Search
Content type: Press release
The European Court of Human Rights will hear a landmark case on surveillance tomorrow (7 November) as part of a challenge to the lawfulness of the UK’s surveillance laws and its intelligence agencies’ mass surveillance practices.
See the attached briefing for case background and historical information.
The case, described by campaigners as a “watershed moment for people’s privacy and freedom of expression across the world”, is being brought by Amnesty International, Liberty, Privacy…
Content type: Press release
Privacy International has filed a federal lawsuit seeking to compel disclosure of records relating to a 1946 surveillance agreement between the US, UK, Australia, Canada and New Zealand, known as the “Five Eyes alliance”.* We are represented by Yale Law School’s Media Freedom and Information Access Clinic (MFIA). The most recent publicly available version of the Five Eyes surveillance agreement dates from 1955. Our complaint was filed before the U.S. District Court for the District of Columbia…
Content type: News & Analysis
From unlocking a smartphone or getting through an airport, the use of an iris, fingerprint, or your face for identity verification is already widespread, and the market for it is set to rocket. While the technology is not new, its capability and uses are. As people, biometrics offers us much, but risks ultimately only serve data-hungry industries and government agencies: in the name of efficiency and security, it has the potential to bring chaos and vulnerability.
Obtaining reliable…
Content type: News & Analysis
The United States Department of Homeland Security (DHS) has contracted one of the world’s largest arms companies to manage a huge expansion of its biometric surveillance programme.
According to a presentation seen by Privacy International, the new system, known as Homeland Advanced Recognition Technology (HART), will scoop up a whopping 180 million new biometric transactions per year by 2022.
It will replace the Automated Biometric Identification System (IDENT), which currently stores…
Content type: Press release
Privacy International, in partnership with 30+ national human rights organisations, has today written to national intelligence oversight bodies in over 40 countries seeking information on the intelligence sharing activities of their governments.
Countries may use secret intelligence sharing arrangements to circumvent international and domestic rules on direct surveillance. These arrangements can also lead to the exchange of information that can facilitate human rights abuses,…
Content type: Long Read
This piece was originally published in Just Security in August 2017
We recently published an analysis in Lawfare of the United Kingdom’s surveillance framework as it relates to the proposed U.S.-U.K. agreement for cross-border law enforcement data requests. Implementing the U.S.-U.K. agreement is subject to passage of draft legislation proposed by the Justice Department to Congress in July 2016 (“U.S. DOJ legislation”), which will set standards that approved partners like the U.K.…
Content type: Long Read
This piece was originally published in Lawfare in July 2017.
The United Kingdom has been a key partner in the United States’ efforts to reform the process that law enforcement officials use to make cross-border requests for data. These efforts address both foreign governments’ requests for data stored in the U.S. and reciprocal requests by the U.S. government for data stored abroad. As part of these efforts, the U.S. and the U.K. have negotiated a draft bilateral agreement (“U…
Content type: Long Read
This piece was originally published in Lawfare in May 2017.
This post is part of a series written by participants of a conference at Georgia Tech in Surveillance, Privacy, and Data Across Borders: Trans-Atlantic Perspectives.
Cross-border law enforcement demands have become increasingly important to law enforcement in the digital age. Digital evidence in one jurisdiction—such as the United States—is often necessary to investigate a crime that has effects in another jurisdiction…
Content type: Long Read
Disclaimer: This piece was written in April 2017. Since publishing, further information has come out about Cambridge Analytica and the company's involvement in elections.
Recently, the data mining firm Cambridge Analytica has been the centre of tons of debate around the use of profiling and micro-targeting in political elections. We’ve written this analysis to explain what it all means, and the consequences of becoming predictable to companies and political campaigns.
What does…
Content type: News & Analysis
This week the United States Congress voted to strip away one of the country’s few safeguards of the right to privacy by repealing rules which would have limited internet service provider’s ability to use or share customers’ data without customers’ approval.
Meanwhile, last week, 6,500 kilometers away in Geneva, the United Nations Human Rights Council called on states to strengthen customers’ control over their data and develop legislation to address harm from the sale or corporate sharing of…
Content type: Press release
Privacy International Executive Director Dr Gus Hosein said:
“If today’s leaks are authenticated, they demonstrate what we’ve long been warning about government hacking powers — that they can be extremely intrusive, have enormous security implications, and are not sufficiently regulated. Insufficient security protections in the growing amount of devices connected to the internet or so-called “smart” devices, such as Samsung Smart TVs, only compound the problem, giving governments easier…
Content type: Long Read
Introduction
A growing number of governments around the world are embracing hacking to facilitate their surveillance activities. Yet hacking presents unique and grave threats to our privacy and security. It is far more intrusive than any other surveillance technique, capable of accessing information sufficient to build a detailed profile of a person, as well as altering or deleting that information. At the same time, hacking not only undermines the security of targeted systems, but also has…
Content type: Long Read
This piece was orignally published in Slate in February 2017
In 2015, the FBI obtained a warrant to hack the devices of every visitor to a child pornography website. On the basis of this single warrant, the FBI ultimately hacked more than 8,700 computers, resulting in a wave of federal prosecutions. The vast majority of these devices—over 83 percent—were located outside the United States, in more than 100 different countries. Now, we are in the midst of the first cases…
Content type: News & Analysis
This piece was written by PI Research Officer Edin Omanovic and originally appeared here.
Whatever happens over the next few years, if there is to be a storm, then it is best to prepare. It is essential that western liberal democratic societies are resilient enough to uphold their fundamental values.
One of the UK’s biggest security assets is one of its biggest security threats. The UK’s spies have access to and are allowed to exercise some of the most sophisticated electronic…
Content type: Press release
Privacy International has today written to government ministers, members of the opposition, and oversight bodies reaffirming its call for the UK government to reveal secret intelligence sharing arrangements with the United States.
The original UKUSA agreement — drafted shortly after World War II — allows UK and US agencies to share, by default, any raw intelligence, collection equipment, decryption techniques, and translated documents.
Current arrangements also allow US…
Content type: Long Read
This piece was written by Ashley Gorski, who is an attorney at the American Civil Liberties Union, and PI legal officer Scarlet Kim and originally appeared in The Guardian here.
In recent weeks, the Hollywood film about Edward Snowden and the movement to pardon the NSA whistleblower have renewed worldwide attention on the scope and substance of government surveillance programs. In the United States, however, the debate has often been a narrow one, focused on the…
Content type: Long Read
This week, Privacy International, together with nine other international human rights NGOs, filed submissions with the European Court of Human Rights. Our case challenges the UK government’s bulk interception of internet traffic transiting fiber optic cables landing in the UK and its access to information similarly intercepted in bulk by the US government, which were revealed by the Snowden disclosures. To accompany our filing, we have produced two infographics to illustrate the…
Content type: Press release
Key points
Privacy International, Liberty, Amnesty International, and seven other human rights organizations challenge UK mass surveillance and UK access to US mass surveillance at the European Court of Human Rights
This is the first case before the European Court of Human Rights to directly challenge UK and US mass surveillance revealed by the Snowden disclosures
National courts and oversight bodies have failed to rein in mass surveillance practices that impact hundreds of millions of…
Content type: News & Analysis
Privacy International is today proud to release the Surveillance Industry Index (SII), the world's largest publicly available educational resource of data and documents of its kind on the surveillance industry, and an accompanying report charting the growth of the industry and its current reach.
The SII, which is based on data collected by journalists, activists, and researchers across the world is the product of months of collaboration between Transparency Toolkit and Privacy…
Content type: Long Read
This piece originally appeared here.
On both sides of the Atlantic, we are witnessing the dramatic expansion of government hacking powers. In the United States, a proposed amendment to Rule 41 of the Federal Rules of Criminal Procedure would permit the government to obtain a warrant, in certain circumstances, to hack unspecified numbers of electronic devices anywhere in the world. Meanwhile, across the pond, the British Parliament is currently debating the Investigatory…
Content type: News & Analysis
Remember when the world didn't know what Prism was? Those were the days. While privacy advocates, civil libertarians, and technologists had suspected or posited the existence of an extensive surveillance regime operated by the U.S. government, few knew the details and the extent of the operation.
Undoubtedly, we know more now than we did a week ago about the National Security Agency's covert operations and how the agency routinely spies on nearly anyone in the world. The public, many…
Content type: Press release
The committee of data protection regulators across Europe, the Working Party 29, announced today its opinion on the current “Privacy Shield”. The Opinion is expected shortly, and based on the statements made by the Working Party chair in a press conference, we understand that the Working Party, while noting improvements from the annulled “Safe Harbor” agreement, has serious concerns about a range of aspects of the current "Privacy Shield" agreement with the U.S.
Overall they note the…
Content type: News & Analysis
Image source
This is a guest post by Zoë Blackler.
If you want to know how the UK came to be the most watched nation in the world, with CCTV on every corner, you need to go back to 1942: the now ubiquitous policing aid was first developed for use in missile testing by the German military.
Tear gas, GPS trackers, pain rays, and surveillance drones - technologies developed by the military for use against foreign enemies have a habit of finding their way into the hands…
Content type: News & Analysis
Should the European Union agree to legitimise trade with a country that refuses to adhere to European legal standards? This is the fundamental question that will be addressed at tomorrow’s meeting among European privacy regulators when they publish their opinion on the data-sharing agreement known as the ‘Privacy Shield’, the replacement to the failed ‘Safe Harbour’ agreement.
Background
Many of the world’s largest companies, such as Google and Facebook, store their customers’ data in…
Content type: News & Analysis
PI's full analysis can be read here
On 29 February 2016, the European Commission and the US government released the details of the proposed EU-U.S. “Privacy Shield”. The “Privacy Shield” replaces the now defunct so-called “Safe Harbor”.
The Privacy Shield is in fact a significant number of documents from various parts of the U.S. administration, which merely outline the existing, weak U.S. safeguards applicable to personal data of EU citizens. These documents are…
Content type: News & Analysis
We already know that in some countries, like the UK, governments are drafting laws to legalise and legitimise their incredible surveillance powers. In the U.S. we are seeing legislation that is using remarkably similar language on encryption and surveillance. The next phase of the cryptowars has openly begun.
Yesterday what is being called the Feinstein-Burr decryption Bill was introduced into the US Senate and leaked online. Whilst the short title ‘Compliance with Court Orders…
Content type: Long Read
The recent back and forth between Apple and the FBI over security measures in place to prevent unauthorised access to data has highlighted the gulf in understanding of security between technologists and law enforcement. Modern debates around security do not just involve the state and the individual, the private sector plays a very real role too. There are worrying implications for the safety and security of our devices. Today, a new company stepped in to this discussion -- though it had been…
Content type: News & Analysis
On Tuesday (16th February 2016) Apple posted a message to their customers stating that the company had been ordered by the FBI to “make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation.” Apple are currently opposing this order. A fascinating debate is currently playing out in the media about whether Apple should comply with or resist the FBI's demands.
Whatever…
Content type: News & Analysis
According to Snowden documents analysed by Privacy International, the Australian Signals Directorate had access to and used PRISM, a secret US National Security Agency program which provides access to user data held by Google, Facebook and Microsoft.
This is the third spy agency of the 'Five Eyes' alliance confirmed to have had secret access to Silicon Valley company data - an alliance whose rules and policies remain classified. Earlier this year, a British court ruled that GCHQ access to…
Content type: News & Analysis
Privacy is a human right, and needs very clear legal protections. 'Safe Harbor' was clear as mud and placed privacy rights globally at risk.
Today's European Court of Justice decision should be no surprise for industry or governments. For over fifteen years the U.S. Government has resisted implementing basic and effective privacy law and created absurd stopgap measures because U.S. Congress is incapable of acting upon what consumers and citizens have long asked for. The fact over 100 countries…