Privacy International defends the right to privacy across the world, and fights surveillance and other intrusions into private life by governments and corporations. Read more »


Stream: Blog

Blog
Carly Nyst's picture

With the launch of the "Eyes Wide Open" project, Privacy International has put together a fact sheet about the secretive Five Eyes alliance. Consider this a guide to the secret surveillance alliance that has infiltrated every aspect of the modern global communications system.

• Beginning in 1946, an alliance of five English-speaking countries (the US, the UK, Australia, Canada and New Zealand) developed a series of bilateral agreements over more than a decade that became known as the UKUSA agreement, establishing the Five Eyes alliance for the purpose of sharing intelligence, primarily signals intelligence (SIGINT).

• While almost 70 years old, the arrangement is so secretive that the Australian prime minister reportedly wasn’t informed of its existence until 1973 and no government officially acknowledged the arrangement by name until 1999.

Blog
Sam Smith's picture

For nearly 30 years, the UK's wiretapping laws have been the subject of annual reports. Since 2002, they are available around the web (for now), but earlier than that, it is a rabbit warren of possible locations.

In practice, the reports are solely available from the Parliamentary Archives if and only if you are a member of an institution which has paid for access. Requesting a copy from elsewhere sends you to this destination.

The current Interception of Communications Commissioner didn't particularly want them on his website, as many agencies are (and were for years) paranoid about people knowing how many warrants are in use at any one time. As much as we disagree with his opinion that a historical representation of oversight isn't important, we disagree more with his belief current oversight is effective.

So when the Government claims that these reports provide public evidence of transparency and oversight, those claims are meaningless if the historical reports can not be read.

Blog
Carly Nyst's picture

The following is an excerpt from a blog post that originally was published by EJIL: Talk!, and is written by Carly Nyst, Head of International Advocacy at Privacy International:

The recent revelations of global surveillance practices have prompted a fundamental re-examination of the role and responsibility of States with respect to cross-border surveillance. The patchwork of secret spying programmes and intelligence-sharing agreements implemented by parties to the Five Eyes arrangement (the US, UK, Canada, Australia and New Zealand) constitutes an integrated global surveillance arrangement that covers the majority of the world’s communications.

Blog
Edin Omanovic's picture

If you were a Middle Eastern tyrant or a Central Asian strongman, and you suddenly found your position of power under threat, where would turn for assistance? Well, Paris, it seems, is actually pretty good start.

This week, the city that gave us a defining revolution based on the very idea that we as human beings are entitled to certain universal rights, plays host to some 1,000 exhibitors and 30,000 attendees as part of Milipol 2013, one of the world’s foremost trade shows for law enforcement agencies showcasing the latest tools in state security and internal repression.

Blog
Anna Crowe's picture

Humanitarian agencies are collecting personal information for Syrians caught in the crossfire of a drawn-out and bloody civil war. Indeed, refugees fleeing persecution and conflict, need to access services and protection offered by the world’s humanitarian community. But in the rush to provide necessary aid to those afflicted by the crisis in Syria, humanitarian organisations are overlooking a human right that also needs protecting: the right to privacy.

Humanitarian and aid agencies are creating surveillance systems that collect and retain personal data with no standards or data protection principles in place. There are very real risks involved, including the creation of databases filled with the personal data of a vulnerable population. Good intentions aside, failing to protect information of Syrians could have the opposite effect: these communities will be more, not less, at risk.

Blog
Matthew Rice's picture

Privacy International is pleased to announce the Surveillance Industry Index, the most comprehensive publicly available database on the private surveillance sector.

Over the last four years, Privacy International has been gathering information from various sources that details how the sector sells its technologies, what the technologies are capable of and in some cases, which governments a technology has been sold to. Through our collection of materials and brochures at surveillance trade shows around the world, and by incorporating certain information provided by Wikileaks and Omega Research Foundation, this collection of documents represents the largest single index on the private surveillance sector ever assembled. All told, there are 1,203 documents detailing 97 surveillance technologies contained within the database. The Index features 338 companies that develop these technologies in 36 countries around the world.

Blog
Kenneth Page's picture

On at least two separate occasions, the South African government has provided funding to a well-resourced surveillance company for the development of mass surveillance technologies, the very equipment found to be used by the Gaddafi's repressive military regime in Libya, according to documents uncovered by Privacy International.

In February 2008, sandwiched between funding for a mechanical grape conveyor belt, and funding to improve gear changing and engine efficiency, the South African Ministry of Trade provided R 870,822.45 of public finds to the surveillance company VASTech – specifically for the Zebra system. Two years later, in January 2010, the Ministry approved even more public money to VASTech, this time the amount to the tune of R 2,692,684.00.

Blog
Caroline Wilson Palow's picture

In a move that echoes strong action taken in the past by European officials to protect privacy, the Belgian and Dutch data protection authorities on Wednesday announced that they will begin an investigation into the security of the SWIFT financial system.

Blog
Anna Crowe's picture

Privacy International today is proud to announce our new project, Aiding Privacy, which aims to promote the right to privacy and data protection in the development and humanitarian fields. Below is an outline of the issues addressed in our new report released today, Aiding Surveillance.

New technologies hold great potential for the developing world. The problem, however, is that there has been a systematic failure to critically contemplate the potential ill effects of deploying technologies in development and humanitarian initiatives, and in turn, to consider the legal and technical safeguards required in order to ensure the rights of individuals living in the developing world.

Blog
Dr Richard Tynan's picture

It was a throwaway line in a Washington Post article, one of the many stories about government surveillance in the past few months.

By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off. [Joint Special Operations Command] troops called this “The Find,” and it gave them thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq, according to members of the unit."

Being able to track a mobile phone, while switched off? It was the first time we had read about the NSA having such a capability, and a revelation that has far-reaching implications. For most consumers, when they turn off their handsets, they have a reasonable expectation that the device is powered off, is not emitting or receiving a signal, and does not have any piece of the mobile phone still 'on'.

Pages

Subscribe to Privacy International - blog