Search
Content type: Long Read
Introduction
A growing number of governments around the world are embracing hacking to facilitate their surveillance activities. Yet hacking presents unique and grave threats to our privacy and security. It is far more intrusive than any other surveillance technique, capable of accessing information sufficient to build a detailed profile of a person, as well as altering or deleting that information. At the same time, hacking not only undermines the security of targeted systems, but also has…
Content type: Long Read
This piece was orignally published in Slate in February 2017
In 2015, the FBI obtained a warrant to hack the devices of every visitor to a child pornography website. On the basis of this single warrant, the FBI ultimately hacked more than 8,700 computers, resulting in a wave of federal prosecutions. The vast majority of these devices—over 83 percent—were located outside the United States, in more than 100 different countries. Now, we are in the midst of the first cases…
Content type: Press release
Caroline Wilson Palow, General Counsel at Privacy International
“The passage of the Investigatory Powers Act is a major blow to the privacy of people in the UK and all over the world. It sets a world-leading precedent, but not one of which the Government should be proud. Instead of reining in the unregulated mass surveillance practices that have for years been conducted in secret and with questionable legal authority, the IPA now enshrines them in law. Widespread surveillance is an antithesis…
Content type: News & Analysis
Privacy can be seen as a reflex of innovation. One of the seminal pieces on the right to privacy as the 'right to be let alone emerged in response to the camera and its use by the tabloid media. Seminal jurisprudence is in response to new surveillance innovations... though often with significant delays.
While one approach would be to say that privacy is a norm and that with modern technologies the norm must be reconsidered and if necessary, abandoned; I think there’s an interesting idea around…
Content type: Long Read
This piece originally appeared here.
On both sides of the Atlantic, we are witnessing the dramatic expansion of government hacking powers. In the United States, a proposed amendment to Rule 41 of the Federal Rules of Criminal Procedure would permit the government to obtain a warrant, in certain circumstances, to hack unspecified numbers of electronic devices anywhere in the world. Meanwhile, across the pond, the British Parliament is currently debating the Investigatory…
Content type: News & Analysis
Last month, the UK Information Commissioner's Office announced a “private investigator crackdown”, citing concerns that private investigators were using hacking techniques to gain access to personal information.
The use of dodgy private investigators and illegal hacking by private investigators in the UK has attracted significant media attention in the wake of the phone hacking scandals, which involved the use of such private investigators by major newspapers.
The sector isn't…
Content type: Press release
Privacy International, the leading global privacy rights NGO, has today filed a Judicial Review at the UK High Court, challenging the Investigatory Powers Tribunal's (IPT) decision that the Government can issue general hacking warrants. This decision means that British intelligence agency GCHQ can continue to hack into the computers and phones of broad classes of people - including those residing in the UK. The Investigatory Powers Bill, currently being debated in Parliament, seeks to…
Content type: Long Read
The recent back and forth between Apple and the FBI over security measures in place to prevent unauthorised access to data has highlighted the gulf in understanding of security between technologists and law enforcement. Modern debates around security do not just involve the state and the individual, the private sector plays a very real role too. There are worrying implications for the safety and security of our devices. Today, a new company stepped in to this discussion -- though it had been…
Content type: Report
Privacy International's new investigation (available in English and in Arabic), 'THE PRESIDENT'S MEN? Inside the Technical Research Department', sheds light on the Technical Research Department, a secret unit of the Egyptian intelligence infrastructure that has purchased surveillance equipment from German/Finnish manufacturer of monitoring centres for telecommunication surveillance, Nokia Siemens Networks, and Italian malware manufacturer, Hacking Team.
Content type: Long Read
It was summer 2014 when we first came across the acronym TRD while sifting through documents from the company Nokia Siemens Networks (Nokia) that had been leaked to Privacy International. The acronym was explained in the documents: it stood for Technical Research Department.
What we learned from the leak is the TRD had been purchasing an interception management system, a monitoring centre and an X25 network, a legacy technology allowing dial-up internet access. The first two technologies gave…
Content type: Press release
In response to the Investigatory Powers Tribunal (IPT) ruling today that GCHQ's hacking is lawful, we have issued the following press statement:
"We are disappointed by the IPT’s judgment today, which has found Government hacking lawful based on a broad interpretation of a law dating back to 1994, when the internet and mobile phone technology were in their infancy.
Until we brought this case, GCHQ would neither confirm nor deny that it was they were engaging in mass hacking of…
Content type: Long Read
The Investigatory Powers Tribunal (“IPT”) today held that GCHQ hacking of computers, mobile devices and networks is lawful, wherever it occurs around the world. We are disappointed that the IPT has not upheld our complaint and we will be challenging its findings.
Our complaint is the first UK legal challenge to state-sponsored hacking, an exceptionally intrusive form of surveillance. We contended that GCHQ hacking operations were incompatible with democratic principles and human rights…
Content type: Press release
Today’s report by the Joint Committee on the Investigatory Powers Bill is the third committee report that concludes that the Home Office has failed to provide a coherent surveillance framework.
The Joint Committee on the Investigatory Powers Bill today published a 198 page report following a short consultation period between November and January. Their key findings are that:
- the definitions in the bill need much work, including a meaningful and comprehensible…
Content type: Press release
Documents released today confirm GCHQ, the UK intelligence agency, is hacking computers in the United Kingdom without individual warrants. The documents contain previously unknown details and defenses of GCHQ's use of "thematic warrants" to hack. The legal challenge in which these documents are being disclosed was brought by Privacy International and seven internet and communications service providers from around the world in response to disclosures made by Edward Snowden.…
Content type: News & Analysis
Despite Wednesday's publication of the Investigatory Powers Bill being trailed as world leading legislation that would balance security and privacy, what the Government is actually seeking is a mandate for mass surveillance. This is a new Snoopers' Charter and we must oppose many of its most virulent elements.
The true debate on surveillance can now begin. After years of downplaying, obscuring, and denying the Snowden revelations, the Government has finally joined the conversation about the…
Content type: Report
Privacy International's new report, For God and My President: State Surveillance in Uganda, exposes the secret surveillance operation and the government's attempts to buy further powerful surveillance tools, including a national communications monitoring centre and intrusion malware, in the absence of a rigorous legal framework governing communications surveillance
Content type: Long Read
We hate to say we told you so.
Privacy International has for years warned that powerful surveillance technologies are used to facilitate serious human rights abuses with insufficient technological and legal safeguards against abuse.
We now have the most solid evidence to date that we were right. Our latest investigation uncovers disturbing evidence that substantiates our long held concerns.
Today Privacy International publishes an investigation (PDF) into communications surveillance in…
Content type: Report
Privacy International briefing for the Italian Government on Hacking Team's surveillance exports
Content type: News & Analysis
Investigations by Privacy International in co-operation with VICE Motherboard, reveal that Hacking Team has sold its Remote Control System to the US Drug Enforcement Agency and US military via a front company based in the US.
The investigation catalogues what is known about Hacking Team’s intrusive spyware that can remotely switch on the microphone on mobile phones, activate webcams, as well as modify and/or extract data from the computer or phone itself. Whether the export was corrected…
Content type: Report
In this report we present four stories of Moroccan citizens placed under surveillance and the effect it has had on their lives and the lives of their families.
We feel that these stories say a lot about the current context of surveillance in Morocco. We hope they will serve as a medium to foster a much-needed public debate. We also hope that this debate will extend beyond Morocco as we all consider the dangers of unregulated surveillance and surveillance technology around the world.
Content type: News & Analysis
Privacy International today is releasing a report about surveillance in Morocco, featuring four interviews with individuals who have been subjected to state surveillance. Stepping away from our traditional approach to documenting surveillance, we decided to give a platform to the people who have been targeted.
The interviews reveal a multi-layered oppressive system, where law enforcement agents film the keyhole of your door and interrogate your neighbours where; nationalist hacker groups get…
Content type: Advocacy
On 20 March 2015, Privacy International and Open Rights Group submitted comments on the UK Government's draft Equipment Interference Code of Practice.
The UK has been hacking for over a decade, yet the release of the draft Code of Practice is the first time the UK intelligence services have sought public authorisation for their activities. Indeed, it is the first time the intelligence services have publicly acknowledged they engage in hacking.
Unfortunately, the draft Code of…
Content type: Press release
The British Government has admitted its intelligence services have the broad power to hack into personal phones, computers, and communications networks, and claims they are legally justified to hack anyone, anywhere in the world, even if the target is not a threat to national security nor suspected of any crime.
These startling admissions come from a government court document published today by Privacy International. The document was filed by the government in response to two …
Content type: News & Analysis
In a recent trip to Colombia, Privacy International learned that the Colombian mobile phone network does not use any form of encryption. In this sense, Colombian communications are stuck in the 1990s, where cryptography was not yet widespread, and was still tightly controlled by governments who feared its spread could threaten their capabilities to conduct surveillance.
The issue of encryption on mobile phones though is not unique to Colombia. The Director of the FBI has been on a media blitz…
Content type: News & Analysis
The following piece by Privacy International Legal Officer Adriana Edmeades appeared in openDemocracy:
In 2012, Citizen Lab, a think-tank operating out of the Munk School of Global Affairs at the University of Toronto, came across evidence suggesting that Gamma International, a multinational technology corporation with offices across the world, sold a form of malware called FinFisher to Bahrain. Bahraini activists, amongst others, were seriously concerned: FinFisher gives its operator complete…
Content type: News & Analysis
Jaafar Al Hasabi, Mohammed Moosa Abd-Ali Ali, and Saeed Al-Shehabi each fled Bahrain for the United Kingdom with one goal: to be safe.
These men, activists in the pro-democracy movement in Bahrain, were variously subject to torture, arbitrary detention, harassment, and psychological trauma in their home country. They thought coming to the UK, and living in exile, would at least mean they would be outside the reach of the Bahraini government.
Despite the nearly 4,000 miles between their homes…
Content type: News & Analysis
In a disturbing move to broaden its mass surveillance powers, the government of Australia is pushing forward a bill that undermines fundamental rights, including the right to privacy. Disappointingly, this comes mere months after civil society and citizens alike expressed outrage over the Australian intelligence service’s offer to share deeply personal information about ordinary citizens with its Five Eyes partners.
The Bill, which amends the Australian…
Content type: News & Analysis
We have learnt a lot in the last year about the dirty games GCHQ and NSA are playing to infiltrate the networks, tools and technologies we all use to communicate. This includes forcing companies to handover their customers’ data under secret orders, and secretly tapping fibre optic cablesbetween the same companies’ data centers.
Not content with that, we know now GCHQ are targeting companies systems administrators, exploiting the routers and switches in their networks to…