Skip to main content
Get email updates
Global Privacy Network
What We Do
Two minute reads
State of Surveillance Briefings
Submissions to the UN
You are here
The trap of simplicity: Why analogies for surveillance fail us
Australian government pushing to expand surveillance, hacking powers
Six things we know from the latest FinFisher documents
Elaman and Gamma: what's selling and who's buying in Indonesia?
Identity theft persists in Pakistan's biometric era
UN privacy report a game-changer in fighting unlawful surveillance
No slow DRIP: Expansion of surveillance powers being rammed through Parliament
What to Know: GCHQ On Trial
Stop breaking the internet: internet and communications service providers take legal action against GCHQ
How privacy-friendly is the new European Parliament?
Addressing the right to privacy at United Nations
My device is me. GCHQ – stop hacking me
Egyptian government wants surveillance system to monitor 'destructive ideas' on social networks
Watching the polls: How spying imperils elections
What does GCHQ know about our devices that we don't?
Explaining the law behind Privacy International's challenge to GCHQ's hacking
After HMRC ruling, what will Government do about potentially illegal exports of surveillance technology?
Intelligence agencies and workers’ rights: political surveillance at its worst
NETMundial: a long way to go to combat mass surveillance
Monitoring Centres: Force multipliers from the surveillance industry
Moving forward? Kosovo proposes surveillance law giving authorities real-time access to data
Proposed law in Pakistan invades privacy, grants government broad powers
The Data Retention Directive: Life after Death?
A CAUSE worth fighting for: Regulating the unlawful surveillance trade
UN must reject mass surveillance to protect global privacy rights
Following the money: How States are funding surveillance technologies
A way forward to effectively regulate the trade in surveillance technology
Can we have an open phone please? The case of the Ubuntu Phone
Remembering surveillance of the past informs privacy fights today
Exploiting privacy: Surveillance companies pushing zero-day exploits