Search
Content type:
… 'big tech’ companies like Google, Amazon and Facebook, or surveillance tech firms and data brokers that you have never … without your consent, or developing ever more intrusive surveillance technologies, we campaign for strong regulation …
Content type:
Content type:
… it from the device of the person being targeted by surveillance technology. Such software is generally referred to as “state trojans”. As a form of government surveillance, state trojans present unique and grave threats … has the potential to be far more intrusive than any other surveillance technique, permitting the government to …
Content type:
… encourage and enable other governments to deploy advanced surveillance capabilities without adequate safeguards. … Israel, the US, and Russia, are all major providers of such surveillance worldwide, as are multilateral organisations … their operations and procurement Facilitating of exports of surveillance equipment by industry Promoting legislation …
Content type:
Content type:
Content type:
… we require to live are too often turning into mechanism of surveillance and control by the state. …
Content type:
Content type:
… being is to a degree subject to corporate and government surveillance. But, as research conducted by the Privacy … International Network shows, there is a uniqueness to the surveillance faced by LGBTIQ+ people. Understanding this … means shedding light on the inextricable ties between surveillance, patriarchy and other systems of oppression, …
Content type:
… being is to a degree subject to corporate and government surveillance. But, as research conducted by the Privacy … International Network shows, there is a uniqueness to the surveillance faced by women, trans and gender queer people. … means shedding light on the inextricable ties between surveillance, patriarchy and other systems of oppression, …
Content type:
Content type:
… human rights defenders - as they are targeted by unlawful surveillance deployed in the name of counter-terrorism; and … human rights defenders - as they are targeted by unlawful surveillance deployed in the name of counter-terrorism; and …
Content type:
Content type:
Content type:
… capable of conducting generalised, invisible, real-time surveillance of civic spaces, from a distance, without …
Content type:
… media monitoring, from remote hacking to the use of mobile surveillance equipment called 'IMSI catchers', UK police forces are using an ever-expanding array of surveillance tools to spy on us as we go about our everyday … media monitoring, from remote hacking to the use of mobile surveillance equipment called 'IMSI catchers', UK police …
Content type:
… almost $1 million on hacking technology sold by the Italian surveillance technology company, Hacking Team, and was …
Content type:
… (GCSB) comprising of a series of bilateral agreements on surveillance and intelligence-sharing. Though these …
Content type:
Content type:
Content type:
… IMSI catchers. IMSI catchers are a type of mobile phone surveillance technology, which mimic mobile phone base … technology, especially when it can be used for mass surveillance - like IMSI catchers, PI is frustrated by many … use of IMSI catchers as part of our work challenging mass surveillance. …
Content type:
… countries — including authoritarian regimes — with surveillance capabilities. In this section, you can read our report ‘Teach ’em to Phish: State Sponsors of Surveillance’, as well as access a range of other resources … countries — including authoritarian regimes — with surveillance capabilities. ’Teach ‘em to Phish’ warns that …
Content type:
… Governments share our data amongst each other. Surveillance, by its very nature, impacts on personal privacy. Sharing surveillance intelligence with other governments greatly … states can use intelligence sharing as a way of outsourcing surveillance to each other, bypassing any constraints and …
Content type:
… Agency, urging the immediate investigation of the unlawful surveillance of three Bahraini activists living in the UK by … the activists and had their computers infected with the surveillance Trojan FinFisher. These findings were published … aware of, and actively facilitating, the Bahraini regime’s surveillance of targets located outside Bahrain through the …
Content type:
… hacked and infected with FinSpy, a commercially-developed surveillance software. In the dossier submitted to the …
Content type:
… a company that exports “FinFisher” (or “FinSpy”) intrusive surveillance software, and Trovicor GmbH, a German company … of Siemens) which also sells internet monitoring and mass surveillance products. The complaint against Trovicor asked … OECD Guidelines for Multinational Enterprises by exporting surveillance products to Bahrain, where the authorities use …
Content type:
… a company that exports “FinFisher” (or “FinSpy”) intrusive surveillance software, and Trovicor GmbH, a German company … of Siemens) which also sells internet monitoring and mass surveillance products. The complaint against Gamma … OECD Guidelines for Multinational Enterprises by exporting surveillance products to Bahrain, where the authorities use …
Content type:
… (GCHQ) access to their fibre optic networks for the Tempora surveillance program. Privacy International argued that by …
Content type:
… in the Police Code which, taken together, enable the mass surveillance state through indiscriminate monitoring and … the provisions make compulsory the installation of surveillance cameras in public transport vehicles, enable the police to access private surveillance systems capturing public spaces, and render any …
Content type: