Skip to main content
Get email updates
What We Do
Where we work
Privacy International Network
Two minute reads
State of Privacy Briefings
Submissions to the UN
Staff and Fellows
You are here
Did Hacking Team receive Italian public funding?
€5,000 to compromise Ireland's mobile phone infrastructure
The State of Privacy 2014
Privacy and Open Government: We need your feedback!
Wherever you go, they can follow: Modern surveillance technologies and refugees
Explained: Our criminal complaint on behalf of Tadesse Kersmo
Agency tasked with investigating suspected GSOC bugging responds to criticism
Surveillance follows Ethiopian political refugee to the UK
Beirtear na IMSIs: Ireland's GSOC surveillance inquiry reveals use of mobile phone interception systems
Don’t spy on us: The day we fight back
Privacy International to ISC: UK intelligence laws unfit for modern digital era
East Timor takes on Australia over commercial spying allegations
South African Government still funding VASTech, knows previous financing was for mass surveillance
'Squeaky Dolphin' for sale: How surveillance companies are targeting social networks
Big data: A tool for development or a threat to privacy?
Obama's NSA reforms ignore real problem and leave foreigners unprotected
Pakistan-based human rights group files complaint against UK over mass surveillance
The UK & surveillance exports: A piece of CAEC
Development & privacy: A winning formula
German OECD NCP unwilling to investigate role of German company in human rights violations in Bahrain
Open-source software: Export Uncontrollable
France defies tide of accountability measures to expand surveillance powers
Despite Australian government's claims, our privacy rights are not insignificant
Biometrics: friend or foe of privacy?
Not just the NSA: Surveillance company selling system to spy on mobile phones worldwide
United Nations’ drones: A sign of what’s to come?
Ignoring repeated warnings, Argentina biometrics database leaks personal data
A guide to the Wassenaar Arrangement
Export controls and the implications for security research tools
International agreement reached controlling export of mass and intrusive surveillance technology