Advanced Search
Content Type: Examples
Article extract:
"Anti-smoking campaigners have expressed alarm that "big tobacco" has been employing two of the world's most powerful lobbying companies in a bid to stymie the introduction of plain packaging for cigarettes.
Crosby Textor, which has been hired by the Conservative party to provide "strategic direction" at the next election, has played a powerful behind-the-scenes role in mobilising opposition to the Australian government's plans for plain packaging, which became law on…
Content Type: Examples
Article extract:
"The lobbying firm founded by election guru Lynton Crosby is reported to have advised private healthcare providers on how to exploit failings in the NHS..."
"...Crosby Textor advised an umbrella group of private healthcare providers on how to exploit perceived “failings”, according to a leaked document obtained by the Guardian.
The newspaper published extracts from a slideshow presentation produced for the H5 Private Healthcare Alliance, which stated that people believe the…
Content Type: Examples
Article extract:
"The lobbying firm run by Boris Johnson’s close ally Sir Lynton Crosby has secretly built a network of unbranded “news” pages on Facebook for dozens of clients ranging from the Saudi government to major polluters, a Guardian investigation has found.
In the most complete account yet of CTF Partners’ outlook and strategy, current and former employees of the campaign consultancy have painted a picture of a business that appears to have professionalised online disinformation,…
Content Type: News & Analysis
Around the world, from North America to Europe and Asia, governments are starting to roll out smart meters. While the technology promises increased energy efficiency through greater consumer control over energy consumption, smart meters also raise serious privacy concerns. Smart meters collect energy usage data at high frequencies - typically every five, fifteen or 30 minutes. That level of granularity reveals how much electricity is being used in a home and when, which in turn can paint an…
Content Type: Long Read
Introduction
A growing number of governments around the world are embracing hacking to facilitate their surveillance activities. Yet hacking presents unique and grave threats to our privacy and security. It is far more intrusive than any other surveillance technique, capable of accessing information sufficient to build a detailed profile of a person, as well as altering or deleting that information. At the same time, hacking not only undermines the security of targeted systems, but also has…
Content Type: Long Read
This piece was orignally published in Slate in February 2017
In 2015, the FBI obtained a warrant to hack the devices of every visitor to a child pornography website. On the basis of this single warrant, the FBI ultimately hacked more than 8,700 computers, resulting in a wave of federal prosecutions. The vast majority of these devices—over 83 percent—were located outside the United States, in more than 100 different countries. Now, we are in the midst of the first cases…
Content Type: Long Read
This piece originally appeared here.
On both sides of the Atlantic, we are witnessing the dramatic expansion of government hacking powers. In the United States, a proposed amendment to Rule 41 of the Federal Rules of Criminal Procedure would permit the government to obtain a warrant, in certain circumstances, to hack unspecified numbers of electronic devices anywhere in the world. Meanwhile, across the pond, the British Parliament is currently debating the Investigatory…