Search
Content type: Advocacy
On the 17 January 2023, the UK Home Secretary appointed Lord David Anderson KBE KC to carry out an independent review of the Investigatory Powers Act 2016.
The Investigatory Powers Act 2016 provides a legal framework for the use of investigatory powers by the UK security and intelligence agencies, law enforcement and other relevant public bodies. These powers include the interception of communications; the retention and acquisition of communications data and; equipment interference for…
Content type: Report
End-to-end encryption (E2EE) contributes significantly to security and privacy. For that reason, PI has long been in favour of the deployment of robust E2EE.
Encryption is a way of securing digital communications using mathematical algorithms that protect the content of a communication while in transmission or storage. It has become essential to our modern digital communications, from personal emails to bank transactions. End-to-end encryption is a form of encryption that is even more private…
Content type: Advocacy
Despite repeated recommendations by the UN Human Rights Council and the UN General Assembly to review, amend or enact national laws to ensure respect and protection of the right to privacy, national laws are often inadequate and do not regulate, limit or prohibit surveillance powers of government agencies as well as data exploitative practices of companies.
Even when laws are in place, they are seldom enforced. In fact PI notes how it is often only following legal challenges in national or…
Content type: Report
This briefing takes a look at the private intelligence industry, a collection of private detectives, corporate intel firms, and PR agencies working for clients around the world that have made London their hub.
Often staffed by ex-spooks, and promising complete secrecy, little is known about them. But reports over the years have exposed their operations, including things like hacking and targeting of anti-corruption officials, spying on peaceful environment activists, and running fake '…
Content type: Video
Links
The Enablers by the Bureau of Investigative Journalism
PI's report
Submit your podcast questions
Sign up to our mailing list
Places to listen
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify | Apple podcasts | Castbox | Google podcasts | Overcast | Stitcher | Pocket Casts | Peertube | Youtube | Soundcloud | Podbean | Podcast Republic | Breaker | Podcast Addict | Deezer | and more...
Content type: News & Analysis
After almost 20 years of presence of the Allied Forces in Afghanistan, the United States and the Taliban signed an agreement in February 2020 on the withdrawal of international forces from Afghanistan by May 2021. A few weeks before the final US troops were due to leave Afghanistan, the Taliban had already taken control of various main cities. They took over the capital, Kabul, on 15 August 2021, and on the same day the President of Afghanistan left the country.
As seen before with regime…
Content type: Long Read
The Grand Chamber of the European Court of Human Rights ruled that the UK government’s historical mass interception program violates the rights to privacy and freedom of expression. The Court held that the program “did not contain sufficient “end-to-end” safeguards to provide adequate and effective guarantees against arbitrariness and the risk of abuse.” As a result the Court ruled that UK law "did not meet the “quality of law” requirement and was therefore incapable of keeping the “…
Content type: Video
This case was made possible because of Edward Snowden’s disclosures in 2013, and through the combined work of Big Brother Watch, American Civil Liberties Union, Amnesty International, Bytes for All, Canadian Civil Liberties Association, Egyptian Initiative for Personal Rights, Hungarian Civil Liberties Union, Irish Council for Civil Liberties, Legal Resources Centre and Liberty.
Content type: Explainer
Where are my communications stored?
Text messages/phone calls: Traditional cellphone communications happen over the cellular network. You usually access those with the text message and phone call apps that are provided as standard on your phone. While phone calls aren’t stored anywhere, text messages are stored locally on your and the recipient’s devices. They might also be temporarily stored by the network provider.
Messaging apps: Messaging platforms enable fairly secure communication over…
Content type: Advocacy
This report is presented by TEDIC (Technology and Community Association) and Privacy International (PI). TEDIC is a non-governmental, non-profit organization, based in Asunción, that promotes and defends human rights on the Internet and extends its networking to Latin America. PI is a London based human rights organization that works globally at the intersection of modern technologies and rights.
TEDIC and PI wish to express some concerns about the protection and promotion of the right to…
Content type: Report
Human rights defenders across the world have been facing increasing threats and harms as result of the use of digital and technological tools used by governments and companies which enable the surveillance, monitoring and tracking of individuals and communities. They are continuously at risk of violence, intimidation and surveillance as a direct consequence of the work they do. Such surveillance has been shown to lead to arbitrary detention, sometimes to torture and possibly to extrajudicial…
Content type: Video
On 6 February 2021, the Constitutional Court of South Africa in a historic judgment declared unconstitutional years of secret and unchecked surveillance by South African authorities against millions of people - irrespective of whether they reside in South Africa.
The Court powerfully placed the judgment in historical context:
The constitutionally protected right to privacy seeks to be one of the guarantees that South Africa will not again act like the police state that it was under apartheid…
Content type: Long Read
What’s the ruling all about?
The Constitutional Court of South Africa in a historic judgment declared that bulk interception by the South African National Communications Centre is unlawful and invalid. Furthermore, the Constitutional Court found that the Regulation of Interception of Communications and Provision of Communication-Related Information Act (RICA) 1) was deficient in failing to provide at least a post-notification procedure for subjects of interception; 2) failed to ensure the…
Content type: Report
Privacy International has released a report summarising the result of its research into the databases and surveillance tools used by authorities across the UK’s borders, immigration, and citizenship system.
The report uses procurement, contractual, and other open-source data and aims to inform the work of civil society organisations and increase understanding of a vast yet highly opaque system upon which millions of people rely.
It also describes and maps how arms and tech companies, ranging…
Content type: Video
**Language advisory: Gus does several swearwords this episode including one f-word at 9:45
From surveillance drones to cameras to wiretapping and more - the EU are providing technologies that will be used to crush political and civil freedoms and undermine democracy without urgent reforms
Find out more:
https://privacyinternational.org/long-read/4288/borders-without-borders-how-eu-exporting-surveillance-bid-outsource-its-border
https://privacyinternational.org/long-read/4291/…
Content type: Long Read
Tucked away in a discrete side street in Hungary’s capital, the European Union Agency for Law Enforcement Training (CEPOL) has since 2006 operated as an official EU agency responsible for developing, implementing, and coordinating training for law enforcement officials from across EU and non-EU countries.
Providing training to some 29,000 officials in 2018 alone, it has seen its budget rocket from €5 million in 2006 to over €9.3 million in 2019, and offers courses in everything from…
Content type: Video
Find out more on our website: https://privacyinternational.org/long-read/4206/qa-eus-top-court-rules-uk-french-and-belgian-mass-surveillance-regimes-must-respect
And make sure we can keep taking these fights to court: support.privacyinternational.org
You can listen and subscribe to the podcast where ever you normally find your podcasts:
Spotify
Apple podcasts
Google podcasts
Castbox
Overcast
Pocket Casts
Peertube
Youtube
Stitcher
And more...
Content type: Press release
Today, the European Court of Human Rights (ECtHR) has handed down a decision in a case brought by Privacy International and a coalition of internet and communications service providers and campaign groups including the Chaos Computer Club (Germany), GreenNet (UK), Jinbonet (Korea), May First/People Link (US), and Riseup (US) (the “coalition”).
The case challenges the conduct of hacking operations abroad by one of the UK’s intelligence agencies, the Government Communications Headquarters (GCHQ…
Content type: Examples
Mexico is one of the biggest buyers of next-generation surveillance technology. And now data leaked to Forbes indicates it's taken an unprecedented step in becoming the first-known buyer of surveillance technology that silently spies on calls, text messages and locations of any mobile phone user, via a long-vulnerable portion of global telecoms networks known as Signalling System No. 7 (SS7).
The revelation was contained in what an anonymous source close claimed was internal sales information…
Content type: Examples
An engineering and computer science professor and his team from The Ohio State University discovered a design flaw in low-powered Bluetooth devices that leaves them susceptible to hacking.
Zhiqiang Lin, associate professor of computer science and engineering at the university, found the commonly used Bluetooth Low Energy devices, such as fitness trackers and smart speakers, are vulnerable when they communicate with their associated apps on the owner’s mobile phone.
"There is a fundamental…
Content type: Examples
The coronavirus action plan announced on March 3, alongside many measures for managing the NHS in the crisis, will also allow the Investigatory Powers Commissioner to appoint judicial commissioners (JCs) on a temporary basis in the event that there are insufficient JCs available to operate the system under the Investigatory Powers Act 2016. The Home Secretary, at the request of the Investigatory Powers Commissioner, will also be allowed to vary the time allowed for urgent warrants to be…
Content type: News & Analysis
Today, the High Court of South Africa in Pretoria in a historic decision declared that bulk interception by the South African National Communications Centre is unlawful and invalid.
The judgment is a powerful rejection of years of secret and unchecked surveillance by South African authorities against millions of people - irrespective of whether they reside in South Africa.
The case was brought by two applicants, the amaBhungane Centre for Investigative Journalism and journalist Stephen…
Content type: Long Read
image from portal gda (cc)
Many people are still confused by what is 5G and what it means for them. With cities like London, New York or San Francisco now plastered with ads, talks about national security, and the deployment of 5G protocols being treated like an arms race, what happens to our privacy and security?
5G is the next generation of mobile networks, which is meant to be an evolution of the current 4G protocols that mobile providers have deployed over the last decade, and there are…
Content type: News & Analysis
Privacy International has joined a global coalition of privacy campaigners, tech companies, and technology experts to respond to proposals by British intelligence chiefs aimed at allowing them access to encrypted messaging apps such as WhatsApp or Signal.
If implemented, the proposals would allow government authorities to force messaging platforms to silently add a law enforcement participant to a group chat or call.
Such a capability poses serious threats to cybersecurity and fundamental…
Content type: Long Read
If you operate an internet company in Russia, you aren’t necessarily surprised to one day open the door to someone, grasping in one hand a bundle of wires and in the other a letter from a government agency demanding access to your servers, with a black box wedged under one arm.
Internet companies in Russia are required by law to store the content of users’ communications for six months and the metadata of users’ communications for three years, essentially meaning that what a person does online…
Content type: News & Analysis
El 10 de mayo de 2018, en el marco del 30º período de sesiones del Examen Periódico Universal (EPU) en el Consejo de Derechos Humanos de las Naciones Unidas, toca la revisión de Colombia, lo que es una oportunidad Colombia y otros Estados para declarar qué acciones han tomado para mejorar la situación de derechos humanos en sus propios países, para cumplir sus obligaciones internacionales en la materia.
Colombia se encuentra actualmente en un punto de inflexión, debido al proceso de transición…
Content type: News & Analysis
On 10 May 2018, Colombia’s human right record will be reviewed as part of the 30th session of the Universal Periodic Review (UPR), under the auspices of the Human Rights Council, which provides the opportunity for each State to declare what actions they have taken to improve the human rights situations in their countries and to fulfil their human rights obligations.
Colombia is at an important turning point in its history as it transitions from four decades of conflict. This provides a unique…
Content type: Explainer
Phone networks are divided between two networks: the physical and the mobile. The physical runs on the Public Switched Telephone Network (PSTN) that serves your home phone. Mobile networks are dominant in the age of communication and are used to relay mobile communications to the PSTN. The most prominent mobile networks are GSM networks (Global System for Mobile communications) and are what we use everyday to communicate with one another. Another system is known as CDMA (Code Division Multiple…
Content type: Press release
Privacy International and Open Rights Group have submitted a response to the Consultation on establishing a UK Privacy and Civil Liberties Board.