Skip to main content
Get email updates
What We Do
Where we work
Privacy International Network
Two minute reads
State of Privacy Briefings
Submissions to the UN
Staff and Fellows
You are here
Social media intelligence, the wayward child of open source intelligence
How to Bridge the Gap? Corporate and Government Surveillance Examined at the UN
Surveillance as a Feminist Issue
Big Brother is about to be joined by his Crazy Cousin. The time for trust is over.
Stepping into the Future: Does India measure up to UN Group of Experts on ICT Report?
Algorithms, Intelligence, and Learning Oh My
Some thoughts moving forward..
Tracking the Global State of Privacy
The Battle for Encryption in Brazil
RioCard: concentration of money and data in Rio transportation system
State of Privacy in Chile: Future (im)perfect
Why the Internet of Things Begs for a Paradigm Shift in Internet Security
Why do we still accept that governments collect and snoop on our data?
Down with the data monarchy: Our devices generate and collect personal data without our knowledge or consent. This has to change.
There’s still time to stop the surveillance society
Data Protection post-Brexit: what to do with the EU General Data Protection Regulation?
There is too much at stake for this to be a PR stunt
The database of you: Internet Connection Records will allow the UK Government to document everything we do online
Indiscriminate investigation: new technology should not make us all fair game
How Bulk Interception Works
A shrinking feeling: Anonymity, Privacy, and Free Expression
Into the unknown: Government surveillance after Brexit
Friends, Followers, Police Officers, and Enemies: Social Surveillance in Thailand
Monitoring the Surveillance Industry: Using data to protect privacy
How Not to Draft Legislation: Prevention of Electronic Crimes Bill from Bill to Act
The “Great Difficulty” of Mass Data Retention
Protecting Innovations and Protecting Data: Can we have surveillance and innovation?
Landmark changes to EU surveillance tech export policy proposed, leaked document shows
Obfuscation and work arounds: How the intelligence agencies have been obtaining communications data
Next on EU Privacy: The Revision of the EU e-Privacy Directive