Search
Content type: Long Read
How would you feel if you were fingerprinted by the police before you were allowed to take part in a peaceful public demonstration?
As tens of thousands of people attend massive public demonstrations across the UK today against US President Donald Trump in a ‘Carnival of Resistance’, it’s a question worth asking. Why? Because the police now deploy a range of highly sophisticated surveillance tools at public events which are just as if not more intrusive. And these technologies should be even…
Content type: Long Read
Privacy and data protection are currently being debated more intensively than ever before. In this interview, Frederike Kaltheuner from the civil rights organisation Privacy International explains why those terms have become so fundamentally important to us. The article was first published in the newly launched magazine ROM. The interview was conducted by ROM publisher Khesrau Behroz and writers Patrick Stegemann and Milosz Paul Rosinski.
Frederike Kaltheuner, you work for Privacy…
Content type: Course Section
Communications surveillance is where a third party intercepts a communication in the course of its transmission between intended recipients. Interception includes all acts of monitoring, copying, diverting, duplicating and storing communications in the course of their transmission by or for law enforcement or intelligence agencies.[1]
When discussing communications surveillance, there are many debates, distinctions, and terms used. Because of this it is important to know what a term represents…
Content type: Course Section
CONCEPTS
Communications surveillance: Communications surveillance is the monitoring, interception, collection, preservation and retention of information that has been communicated, relayed or generated over communications networks to a group of recipients by a third party. This includes phone calls, emails, text messages, pictures, and messaging apps.
Data protection: Data protection is the law designed to protect your personal information, which is collected, processed and stored by “…
Content type: News & Analysis
In order to uphold the law and keep us safe, the police can seriously interfere with a range of fundamental human rights. And so transparency and public scrutiny of their actions are essential to protect against misconduct and abuse.
So why is the National Police Chiefs’ Council (NPCC) now permitted to operate in secret?
We all have the right to seek information from most public bodies – including the police – under the Freedom of Information Act (FOIA) 2000. When the law was first…
Content type: Long Read
TO TAKE PART IN OUR CAMPAIGN, RIGHT CLICK ON THE PICTURES BELOW, SAVE THEM, AND SHARE THEM ON SOCIAL MEDIA TAGGED #SPYPOLICE
Have you ever been to a peaceful protest, demo or march? Did you assume that the police would only be identifying 'troublemakers'? How would you feel if just by turning up at a peaceful protest, the police automatically identified you, without your consent or knowledge, and stored personal information about you (including photographs of your face) in a secret database?…
Content type: News & Analysis
This op-ed originally appeared in the New Statesman.
Imagine the police searching your home without good reason, without a warrant, without your knowledge. For good measure let’s also imagine that they take a full inventory of all of your possessions and store this in a secret database indefinitely.
A peculiar feature of modernity is that what we would find dystopian in the real world is banal in our virtual world. And the irony is that this can be a greater violation of our privacy and…
Content type: Long Read
Image: Eric Jones
The UK government last week hosted hundreds of surveillance companies as it continues to try and identify “technology-based solutions” able to reconcile the need for controls at the Irish border with the need to avoid them.
The annual showcase conference of 'Security and Policing' brings together some of the most advanced security equipment with government agencies from around the world. It is off limits to the public and media.
This year’s event came as EU and UK…
Content type: Explainer
Phone networks are divided between two networks: the physical and the mobile. The physical runs on the Public Switched Telephone Network (PSTN) that serves your home phone. Mobile networks are dominant in the age of communication and are used to relay mobile communications to the PSTN. The most prominent mobile networks are GSM networks (Global System for Mobile communications) and are what we use everyday to communicate with one another. Another system is known as CDMA (Code Division Multiple…
Content type: Explainer
Video surveillance technologies are deployed in public and private areas for monitoring purposes. Closed-circuit television (CCTV)– a connected network of stationary and mobile video cameras– is increasingly used in public areas, private businesses and public institutions such as schools and hospitals. Systems incorporating video surveillance technologies have far greater powers than simply what the camera sees. Biometric technologies use the transmitted video to profile, sort and identify…
Content type: News & Analysis
Al Jazeera recently published an investigation into the shadowy trade of communications surveillance technologies. Their undercover reporter revealed four companies offering to illegally sell highly intrusive surveillance technologies to the governments of South Sudan and Iran, both of which are subject to extensive international sanctions. In the film, the four companies – two Italian, one Turkish and one Chinese – show themselves eager to employ workarounds, third parties, and shell…
Content type: Press release
The release of a new report by Privacy International exposes Colombia's intelligence agencies' previously unknown history of developing communications surveillance capabilities outside of lawful authority.
The report “Shadow State: Surveillance law and order in Colombia” reveals, via previously unreleased documents, the Colombian police agencies' and intelligence services' long history developing surveillance systems. Rather than building a well-regulated system of surveillance after Colombia…
Content type: News & Analysis
This blog was written by Fundación Karisma, a member of the Privacy International Network. It does not necessarily reflect the views or position of Privacy International.
The Colombian General Prosecutor said recently that the blocking of IMEI is not working. He is talking about a registry created in 2011 that aims to reduce cellphone theft by blocking reportedly stolen phones of Colombian networks.
Fundación Karisma has been following this program and now, after six years…
Content type: Long Read
European Court of Human Rights Intervention
On 15 September 2017, Privacy International filed an intervention to the European Court of Human Rights in Association Confraternelle de la Presse Judiciare and 11 Other Applications v. France. This case challenges various surveillance powers authorised under the French Intelligence Act of 24 July 2015 as incompatible with Articles 8 and 10 of the European Convention on Human Rights, which respectively protect the right to privacy…
Content type: Long Read
The use of IMSI catchers[1] to arrest individuals is rarely documented — as IMSI catchers are used secretively in most countries. The arrest of Colombian drug lord Henry López Londoño in Argentina is therefore a rare opportunity to understand both how IMSI catchers are used, and also the complexity of their extraterritorial use.
In October 2012, Londoño — also known as Mi Sangre (“My Blood”) — was arrested in Argentina. His arrest was the result of cooperation between the Dirección de…
Content type: Long Read
In July 2015, representatives of a private company met in a parking lot in Pretoria, South Africa to sell phone tapping technology to an interested private buyer. What they did not know was that this buyer was a police officer. The police had been tipped off that the company was looking to offload the surveillance technology, an IMSI catcher, to anyone who would buy it. It is illegal to operate such surveillance technology as a private citizen in South Africa, and illegal to buy…
Content type: Long Read
Privacy International’s case on Bulk Personal Datasets and Bulk Communications Data comes to a head with a four-day hearing in the Investigatory Powers Tribunal which commenced on 26 July 2016.
The litigation has brought to light significant revelations about the use of section 94 of the 1984 Telecommunications Act to obtain bulk communications data.
Large amounts of disclosure have shed new light on this hitherto secret power and explained confusing aspects of the Government’s Response to…
Content type: News & Analysis
This guest piece was written by Jane Duncan of the Right2Know Campaign. It does not necessarily reflect the views or position of Privacy International.
On 23rd March the United Nations Human Rights Committee released its assessment on South Africa’s compliance with the International Covenant on Civil and Political Rights (ICCPR). The report includes a blistering attack on the Government for failing to respect the privacy of the communications of users and makes…
Content type: Long Read
This guest piece was written by Jessamine Pacis of the Foundation for Media Alternatives. It does not necessarily reflect the views or position of Privacy International.
Introduction
With a history immersed in years of colonialism and tainted by martial law, Philippine society is no stranger to surveillance. Even now, tales of past regimes tracking their citizens’ every move find their way into people’s everyday conversations. This, for the most part, has kept Filipinos…
Content type: News & Analysis
Surveillance companies and government officials from across the world are gathering in the UK this week at the invitation of the Home Office for the UK’s “Premier Security and Law Enforcement Event’, one week after the controversial spying legislation, entitled the Investigatory Powers Bill, had its first reading in Parliament.
Delegates and companies will be attending the three-day long ‘Security and Policing’ trade show in Farnborough, the historical centre of the UK’s aerospace industry.…
Content type: News & Analysis
As we mark the 750th anniversary of the first parliament called in Britain, its time for intelligence agencies to tell the truth.
After the fall of the Berlin wall, the new German government dedicated its commitment to democracy by physically building transparency into the political process - the impressive glass cupola of the Reichstag, the expansive glass walls of the ministry buildings and in the chancellery all encourage public curiosity and…
Content type: News & Analysis
In an enormous breakthrough for those seeking transparency and accountability to the shadowy surveillance industry, the Swiss Government has been forced to publish the list of export licenses for surveillance technologies and other equipment, including details of their cost and destination.
The decision by the Federal Information and Data Protection Commissioner comes on the heels of consistent pressure from Privacy International, Swiss journalists, and several Members of Parliament on…
Content type: Press release
Privacy International's new report exposes the companies that have built the Colombian Government's controversial and highly invasive surveillance systems. The report “Demand/Supply: Exposing the Surveillance Industry in Colombia” shows the extensive dealings that companies from Israel, the UK, the USA, Finland, and New Zealand, among other countries, have had in supporting Colombian government agencies in purchasing surveillance equipment. Many of the company's customers were agencies that did…
Content type: News & Analysis
Over a dozen international companies are supplying powerful communications surveillance technology in Colombia, according to a Privacy International investigation released today featuring original documentation. Over the past few decades, companies primarily from Israel, the US, and the UK have worked with Colombian partners to expand the Government's surveillance capacities. This is despite evidence that the Government is undertaking unlawful surveillance of Colombians.
The…
Content type: Press release
The release of a new report by Privacy International exposes Colombia's intelligence agencies' previously unknown history of developing communications surveillance capabilities outside of lawful authority.
The report “Shadow State: Surveillance law and order in Colombia” reveals, via previously unreleased documents, the Colombian police agencies' and intelligence services' long history developing surveillance systems. Rather than building a well-regulated system of surveillance after Colombia…
Content type: News & Analysis
Here are eight things we have learned from this week's hack of some 400GB of internal company material and correspondence from Italian surveillance company Hacking Team.
The Citizen Lab was right
The Citizen Lab, who in 2014 identified some 21 countries that are potential customers of Hacking Team, were right about all of them. A 2015 report stated that there was likely to be more. In fact, at least 45 countries are purchasers of Hacking Team's…
Content type: News & Analysis
The Swiss Federal Council has introduced a major amendment to its export licensing legislation in order to ensure surveillance technologies that might be used for human rights abuses are not exported from Switzerland.
What this means is that Swiss authorities must reject companies’ requests to export internet and mobile surveillance technologies if there “are reasonable grounds to believe” that the items could be used for repression in the country of destination.
The amendment…
Content type: News & Analysis
There is a common practice within the surveillance industry that makes the already murky market even harder to track: collaborating companies.
Within Privacy International's Surveillance Industry Index there are 83 documents detailing collaborations between companies involved in developing and selling surveillance technologies. These documents represent a variety of relationships – some are friendly companies, others advertise corporate partners, and some present themselves as a distributor of…
Content type: Press release
Privacy International, Amnesty International, FIDH, the French League for Human Rights and Reporters Without Borders are alarmed by the expansive surveillance powers to be granted to surveillance agencies contained in a Bill transferred to the French parliament on Friday. Under the new law, French intelligence agencies would be empowered to hack into computers and devices and spy on the communications of anyone who makes contact with a person under suspicion, even incidentally. The new law will…