Search
Content type: Long Read
Many people imagine intelligence sharing to be a practice whereby men in trench coats silently slide manilla envelopes containing anonymous tip-offs or intelligence reports marked TOP SECRET across tables in smoke-filled rooms.
While such practices certainly exist, they represent only a tiny slice of intelligence sharing activities, and are vastly overshadowed by the massive exchange of bulk unanlysed (raw) intelligence data that takes place between the UK and its Five Eyes allies.…
Content type: Press release
Britain's intelligence services do not need a warrant to receive unlimited bulk intelligence from the NSA and other foreign agencies, and can keep this data on a massive searchable database for up to two years, according to secret internal policies revealed today by human rights organisations.
Details of previously unknown internal policies, which GCHQ was forced to reveal during legal proceedings challenging their surveillance practices in the wake of the Snowden revelations, reveal…
Content type: Long Read
Privacy International in October 2014 made a criminal complaint to the National Cyber Crime Unit of the National Crime Agency, urging the immediate investigation of the unlawful surveillance of three Bahraini activists living in the UK by Bahraini authorities using the intrusive malware FinFisher supplied by British company Gamma.
Moosa Abd-Ali Ali, Jaafar Al Hasabi and Saeed Al-Shehabi, three pro-democracy Bahraini activists who were granted asylum in the UK, suffered variously…
Content type: News & Analysis
Last year, UK-based surveillance company Gamma TSE sold the Indonesian military US$ 6.7 million worth of equipment as part of the military's weapons modernisation effort. As early as 2005, Indonesian officials were soliciting the advice of a close partner of Gamma, Germany-based Elaman, to create technical surveillance unit (TSU), according to a white paper published as part of the WikiLeak SpyFiles and found in the Surveillance Industry Index.
Gamma and Elaman are…
Content type: News & Analysis
From Monday 14 to Friday 18 July, the British intelligence agencies and the Ministers responsible for them will be under the spotlight in an historic case to determine whether GCHQ's mass communications surveillance activities are a violation of Britain's human rights obligations.
Privacy International, along with Amnesty International, Liberty, the American Civil Liberties Union, Pakistani organisation Bytes for All and others, have brought the case before the Investigatory Powers Tribunal (…
Content type: News & Analysis
The following is an excerpt from an Op-Ed written in the New Zealand Herald by Privacy International's Legal Officer Anna Crowe:
Since the release of documents by Edward Snowden nearly a year ago, New Zealand has often been seen as a passive participant in the Five Eyes intelligence-sharing alliance, not unlike a good kid hanging out with the wrong crowd.
However, Snowden documents released last month and the news that New Zealand appears to be sharing intelligence…
Content type: News & Analysis
3 June 2014
The following article written by Carly Nyst, Privacy International's Legal Director, originially appeared on the Future Tense blog on Slate:
The news that the CIA is no longer using vaccination programs as a front for spying operations may come as a relief to many humanitarian workers. Yet their fears should not be completely assuaged, because the CIA’s activities—which undoubtedly threatened the safety of humanitarian workers and those they seek to help—pale in…
Content type: News & Analysis
After two years of pressing the Government to come clean on what, if anything, they are doing to investigate the potentially illegal export of the spyware FinFisher, a ruling today by the Administrative Court in Privacy International’s favour marks a significant turning point in our long-running campaign to bring more transparency and accountability to the surveillance industry.
The High Court slammed Her Majesty’s Revenue and Customs for not disclosing whether it was investigating…
Content type: News & Analysis
May Day serves as a timely reminder that across their history, intelligence services have targeted trade unions and other organisations working for progressive social change.
Intelligence agencies have sought to justify expanded surveillance capabilities on the basis of pressing national security threats, particularly terrorism; however, as the Snowden revelations have highlighted, intelligence agencies actually often use these capabilities to monitor organisations that promote human…
Content type: Press release
After challenging HMRC's blanket refusal to release information about the potentially unlawful export of Gamma International's FinFisher surveillance technology, the court has said that the case should proceed to trial and the grounds of Privacy International's challenge are of public importance.
Privacy International in February filed for judicial review of a decision of HMRC, the body responsible for enforcing export regulations, claiming the department is acting unlawfully in its refusal to…
Content type: News & Analysis
The latest Snowden document revelation, which shows how GCHQ and the NSA are conducting broad, real-time monitoring of YouTube, Facebook, and Blogger using a program called "Squeaky Dolphin," is the most recent demonstration of the immense interception capabilities of intelligence services.
Despite the program's cute name, "Squeaky Dolphin" is shocking in its ability to intercept raw data, which includes sensitive personal and location information, and keep tabs on people across the world who…
Content type: News & Analysis
The reforms announced today, while positive in some respects, are completely inadequate to address the heart of the problem. Privacy International welcomes steps to minimise the data collected and retained on non-Americans, and the call to increase transparency around requests made to communications service providers. However, in the face of mass surveillance, unaccountable intelligence sharing, arbitrary expansions of the definition of ’national security’, and debased encryption standards…