UK Web Snooping Powers Are 'Undemocratic'

c542ec58-1075-11e5-_923137c.jpg

David Anderson QC

A review of phone and Internet surveillance says current "undemocratic and unnecessary" laws need a complete overhaul.
In the report, terror law expert David Anderson QC said that the government needed to do more to prove why security services should be able to monitor our web browsing histories for two years - as has been mooted.
He said that judges, rather than political figures, should issue warrants for interception.
And he recommended that they should lead a new oversight body - the Independent Surveillance and Intelligence Committee - to monitor activity.
Bulk surveillance should be more targeted and better overseen - but will continue.
Mr Anderson said: "The current law is fragmented, obscure, under constant challenge and variable in the protections that it affords the innocent. It is time for a clean slate."
Home Secretary Theresa May, in a speech to Parliament, said: "As (he) makes clear it is imperative that the use of sensitive powers are overseen and fully declared under arrangements set by Parliament. It is right that Parliament has the opportunity to debate those arrangements."
The UK Government can access the content of communications - text messages, emails - with a warrant signed by the Secretary of State.
Communications data - when and with whom your are communicating - can be accessed under RIPA, which is signed off by police forces.
How is this data gathered?
Much of the communications data is gathered through bulk interception - trawling the Internet for huge amounts of communication, which is then sifted for analysis.
Intercepted communications are handed over by phone companies, or by Internet companies; like Facebook, and this is at the request of the authorities. Currently, the latter is done on a voluntary basis.
Is everyone under surveillance, or only specific targets?
Not everyone is being monitored the whole time and GCHQ is not reading the emails of everyone in the country. However, many innocent people’s communications data is swept up by bulk intelligence. Bulk interception may be applied to the communications of specific targets to see whom they're communicating with.
Who has access to it?
Lots of government bodies have access, but it is most important to the work of the security services and police.
Is there proof that access to this data has stopped any terror attacks?
The security services and police say bulk interception is vital. 55% of the intelligence that GCHQ provides comes from bulk interception of communications data, according to the Anderson review.
The security services and police say that bulk interception has stopped terror attacks and other serious crime.
Who currently oversees this system, and are there any safeguards?
There are a variety of bodies, with the Parliamentary Intelligence and Security Committee the most prominent.
The Anderson reports suggests the creation of a new, overarching body called the Independent Surveillance and Intelligence committee, headed by a judge, not a politician. 
Why was this report commissioned?
It was a condition of emergency legislation passed last year by the government to compel phone companies to keep records for two years, after the European Court of Justice said that the existing European law was in fact unlawful.
What are the next steps for his recommendations?
The government will publish its draft surveillance bill – the so-called Snooper's charter – in the autumn. It will take into account Anderson's recommendations although they are just that: recommendations. There's no guarantee they will become law.
Sky: http://bit.ly/1Bds3lI

« The Bright Horizon For Information Security Jobs
North Korea Threatens US with Cyberattacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

ERMProtect

ERMProtect

ERMProtect is a leading Information Security & Training Company that helps businesses improve their cybersecurity posture and comply with regulations.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

Salt Security

Salt Security

Salt Security protects the APIs that are the core of every SaaS, web, mobile, microservices and IoT application.

ePLDT

ePLDT

ePLDT delivers best-in-class digital business solutions that include Cloud, Cyber Security, purpose-built Data Center facilities and Managed IT Services.

Aries Security

Aries Security

Aries Security provides a premiere cyber training range and skills assessment suite and develops content for all levels of ability.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Iris Powered by Generali

Iris Powered by Generali

Iris Powered by Generali is an identity theft resolution provider. Our offering combines expert assistance and support with user-friendly identity protection technology.