Search
Content type: Long Read
Written by: Centre for Internet and Society
This guest piece was written by representatives of the Centre for Internet and Society (CIS). It does not necessarily reflect the views or position of Privacy International.
Introduction
As part of the State of the Surveillance project, CIS conducted a review of surveillance law, policy, projects, and trends in India. Below we provide a snap shot of key legal provisions governing surveillance in India and touch on…
Content type: Long Read
“This is my personal opinion,” concedes Branko, a taxi driver in Skopje, the Republic of Macedonia's capital. “It was done by America to stop Putin building his gas pipe line through Macedonia.”
“This is just politics,” he advises, skeptically.
It's a common reaction to the wiretapping scandal in Macedonia. Beginning in February last year when opposition leader Zoran Zaev posted a series of wiretaps online that he called 'bombs' – they seemingly showed that for years the phone calls of some…
Content type: Long Read
The recent back and forth between Apple and the FBI over security measures in place to prevent unauthorised access to data has highlighted the gulf in understanding of security between technologists and law enforcement. Modern debates around security do not just involve the state and the individual, the private sector plays a very real role too. There are worrying implications for the safety and security of our devices. Today, a new company stepped in to this discussion -- though it had been…
Content type: Report
Privacy International notes New Zealand’s written replies to the list of issues prior to reporting in relation to the New Zealand’s laws, policies and practices related to interception of personal communications.
A review of the security and intelligence legislation is currently underway in accordance with the Intelligence and Security Committee Act. It is expected that the Parliament will consider the review in 2016. Hence this represents a significant opportunity to amend the current…
Content type: Report
The right to privacy is a qualified right. Gender is not and cannot be its qualification.
For this year’s International Women’s Day, the Privacy International Network is sharing some of its successes as well as the challenges and opportunities we face in at the intersection of gender issues and the right to privacy. Click here to see this feature.
Interferences and violations of the right to privacy, as described in the UN Declaration of Human Rights, affect society as a whole. However,…
Content type: Long Read
Today, Privacy International is publishing the result of a global effort to benchmark surveillance policies and practices in the countries that are part of the Privacy International Network. We’re calling it the ‘State of Surveillance’.
We designed a survey of questions based on some key issues: statistics about the communications infrastructure of the country; what civil society organisations and groups that analyse privacy issues; the international and domestic legal framework regulating…
Content type: Report
Privacy International's new investigation (available in English and in Arabic), 'THE PRESIDENT'S MEN? Inside the Technical Research Department', sheds light on the Technical Research Department, a secret unit of the Egyptian intelligence infrastructure that has purchased surveillance equipment from German/Finnish manufacturer of monitoring centres for telecommunication surveillance, Nokia Siemens Networks, and Italian malware manufacturer, Hacking Team.
Content type: Long Read
It was summer 2014 when we first came across the acronym TRD while sifting through documents from the company Nokia Siemens Networks (Nokia) that had been leaked to Privacy International. The acronym was explained in the documents: it stood for Technical Research Department.
What we learned from the leak is the TRD had been purchasing an interception management system, a monitoring centre and an X25 network, a legacy technology allowing dial-up internet access. The first two technologies gave…
Content type: Long Read
The Investigatory Powers Tribunal (“IPT”) today held that GCHQ hacking of computers, mobile devices and networks is lawful, wherever it occurs around the world. We are disappointed that the IPT has not upheld our complaint and we will be challenging its findings.
Our complaint is the first UK legal challenge to state-sponsored hacking, an exceptionally intrusive form of surveillance. We contended that GCHQ hacking operations were incompatible with democratic principles and human rights…
Content type: Long Read
Written by Eva Blum-Dumontet
A recent case of lèse-majesté in Thailand (speaking ill of the monarchy) is a worrying example of how Western companies do not just work with governments that fall short of international human rights standards, but can actually facilitate abuses of human rights.
Our investigation on the trial of Katha Pachachirayapong — accused of spreading rumours on the ill-health of the King Bhumibol Adulyadej, thereby causing sharp falls in the Thai stock market — reveal the…
Content type: Report
In response to the Government publishing proposed new surveillance powers in November 2015, Privacy International submitted this highly detailed analysis to the Science and Technology Committee on the Draft Investigatory Powers Bill in November 2015. Our report proposes significant changes across the Bill to ensure better privacy protection while still enabling public bodies to have the powers they need.
Content type: Report
Privacy International's new report, For God and My President: State Surveillance in Uganda, exposes the secret surveillance operation and the government's attempts to buy further powerful surveillance tools, including a national communications monitoring centre and intrusion malware, in the absence of a rigorous legal framework governing communications surveillance
Content type: Long Read
We hate to say we told you so.
Privacy International has for years warned that powerful surveillance technologies are used to facilitate serious human rights abuses with insufficient technological and legal safeguards against abuse.
We now have the most solid evidence to date that we were right. Our latest investigation uncovers disturbing evidence that substantiates our long held concerns.
Today Privacy International publishes an investigation (PDF) into communications surveillance in…
Content type: Report
Over a dozen international companies are supplying powerful communications surveillance technology in Colombia. Privacy International examines the actors across the world involved in facilitating state surveillance.
The report is available in English and Spanish.
Content type: Report
For nearly two decades, the Colombian government has been expanding its capacity to spy on the private communications of its citizens. Privacy International's investigation reveals the state of Colombia's overlapping, unchecked systems of surveillance, including mass surveillance, that are vulnerable to abuse.
See the report in English and Spanish.
Content type: Report
The Pakistani government has significantly expanded its communication interception activities. This Privacy International report covers the intelligence services plan to capture all IP-traffic in Pakistan and other initiatives, pointing to gaps in the laws governing surveillance.
Content type: Advocacy
This stakeholder report is a submission by Privacy International (PI) and the Right2Know Campaing. PI is a human rights organisation that works to advance and promote the right to privacy and fight surveillance around the world. PI wishes to bring concerns about the protection and promotion of the right to privacy in South Africa before the Human Rights Committee for consideration in South Africa's upcoming review.
Content type: Report
This report is the result of a collaboration between Privacy International, ARTICLE 19, and the International Human Rights Clinic (IHRC) at Harvard Law School. IHRC conducted desk research as well as interviews with individuals working in civil society organisations in the countries examined. It explores the impact of measures to restrict online encryption and anonymity in four particular countries – the United Kingdom, Morocco, Pakistan and South Korea.
Content type: Report
This briefing, published on the two-year anniversary of the publication of the first Snowden revelations, warns that governments are looking to maintain and expand mass surveillance, despite the practice being condemned as a human rights violation by courts, parliaments and human rights bodies. It comes on the heels of the adoption of the USA Freedom Act by the US Congress, a solitary and limited example of legislative rollback of surveillance powers since Edward Snowden's revelations began. In…
Content type: Long Read
Few revelations have been been as troubling for the right to privacy as uncovering the scope of the Five Eyes alliance. The intelligence club made up of Australia, Canada, New Zealand, the United Kingdom and the United States has integrated its collection efforts, staff, bases, and analysis programs. Yet the legal rulebook governing how the agencies ensure the most comprehensive joint surveillance effort in the history of mankind remains secret.
The little that is known suggests a…
Content type: Report
Privacy International briefing for the Italian Government on Hacking Team's surveillance exports
Content type: Report
In this report we present four stories of Moroccan citizens placed under surveillance and the effect it has had on their lives and the lives of their families.
We feel that these stories say a lot about the current context of surveillance in Morocco. We hope they will serve as a medium to foster a much-needed public debate. We also hope that this debate will extend beyond Morocco as we all consider the dangers of unregulated surveillance and surveillance technology around the world.
Content type: Long Read
As Privacy International celebrates Friday's victory against Britain’s security services - the first such victory this century - we cannot help but feel the success is bittersweet.
After all, we may have convinced the Investigatory Powers Tribunal that GCHQ was acting unlawfully in accessing NSA databases filled with billions of emails and messages, but with a few technical adjustments the intelligence services have managed to insure themselves against any further challenge, at least in…
Content type: Long Read
Modern day government surveillance is based on the simple concept of “more is more” and “bigger is better”. More emails, more text messages, more phone calls, more screenshots from Skype calls. The bigger the haystack, the more needles we can find.
Thanks to Edward Snowden, we know that this fundamental idea drives intelligence agencies like the NSA and GCHQ - the desire to collect it all, to generate gigantic haystacks through which to trawl. In the almost two years since the first of Snowden…
Content type: Long Read
Many people imagine intelligence sharing to be a practice whereby men in trench coats silently slide manilla envelopes containing anonymous tip-offs or intelligence reports marked TOP SECRET across tables in smoke-filled rooms.
While such practices certainly exist, they represent only a tiny slice of intelligence sharing activities, and are vastly overshadowed by the massive exchange of bulk unanlysed (raw) intelligence data that takes place between the UK and its Five Eyes allies.…
Content type: Report
In societies that are in the process of transition towards democracy, democratic control of intelligence organisations is both an indispensable requirement and a pressing need. In many cases, the most serious human rights violations committed by dictatorial governments were intrinsically linked to draconian surveillance and control systems. Systematic spying on trade unions, students and dissident groups was a common feature of 20th-century dictatorships. The persistent violation of citizens’…
Content type: Report
“Private Interests: Monitoring Central Asia” is a 96-page report detailing its findings from an extensive investigation into electronic surveillance technologies in Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan.
The report brings together the findings of PI's team of investigative researchers, consultants, and technical, legal and policy experts, and is the outcome of consultations with confidential sources, regional experts, individuals who have been targeted by…
Content type: Long Read
Privacy International in October 2014 made a criminal complaint to the National Cyber Crime Unit of the National Crime Agency, urging the immediate investigation of the unlawful surveillance of three Bahraini activists living in the UK by Bahraini authorities using the intrusive malware FinFisher supplied by British company Gamma.
Moosa Abd-Ali Ali, Jaafar Al Hasabi and Saeed Al-Shehabi, three pro-democracy Bahraini activists who were granted asylum in the UK, suffered variously…
Content type: Long Read
Bad analogies about surveillance technology pervade newspaper reports, politicians’ speeches, and legal arguments. While it’s natural to want simple explanations to understand complex technology, it does us a disservice when governments, the media, or the courts mislead us through analogies that are inadequate. It is even worse if these analogies are used as a basis for policy change.
Privacy International’s legal challenge against GCHQ’s mass surveillance rests…
Content type: Long Read
Today, Privacy International lodged a legal challenge to GCHQ's extensive and intrusive hacking of personal computers and devices. Below, we answer a few questions about the law underlying our complaint, and why it matters.
Is hacking legal?
As a result of the Snowden revelations, we have learned that GCHQ, often in partnership with the NSA, has been using malicious software to intrude upon our computers and mobile devices.
This type of activity, often called "hacking," is a…