Skip to main content
Get email updates
Global Privacy Network
What We Do
Two minute reads
State of Surveillance Briefings
Submissions to the UN
You are here
Surveillance companies ditch Switzerland, but further action needed
Did Hacking Team receive Italian public funding?
€5,000 to compromise Ireland's mobile phone infrastructure
The State of Privacy 2014
Privacy and Open Government: We need your feedback!
Wherever you go, they can follow: Modern surveillance technologies and refugees
Explained: Our criminal complaint on behalf of Tadesse Kersmo
Agency tasked with investigating suspected GSOC bugging responds to criticism
Surveillance follows Ethiopian political refugee to the UK
Beirtear na IMSIs: Ireland's GSOC surveillance inquiry reveals use of mobile phone interception systems
Don’t spy on us: The day we fight back
Privacy International to ISC: UK intelligence laws unfit for modern digital era
East Timor takes on Australia over commercial spying allegations
South African Government still funding VASTech, knows previous financing was for mass surveillance
'Squeaky Dolphin' for sale: How surveillance companies are targeting social networks
Big data: A tool for development or a threat to privacy?
Obama's NSA reforms ignore real problem and leave foreigners unprotected
The UK & surveillance exports: A piece of CAEC
Pakistan-based human rights group files complaint against UK over mass surveillance
Development & privacy: A winning formula
German OECD NCP unwilling to investigate role of German company in human rights violations in Bahrain
Open-source software: Export Uncontrollable
France defies tide of accountability measures to expand surveillance powers
Biometrics: friend or foe of privacy?
Despite Australian government's claims, our privacy rights are not insignificant
Not just the NSA: Surveillance company selling system to spy on mobile phones worldwide
United Nations’ drones: A sign of what’s to come?
Ignoring repeated warnings, Argentina biometrics database leaks personal data
A guide to the Wassenaar Arrangement
Export controls and the implications for security research tools