarak and Gaddafi. Yet the Home Office's latest plans would allow the authorities unprecedented levels of access to the entire population's phone records, emails, browsing history and activity on social networking sites,…