Search
Content type: Report
PI has been fighting against police using intrusive & disproportionate surveillance technologies at protests around the world for years. Unregulated surveillance and indiscriminate intrusions on our privacy have a chilling effect on the right to freedom of assembly.
We've fought to uncover the types of technologies that police secretly deploy at protests, and we have detailed how protesters around the world can try to protect their intimate and sensitive data from being captured by the…
Content type: Long Read
We won our case against the UK’s Security Service (MI5) and the Secretary of State for the Home Department (SSHD). The Investigatory Powers Tribunal (IPT) – the judicial body responsible for monitoring UK’s intelligence and security agencies – held that MI5 acted unlawfully by knowingly holding people’s personal data in systems that were in breach of core legal requirements. MI5 unlawfully retained huge amounts of personal data between 2014 and 2019. During that period, and as a result of these…
Content type: Press release
In a landmark judgment, handed down today (Monday 30 January 2023), the Investigatory Powers Tribunal have found that there were “very serious failings” at the highest levels of MI5 to comply with privacy safeguards from as early as 2014, and that successive Home Secretaries did not to enquire into or resolve these long-standing rule-breaking despite obvious red flags.
Human rights organisations Liberty and Privacy International, who brought this significant legal case in January 2020, have…
Content type: Long Read
The rise of the gig-economy, a way of working relying on short term contracts and temporary jobs rather than on an employed workforce, has enabled the growth of a number of companies over the last few years. But without the rights that comes with full employment, gig economy workers today don't have access to essential protections.
In 2021, PI worked with ACDU and Worker Info Exchange to shed a light on the power imbalance between workers and gig economy platforms, exposing how workers find…
Content type: Advocacy
Following our comments on the draft Treaty text, PI's intervention, during the fourth session, focused on the provisions of the draft Treaty that deal with procedural measures and law enforcement. Specifically, we emphasised that the investigative measures contained in the draft Treaty should only be limited to serious offences only that are established by the Treaty. In addition, we urged delegates to remove a provision contained in the draft Treaty text that would allow authorities to exploit…
Content type: Long Read
On 18th January, it was announced that end-to-end encrypted iCloud services, Advanced Data Protection, would be offered to Apple users globally.The offer of such level of security globally, while overdue, is a key step to ensuring trust and confidence in today’s world. There are too many threats to our data and our rights. Twelve years ago, we called on Apple to encrypt iCloud storage for users all around the world.Why this is importantWhile privacy and security is often portrayed as opposite…
Content type: News & Analysis
We have been fighting for transparency and stronger regulation of the use of IMSI catchers by law enforcement in the UK since 2016. The UK police forces have been very secretive about the use of IMSI catchers – maintaining a strict “neither confirm nor deny” (NCND) policy. In our efforts to seek greater clarity we wrote to the UK body which monitors the use of covert investigatory powers, the Investigatory Powers Commissioner’s Office (IPCO), asking the Commissioner to revisit this…
Content type: Explainer
What are the key factors you should consider when using a messaging app?
There are two main aspects to consider when deciding on the messaging app you want to use:
whether it offers end to end encryption that protects the content of your communication; and
whether it collects any information beyond the content of the message, such as location, who you communicate with and other details referred to as ‘metadata’.
Why is encrypted messaging important?
Encryption is the process of…
Content type: Explainer
What protections might VPNs offer?
Adds an extra layer of encryption between your device and the VPN exit, hiding the content and metadata of your traffic, and true destination of your Internet browsing, from your internet service provider (ISP)
Hides your device’s IP address from websites & apps by routing your traffic via a third country, which can bypass country-based blocks
What don’t they offer?
Won’t hide your phone’s presence from IMSI catchers
Doesn’t protect against…
Content type: Long Read
The UK’s security services have the power to collect, analyse, and store huge amounts of personal data. They can target specific individuals, hack their computers, and intercept their data or communications, but they can also obtain personal datasets in bulk, intercept overseas communications in bulk, and collect huge swathes of communications data from telecomms providers.[1]
The public rightly expects that the vast amounts of personal data which agencies like MI5 collect and store will be…