Search
Content type: News & Analysis
Today Apple announced a set of measures aimed at improving child safety in the USA. While well-intentioned, their plans risk opening the door to mass surveillance around the world while arguably doing little to improve child safety.
Among the measures, Apple has announced that it is to introduce “on-device machine learning” which would analyse attachments for sexually explicit material, send a warning, and begin scanning every photo stored on its customers’ iCloud in order to detect child…
Content type: News & Analysis
Maddie Stone, formally a Senior reverse engineer and tech lead on the Android security team, shockingly revealed a number of examples of how pre-installed apps on Android devices can undermine users privacy and security in her BlackHat USA talk in August 2019. The video of the talk only recently became available to the public in late December 2019.
The apps in question come preloaded on a device when it is purchased and often can't be removed. Stone reveals a litany of abuses carried out by…
Content type: News & Analysis
Picture Credit: US AID
US President Trump has been cutting aid to Central America, including a surprise cut of approximately $500m in aid to the “Northern Triangle” countries of El Salvador, Guatemala, and Honduras, apparently as punishment for “doing absolutely nothing” to prevent emigration to the US.
What remains of the funds is largely and deliberately being repurposed for spending on the US’s own security interests: indeed, one area which his…
Content type: Long Read
Image courtesy of Michael Coghlan
The long-speculated Facebook cryptocurrency is finally here! Libra!
Libra Association, an entity co-founded by Facebook, has announced the creation of a new cryptocurrency, Libra, "a simple global currency and financial infrastructure that empowers billions of people".
The white paper that outlines the rationale for the new currency makes a number of heady statements, some which anyone who cares about rights should commend -- and some which should…
Content type: News & Analysis
US Immigration and Customs Enforcement (ICE), the agency at the centre of carrying out President Trump’s “zero tolerance” approach to immigration enforcement and family separation, has for years been contracting a US surveillance company to intercept peoples’ communications across the United States.
The wide potential scope for the use of the powers raises concerns about their use for the real-time surveillance of people, families, and communities caught up in Trump’s immigration…
Content type: News & Analysis
The first half of 2018 saw two major privacy moments: in March, the Facebook/ Cambridge Analytica scandal broke, followed in May by the EU General Data Protection Regulation ("GDPR") taking effect. The Cambridge Analytica scandal, as it has become known, grabbed the attention and outrage of the media, the public, parliamentarians and regulators around the world - demonstrating that yes, people do care about violations of their privacy and abuse of power. This scandal has been one of…
Content type: Long Read
During the last World Economic Forum in Davos, the CEO of Microsoft joined the chorus of voices calling for new global privacy rules, saying the following in regard to the new European General Data Protection Regulation (GDPR):
“My own point of view is that it's a fantastic start in treating privacy as a human right. I hope that in the United States we do something similar, and that the world converges on a common standard."
We have come a long way. From tech companies fighting and…
Content type: News & Analysis
Federal law enforcement is deploying powerful computer hacking tools to conduct domestic criminal and immigration investigations.
By Alex Betschen, Student Attorney, Civil Liberties & Transparency Clinic, University at Buffalo School of Law
Hacking by the government raises grave privacy concerns, creating surveillance possibilities that were previously the stuff of science fiction. It also poses a security risk, because hacking takes advantage of unpatched vulnerabilities in our…
Content type: Press release
FOR IMMEDIATE RELEASE
December 21, 2018
CONTACTS:
Alex Betschen, Civil Liberties & Transparency Clinic, [email protected], 716–531–6649
Colton Kells, Civil Liberties & Transparency Clinic, [email protected], 585–766–5119
Abdullah Hasan, ACLU, [email protected], 646–905–8879
NEW YORK — Privacy International, the American Civil Liberties Union, and the Civil Liberties & Transparency Clinic of the University at Buffalo School of Law filed a lawsuit today…
Content type: News & Analysis
Photo credit: US Immigration and Customs Enforcement
The trial of Mexican drug lord Joaquin “El Chapo” Guzman started in New York back in November 2018. But last week, the jurors were presented with a trove of new key evidence: dozens of text messages exchanged between Guzman, his wife, and his mistresses.
The reason behind this set of revelations? Guzman had been spying on his wife and mistresses, using publicly-available surveillance software called FlexiSpy. Once installed on his targets…
Content type: News & Analysis
Taylor Swift may be tracking you, particularly if you were at her Rose Bowl show in May.
According to an article published by Vanity Fair, at Swift’s concert at the California stadium, fans were drawn to a kiosk where they could watch rehearsal clips. At the same time – and without their knowledge - facial-recognition cameras were scanning them, and the scans were then reportedly sent to a “command post” in Nashville, where they were compared to photos of people who are known…
Content type: News & Analysis
Our team wanted to see how data companies that are not used to being in the public spotlight would respond to people exercising their data rights. You have the right under the EU General Data Protection Regulation ("GDPR") to demand that companies operating in the European Union (either because they are based here or target their products or services to individuals in the EU) delete your data within one month. We wrote to seven companies and requested that they delete our data, and we've made…
Content type: News & Analysis
Image Source
On 10 October 2018, the US Senate Committee on Commerce, Science, and Transportation, will convene a hearing titled “Consumer Data Privacy: Examining Lessons From the European Union’s General Data Protection Regulation and the California Consumer Privacy Act".
The Senate will hear from:
Dr. Andrea Jelinek, Chair, European Data Protection Board
Mr. Alastair Mactaggart, Board Chair, Californians for Consumer Privacy
Ms. Laura Moy, Executive Director and Adjunct…
Content type: News & Analysis
This piece was originally published on Just Security.
Ten years ago, an FBI official impersonated an Associated Press reporter to lure and track a teenager suspected of sending in prank bomb threats to his school. To find him, the FBI agent, posing as a reporter, sent the teenager links to a supposed story he was working on, but the links were infested with malware that once clicked on quickly exposed the teen’s location. More recently, the FBI has seized and modified websites so…
Content type: News & Analysis
Creative Commons Photo Credit: Source
Just about everyone in Washington has found something to dislike about the tech industry: Democrats especially, are worried about foreign interference in the 2016 election — meanwhile some Republicans are more concerned about bias against conservatives of platforms and on top of it all President Trump has been tweeting about antitrust and competition.
Privacy International is a vocal critic of data exploitation more generally, and the systemic…
Content type: News & Analysis
Around the world, from North America to Europe and Asia, governments are starting to roll out smart meters. While the technology promises increased energy efficiency through greater consumer control over energy consumption, smart meters also raise serious privacy concerns. Smart meters collect energy usage data at high frequencies - typically every five, fifteen or 30 minutes. That level of granularity reveals how much electricity is being used in a home and when, which in turn can paint an…
Content type: News & Analysis
This piece originally appeared here.
Creative Commons Photo Credit: Source
Tech competition is being used to push a dangerous corporate agenda.
High-tech industries have become the new battlefield as the United States and China clash over tariffs and trade deficits. It’s a new truism that the two countries are locked in a race for dominance in artificial intelligence and that data could drive the outcome.
In this purported race for technological high ground, the argument often goes, China…
Content type: Long Read
Creative Commons Photo Credit: Source
In the midst of continued widespread public outrage at the US government’s brutal ‘zero-tolerance’ policy around immigration – multiple data and analytics companies have quietly avoided answering questions about their role in feeding the US Immigration and Customs Enforcement (ICE) agency’s data backbone. These companies are bidding to work with an agency that has time and time again shown itself to be a brutal and problematic.
Privacy International…
Content type: Long Read
Privacy International (PI) has today released a new report, 'Teach 'em to Phish: State Sponsors of Surveillance', showing how countries with powerful security agencies are training, equipping, and directly financing foreign surveillance agencies.
Spurred by advances in technology, increased surveillance is both powered by and empowering rising authoritarianism globally, as well as attacks on democracy, rights, and the rule of law.
As well as providing a background to the issue, the report…
Content type: Press release
Privacy International has today released a report that looks at how powerful governments are financing, training and equipping countries — including authoritarian regimes — with surveillance capabilities. The report warns that rather than increasing security, this is entrenching authoritarianism.
Countries with powerful security agencies are spending literally billions to equip, finance, and train security and surveillance agencies around the world — including authoritarian regimes. This is…
Content type: Press release
Gus Hosein, Executive Director of Privacy International:
The US federal government's cruel zero tolerance immigration policy has received widespread and international condemnation. In addition to the policy's clear moral failure it is also in violation of the government's legal obligations under the International Covenant on Civil and Political Rights (ICCPR), which includes protecting families from unnecessary interference by the government.
The US government needs to understand that…
Content type: Press release
On the five year anniversary of NSA whistleblower Edward Snowden leaking a massive trove of classified information that has since transformed our understanding of government mass surveillance, Dr Gus Hosein, Executive Director of Privacy International said:
“Is it enough for your government to tell you ‘we’re keeping you safe, but we’re not going to tell you how’? Edward Snowden asked himself this profoundly important question five years ago. We’re thankful he did.
His decision to expose the…
Content type: Long Read
This piece was originally published in Lawfare in April 2018
The United States is party to a number of international intelligence sharing arrangements—one of the most prominent being the so-called “Five Eyes” alliance. Born from spying arrangements forged during World War II, the Five Eyes alliance facilitates the sharing of signals intelligence among the U.S., the U.K., Australia, Canada and New Zealand. The Five Eyes countries agree to exchange by default all signals intelligence…
Content type: News & Analysis
Simply put, the National Security Agency is an intelligence agency. Its purpose is to monitor the world's communications, which it traditionally collected by using spy satellites, taps on cables, and placing listening stations around the world.
In 2008, by making changes to U.S. law, the U.S. Congress enabled the NSA to make U.S. industry complicit in its mission. No longer would the NSA have to rely only on international gathering points. It can now go to domestic companies who hold massive…
Content type: Long Read
“FISA section 702 reauthorisation” might not sound like it matters very much to very many people, but it’s pretty dramatic: in short, last month US lawmakers rejected a bill which would have provided protections for US citizens – constitutionally protected against being spied on by US spy agencies – from being spied on, and instead voted to extend their powers to do so.
In the fall out, it’s worth considering just why such mass surveillance powers are such a big issue, how the promise of…
Content type: News & Analysis
This post was written by PI Policy Officer Lucy Purdon.
In 1956, US Presidential hopeful Adlai Stevenson remarked that the hardest part of any political campaign is how to win without proving you are unworthy of winning. Political campaigning has always been a messy affair and now the online space is where elections are truly won and lost. Highly targeted campaign messages and adverts flood online searches and social media feeds. Click, share, repeat; this is what political engagement looks…
Content type: News & Analysis
7 July 2016
It has been said is that we pay for free services with our personal data. Now, the Privacy Shield exponentially expands this truth and we are paying for the cost of U.S. political dysfunction combined with EU complacency with our privacy. More than four months after the first EU-US Privacy Shield was published on 29 February 2016, a new version has been leaked. Remarkably, it is expected to be adopted.
Four months, two opinions by group of EU data protection…
Content type: News & Analysis
The elections in our midst here, there, and everywhere are increasingly resulting in governments who introduce policies that result in leaps backwards for dignity, equality, civil liberties, and the rule of law. Whether it is Poland or the Philippines, governments are overriding essential safeguards.
This week Britain’s proposed surveillance legislation took another step toward normalising mass surveillance. The United States of America has long promoted mass surveillance and maintains its…
Content type: Long Read
This piece was originally published in Just Security in November 2017.
The upcoming expiration of Section 702 of the Foreign Intelligence Surveillance Act (FISA) has launched a fresh wave of debate on how the statute’s “backdoor search loophole” allows the U.S. government to access Americans’ communications by searching information gathered on foreign intelligence grounds without a warrant. But while discussion about domestic information sharing is important, a critical…
Content type: News & Analysis
For further information on timeline and case history, read this briefing.
Arguments
The argument were based on the written submissions of the parties. The oral statements summarised key points in these submissions.
The submissions can be found on PI’s website under Legal Action. In terms of today’s proceedings (these are now available through webcast)
Counsel for the UK Government, James Eadie QC started off proceedings, his opening arguments were: 1) The issues are of…