Reports

Reports, Long Reads, Country Reports

Long Read
On 8 September 2017, the Investigatory Powers Tribunal decided to refer questions to the Court of Justice of the European Union (‘CJEU’) concerning the collection of bulk communications data (‘BCD’) by the Security Intelligence Agencies from mobile network operators. The BCD regime was initially
Long Read
European Court of Human Rights Intervention On 15 September 2017, Privacy International filed an intervention to the European Court of Human Rights in Association Confraternelle de la Presse Judiciare and 11 Other Applications v. France. This case challenges various surveillance powers authorised
Report
In this paper, Privacy International explores* what it means to be secure, and how governments and companies enact policies and laws that undermine security globally. Good cyber security policies and practices put people and their rights at the centre. By prioritising the individual and protecting
Long Read
This piece was originally published in Just Security in August 2017 We recently published an analysis in Lawfare of the United Kingdom’s surveillance framework as it relates to the proposed U.S.-U.K. agreement for cross-border law enforcement data requests. Implementing the U.S.-U.K. agreement is
Long Read
This piece was originally published in Lawfare in July 2017. The United Kingdom has been a key partner in the United States’ efforts to reform the process that law enforcement officials use to make cross-border requests for data. These efforts address both foreign governments’ requests for data
Long Read
6 July 2017 Full briefing: UK-US Intelligence Sharing Arrangements Urgent transparency is needed regarding the UK’s intelligence sharing arrangements with the United States, which allows UK and US agencies to share, by default, any raw intelligence and methods and techniques related to the
Long Read
In January 2017, Kenya’s information and communication technology regulator, the Communications Authority of Kenya, announced that it was spending over 2 billion shillings (around 14 million USD) on new initiatives to monitor Kenyans’ communications and regulate their communications devices. The
Long Read
This piece was originally published in Lawfare in May 2017. This post is part of a series written by participants of a conference at Georgia Tech in Surveillance, Privacy, and Data Across Borders: Trans-Atlantic Perspectives. Cross-border law enforcement demands have become increasingly important to
Long Read
Disclaimer: This piece was written in April 2017. Since publishing, further information has come out about Cambridge Analytica and the company's involvement in elections. Recently, the data mining firm Cambridge Analytica has been the centre of tons of debate around the use of profiling and micro
Report
This investigation focuses on the techniques, tools and culture of Kenyan police and intelligence agencies’ communications surveillance practices. It focuses primarily on the use of surveillance for counterterrorism operations. It contrasts the fiction and reality of how communications content and
Report
This stakeholder report is a submission by Privacy International (PI). PI is a human rights organisation that works to advance and promote the right to privacy and ght surveillance around the world. Privacy International wishes to bring concerns about the protection and promotion of the right to
State of Privacy

A study of privacy and surveillance issues in Thailand. The State of Privacy project was last updated on January 2019, unless otherwise provided on specific pages.

Long Read
This briefing highlights opportunities for NGOs to raise issues related to the right to privacy before some selected UN human rights bodies that have the mandate and the capacity to monitor and provide recommendations and redress. The briefing provides some examples based on Privacy International’s
Long Read
In this special briefing for International Women’s Day 2017, we explore through the work of the Privacy International Network some areas of concern being addressed in relation to privacy, surveillance, women’s rights, and gender. Coding Rights demonstrates the important of generating and
Long Read
Introduction A growing number of governments around the world are embracing hacking to facilitate their surveillance activities. Yet hacking presents unique and grave threats to our privacy and security. It is far more intrusive than any other surveillance technique, capable of accessing information