Skip to main content
Home

Sign up to Newsletter

  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE
PI logo graphic

Metadata

Report and Analysis

Report
International Law Guide cover screenshot

PI’s Guide to International Law and Surveillance

PI’s Guide to International Law and Surveillance aims to provide the most hard-hitting results that reinforce and strengthen the core principles and standards of international law on surveillance. You can find UN resolutions, independent expert reports and international human rights bodies jurisprudence.

Continue reading
Long Read
Four wristbands in pastel colours

Buddi Limited - Immigration Enforcement's favourite tracking buddy

The privatisation of migration control and policing takes different shapes and forms.

The latest iteration comes in disguise – specifically, in four pastel colours: if you were to look at this company's main website, in fact, you'd only find wristbands and tools to monitor the well-being of elderly people who live alone. But as stated in their annual report, the majority of British company Buddi's revenue originates from the criminal justice market.

Continue reading
Report
illustration of 2 people alone in a field

Securing Privacy: PI on End-to-End Encryption

PI’s report on end-to-end encryption (E2EE) analyses and defends expanding the use of E2EE to protect our communications. It defines E2EE, delves into its human rights implications, briefly addresses some prominent proposals for government access to E2EE content, and concludes with PI’s recommendations regarding E2EE.

Continue reading

News

19th August 2021

Afghanistan: What Now After Two Decades of Building Data-Intensive Systems?

4th February 2021

South African Constitutional Court declares bulk surveillance powers unlawful

6th April 2020

We must protect people in vulnerable situations during lockdown or quarantine

24th February 2020

PI and Liberty submit a new legal challenge after MI5 admits that vast troves of personal data was held in “ungoverned spaces”

11th April 2019

Communities at risk: How governments are using tech to target migrants

11th December 2018

“Do no harm” in the digital age: Privacy and security cannot be ignored

Examples of Abuse

Want to know how this translate in the real world? Here is the latest example in the news.

Design flaw leaves Bluetooth devices vulnerable

An engineering and computer science professor and his team from The Ohio State University discovered a design flaw in low-powered Bluetooth devices that leaves them susceptible to hacking.

Read more
See more examples of abuse

Get Involved

  • Act with Us
  • Donate
  • Join
Back to top button

Newsletter

Click here to sign-up to our mailing-list!

Mastodon

Follow Us

  • Facebook
  • Instagram
  • Mastodon
  • RSS
  • Twitter
  • Youtube

Navigation

  • NEWS
  • ACT
  • CAMPAIGNS
  • LEARN
  • IMPACT
  • ABOUT
  • DONATE

How We Fight

  • Our Global Reach
  • Advocacy and Litigation
  • Research
  • Legal Action
  • Our Demands

About

  • Our Impact
  • Governance
  • People
  • Opportunities
  • Financial
  • Service Status

Privacy

  • How We Use Your Data
  • How We Learned
  • Why Cookies?!

Resources

  • Why Privacy Matters
  • Learn about issues
  • Learn about Data Protection
  • Browse Examples of Abuse
  • Listen to our podcast

Contact Us

62 Britton Street,
London, EC1M 5UY
UK

Charity Registration No: 1147471

Click here to contact us.

Click here for media and press enquiries.