Search
Content type: Long Read
In July 2015, representatives of a private company met in a parking lot in Pretoria, South Africa to sell phone tapping technology to an interested private buyer. What they did not know was that this buyer was a police officer. The police had been tipped off that the company was looking to offload the surveillance technology, an IMSI catcher, to anyone who would buy it. It is illegal to operate such surveillance technology as a private citizen in South Africa, and illegal to buy…
Content type: Long Read
This piece was written by Ashley Gorski, who is an attorney at the American Civil Liberties Union, and PI legal officer Scarlet Kim and originally appeared in The Guardian here.
In recent weeks, the Hollywood film about Edward Snowden and the movement to pardon the NSA whistleblower have renewed worldwide attention on the scope and substance of government surveillance programs. In the United States, however, the debate has often been a narrow one, focused on the…
Content type: Long Read
This week, Privacy International, together with nine other international human rights NGOs, filed submissions with the European Court of Human Rights. Our case challenges the UK government’s bulk interception of internet traffic transiting fiber optic cables landing in the UK and its access to information similarly intercepted in bulk by the US government, which were revealed by the Snowden disclosures. To accompany our filing, we have produced two infographics to illustrate the…
Content type: Press release
Key points
Privacy International, Liberty, Amnesty International, and seven other human rights organizations challenge UK mass surveillance and UK access to US mass surveillance at the European Court of Human Rights
This is the first case before the European Court of Human Rights to directly challenge UK and US mass surveillance revealed by the Snowden disclosures
National courts and oversight bodies have failed to rein in mass surveillance practices that impact hundreds of millions of…
Content type: Long Read
This piece originally appeared here.
On both sides of the Atlantic, we are witnessing the dramatic expansion of government hacking powers. In the United States, a proposed amendment to Rule 41 of the Federal Rules of Criminal Procedure would permit the government to obtain a warrant, in certain circumstances, to hack unspecified numbers of electronic devices anywhere in the world. Meanwhile, across the pond, the British Parliament is currently debating the Investigatory…
Content type: News & Analysis
Remember when the world didn't know what Prism was? Those were the days. While privacy advocates, civil libertarians, and technologists had suspected or posited the existence of an extensive surveillance regime operated by the U.S. government, few knew the details and the extent of the operation.
Undoubtedly, we know more now than we did a week ago about the National Security Agency's covert operations and how the agency routinely spies on nearly anyone in the world. The public, many…
Content type: News & Analysis
Thank you to those of you who joined our campaign, 'Did GCHQ Illegally Spy on You?'. If you made a claim to the Investigatory Powers Tribunal (IPT) - the court that hears claims about surveillance by public bodies, including the intelligence agencies - to find out if GCHQ has illegally obtained your communications, you will have probably received a letter or email from the IPT by now. We've written a 'Frequently Asked Questions' (FAQ) to help clarify what the ruling means and how you can now…
Content type: News & Analysis
Image source
This is a guest post by Zoë Blackler.
If you want to know how the UK came to be the most watched nation in the world, with CCTV on every corner, you need to go back to 1942: the now ubiquitous policing aid was first developed for use in missile testing by the German military.
Tear gas, GPS trackers, pain rays, and surveillance drones - technologies developed by the military for use against foreign enemies have a habit of finding their way into the hands…
Content type: News & Analysis
Should the European Union agree to legitimise trade with a country that refuses to adhere to European legal standards? This is the fundamental question that will be addressed at tomorrow’s meeting among European privacy regulators when they publish their opinion on the data-sharing agreement known as the ‘Privacy Shield’, the replacement to the failed ‘Safe Harbour’ agreement.
Background
Many of the world’s largest companies, such as Google and Facebook, store their customers’ data in…
Content type: News & Analysis
Section 217 and the Draft Code of Practice on Interception of Communications
Tech giants including Apple Inc, Facebook Inc, Google Inc, Microsoft Corp, Twitter Inc and Yahoo Inc have been openly critical of the UK Government’s Investigatory Power Bill (IPBill). However, what has not been highlighted is a deeply concerning Draft Code of Practice on Interception on Communications, which will not only affect telecommunications companies small and large, but result in costs to the…
Content type: News & Analysis
We already know that in some countries, like the UK, governments are drafting laws to legalise and legitimise their incredible surveillance powers. In the U.S. we are seeing legislation that is using remarkably similar language on encryption and surveillance. The next phase of the cryptowars has openly begun.
Yesterday what is being called the Feinstein-Burr decryption Bill was introduced into the US Senate and leaked online. Whilst the short title ‘Compliance with Court Orders…
Content type: News & Analysis
This article originally appeared in Indepedent Voices here.
Since the horrific Brussels and Istanbul attacks we've all looked at our daily lives and saw vulnerability and risk. Where else could terrorists attack?
We begin to formulate security responses. CCTV, communication, surveillance, identity cards - they aren't panning out. Perhaps we need to take things to the next level? How about we build an uber anti-terrorism system that grinds all our data together and identifies the people…
Content type: Long Read
Written by: Centre for Internet and Society
This guest piece was written by representatives of the Centre for Internet and Society (CIS). It does not necessarily reflect the views or position of Privacy International.
Introduction
As part of the State of the Surveillance project, CIS conducted a review of surveillance law, policy, projects, and trends in India. Below we provide a snap shot of key legal provisions governing surveillance in India and touch on…
Content type: News & Analysis
We are on the verge of a revolution in government surveillance powers.
Previously it was simple. Governments demanded access to our homes. Then our communications. Then they demanded access to whatever companies held on us. Then they complained that technology was making this harder, and demanded that technology be designed for them. With every step, safeguards were reduced.
Next governments will demand that companies betray their users and use our technologies to compromise us.
In…
Content type: Press release
Today’s report by the Joint Committee on the Investigatory Powers Bill is the third committee report that concludes that the Home Office has failed to provide a coherent surveillance framework.
The Joint Committee on the Investigatory Powers Bill today published a 198 page report following a short consultation period between November and January. Their key findings are that:
- the definitions in the bill need much work, including a meaningful and comprehensible…
Content type: News & Analysis
How not to do data-driven due diligence
A powerful new VICE News investigation has blown open the secretive world of risk management and the most influential database you've never heard of: World-Check.
Over 300 government and intelligence agencies, 49 of the 50 biggest banks, and 9 of the top 10 global law firms use World-Check to conduct due diligence, including checking compliance with anti-terrorism financing and sanctions laws. World-Check gathers and analyses open source…