Search
Content type: Examples
The Vancouver police board has asked retired officers to investigate police surveillance of pro-Palestinian demonstrations following complaints from protesters and legal advocates about the excessive use of force and invasions of privacy during a protest on May 31, 2024. Protesters have accused the police of attempting to criminalise and repress people's right to freedom of expression; conducting surveillance via drones, personal mobile phones, and body-worn cameras; and using extreme force.…
Content type: Examples
In preparation for the anniversary of the October 7 attacks, Vancouver police planned to post "significant and visible" extra officers throughout the city. In the year since, the Vancouver police department had attended 344 protests relating to the Israel-Hamas war at a cost of C$4.1 million and including 3,318 overtime shifts. Police also planned to increase their presence around mosques, synagogues, SkyTrain stations, and community centres, including a public safety trailer and mobile command…
Content type: Examples
Anti-Israel groups planned protests in New York City for the anniversary of the October 7, 2023 Hamas attack. Law enforcement said police planned to be out in full force and to beef up security at synagogues and mosques for Rosh Hashanah, taking place the same week. Expectations were that the anniversary would exacerbate already-inflamed tensions on university campuses. In addition, additional cameras were planned in addition to the 80,000 cameras already in the city's NYPD Domain…
Content type: Long Read
If you’ve ever used TikTok, Instagram, or X/Twitter, you will already be familiar with centralised social media.Centralised social media means big company owns the app, controls the software, and keeps all your data.For example, ByteDance makes TikTok. They own it, run the servers, decide what you see in your feed, and hold onto every video you like or comment on. They call the shots when it comes to your data.But what if social media didn’t work that way? What if no single company was in…
Content type: People
Sara Fratti is a Guatemalan lawyer specializing in technology and human rights, with 10+ years of experience in Internet governance, digital rights, international law, intellectual property, and AI policies. She focuses on data protection, gender-based violence facilitated by technology, and surveillance from a human rights perspective. She is the Strategic Partnerships manager at ILDA (Iniciativa Latinoamericana por los Datos Abiertos), fostering collaboration on data and AI governance.…
Content type: People
Martin Scheinin is Guest Professor of international human rights law at Lund University (Sweden) and part-time professor at the European University Institute (Italy). He has served as member of the UN Human Rights Committee, UN Special Rapporteur on human rights and counterterrorism and member of the Scientific Committee of the EU Fundamental Rights Agency. As academic scholar, he has run several multi-annual research projects related to the right to privacy, including the EU-funded project…
Content type: Long Read
Go back to the full report pageLimitationsBefore our analysis, we note the technical limitations (and the scope of our research) meant we did not test certain features mentioned, such as Google Fit integrations offered by some apps. We also mention the limitations of our DIAS environment, which only allows us to see web (client-side) interactions, rather than server-side interactions, the latter of which are increasingly common among more advanced platforms that utilise cloud computing (e.…
Content type: Long Read
The security of our devices, applications and infrastructure is paramount to the safe functioning of our digital lives. Good security enables trust in our systems, it is fundamental to protecting the critical information we store and exchange through networks and devices. Similar to how we physically secure our homes, offices and schools, securing devices and software allows us to operate in safe and trusted environments where our security is guaranteed and protected.Security for information…
Content type: Video
Links2G phone networks are being shutdownRead the Rest of World storyPI's Low Cost Tech researchListen to our podcast on connectivity and vertical mergersGoogle anti-trust case and potential break up; Read the Washington Post storyGoogle buy WizImpact of USAID cutsRead the NY Times articleUK cutsPI's work on aid funding surveillance: US Surveillance exportsEU Surveillance AidUm-ing and Ah-ingRead the Knowable articleIsrael, data and AIRead the 972 article Cellphone data for targetingLLM…
Content type: Opportunities
Full time and permanent from London officeSalary: £40,500 full time and permanent from London officeBenefits: 26 days annual leave (plus bank holidays), generous workplace pension, wellbeing support, resources for learning & development, and we can offer a modest relocation fund.Join us: You’re curious about how technologies affect power and shape the future. You’re an advocate who wants to speak out for change with a voice that is both nuanced and engaging. You want to help build…
Content type: Press release
FOR IMMEDIATE RELEASELONDON - 7 April 2025The Investigatory Powers Tribunal (IPT) has confirmed it will hear Privacy International, Liberty and two individuals’ challenge to the legality of the Home Secretary’s decision to use her powers to secretly force Apple to allegedly give the UK Government access to users’ secured data stored on iCloud. The challenge will also cover the legality of the Government issuing these types of notices at all. Privacy International and Liberty,…
Content type: News & Analysis
We’ve been asked a lot lately about whether it is safe to travel, particularly to the US. And it’s not surprising why: the US Government is increasing their cruelty at borders.Border management today is fueled by our data, but government officials want more. They want as much data as they can get to catch you out. They’ve reportedly detained or deported people based on their free speech activities, denying entry on tenuous grounds like having the wrong photos on phones (including in in the ‘…
Content type: Long Read
It’s important to us at PI that we continue to create real change in the world. We want our work to matter, and we challenge ourselves continuously to verify that it does.In 2024 we made substantial progress towards concrete systemic change. We challenged governments and corporations that exploit data and technology, pushed for new national and international policy standards, drove standard-setting action by courts and regulators. We educated and campaigned with others.As a result, we produced…
Content type: News & Analysis
On 11 March 2025, The Atlantic journalist, Jeffrey Goldberg was added to a Signal chat where senior US Government officials were discussing the United States’ military strikes in Yemen.This happened to Goldberg as an accident. Yet, security services around the world have pushed for this to be part of their clandestine surveillance operations: the so-called “Ghost Protocol”.Governments have been trying to gain access to private online conversations since private online conversations have existed…
Content type: Long Read
In 2024, Privacy International (PI) continued to produce real change by challenging governments and corporations that use data and technology to exploit us.Since the beginning of the year, we’ve achieved some wins and would like to share the most recent ones with you.Creating change is hard, and takes time. We have to uncover problems, draw attention to them, and pressure for change. In the latest quarter, we've been able to push regulators for stronger standards on generative AI systems, draw…
Content type: News & Analysis
As the New York Times reports the health programmes are being cut by USAID cuts, the US Government declares them as “inconsistent with the national interest or agency policy priorities.” Sadly at PI we know the kind of foreign aid that governments believe are in the national interest: surveillance funding.We’re alarmed by aid budgets being cut by governments world-wide. People will be hurt, and people will die.And while most of the news has been dominated by the US’s cuts, the UK and France…
Content type: Long Read
On 13 March 2025, we filed a complaint against the UK government challenging their use of dangerous, disproportionate and intrusive surveillance powers to undermine the privacy and security of people all over the world. Here, we answer some key questions about the case and the recent events that led to this development.Note: This post was last updated on 13 March 2025.What’s the fuss about?A month ago, it was reported that the UK government demanded Apple Inc – maker of the iPhone, iPads, Macs…
Content type: Guide step
In the current digital landscape, passwords are the predominant method for user authentication across most platforms. From a privacy perspective, passwords present a advantage over some other methods like biometrics, as they do not disclose any additional or unique data about you – apart from the selected username
Given the widespread adoption of passwords, manually managing multiple, unique passwords for each online account becomes more difficult. Having unique random passwords for each…
Content type: Guide step
In your day-to-day life, your smartphone silently captures and stores a digital footprint of your whereabouts by keeping a location history: this history is then used to enhance your mobile experience, such as by aiding in navigation and customizing app experiences according to your location habits.
Yet, it's essential to recognize the potential risks tied to this seemingly innocuous practice. Understanding how your location data is handled becomes vital, as it can impact your privacy in ways…
Content type: Advocacy
We believe the Government's position of refusing to confirm or deny the existence of the Technical Capability Notice or acknowledge Apple's appeal is untenable and violates principles of transparency and accountability.
Content type: People
George is a Legal Officer at Privacy International. He works on legal advocacy and litigation targeting surveillance, the exploitation of personal data and privacy-damaging practices in the healthcare sector.George was admitted as a solicitor in England and Wales in September 2023. Prior to joining PI, George worked as an associate specialising in data protection at a commercial law firm. George has a Master of Laws (LLM) in international human rights law, a Master of Sciences (MSc) in Business…
Content type: Explainer
Imagine this: a power that secretly orders someone anywhere in the world to abide and the receiver can’t tell anyone, can’t even publicly say if they disagree, and can’t really question the power in open court because the secret order is, well, secret. Oh and that power affects billions of people’s security and their data. And despite being affected, we too can’t question the secret order.In this piece we will outline what’s ridiculous, the absurd, and the downright disturbing about what’s…
Content type: Examples
With the stated aim of improving the security of satellite communication, a multinational partnership of companies involved in space engineering has partnered with the European Space Agency (ESA) to operationalise the Quantum Key Distribution Satellite (QKDSat) owned by Honeywell. The UK Space Agency is supporting the scheme within its larger aim to reduce vulnerability in data transfers.https://www.militaryaerospace.com/communications/article/55243719/honeywell-and-esa-announce-public-private-…
Content type: Examples
Anduril has been awarded a 5 year contract to weave in its Lattice software into the US Space Force's Space Surveillance Network (SSN), which monitors objects in space. The agreement will enable swift data sharing between space sensors, repositories, and personnel, and will allow the quick integration of new partners as needed. https://defensescoop.com/2024/11/21/anduril-space-surveillance-network-upgrade-contract-sdanet/Publication: DefenseScoopWriter: Mikayla Easley
Content type: Examples
The Agreement between the Chief Digital AI Office of the USDOD and Anduril is worth $100 million, and uses the latter's software 'Lattice Mesh' to expand the 'mesh' within the US military ecosystem. Anduril has stated that this will allow the delivery of critical data which will enable real-time generative AI solutions which fit specific military needs. https://defensescoop.com/2024/12/03/anduril-awarded-100m-deal-cdao-scale-edge-data-mesh-capabilities-ota/ Publication…
Content type: Examples
The US Army has chosen to extend its relationship with Palantir for up to four years for use of its 'Vantage' system as its main data platform. The Army Data Platform uses Palantir software to process data and utilises Artificial Intelligence (AI), significantly enhancing surveillance capabilities. Palantir has been the main provider of this Platform since 2018. https://www.defensenews.com/land/2024/12/18/us-army-extends-palantirs-contract-for-its-data-harnessing-platform/ …
Content type: Examples
The contract will run until 2031, and will provide the US Air Force with drones (Unmanned Aerial Vehicles) which can serve multiple purposes, including mimicking enemy drones, data collection, and military strikes. These drones will enable enhanced surveillance by the US military. Firestorm will be using their pre-existing drone technology as well as developing drones with new capabilities. https://defence-blog.com/san-diego-based-firestorm-secures-major-us-air-force-deal/#…
Content type: Examples
DroneAcharya, which has recently merged with drone technology start-up AVPL International, has been awarded a contract worth 1.87m Indian Rupees ($21, 660) by the Indian Ministry of Defence. The agreement involves hardware and training for the piloting of drones. This will enhance the Indian military's surveillance capabilities to use drones for intelligence gathering, reconnaissance, and monitoring. Drone Acharya's share prices rose by 4% after news of the Public-Private Partnership went…