Enforcing Magna Carta in the Age of Cyberwarfare

Martin_436x2823.jpg

All roads round Runnymede are closed today as the Queen, the Prime Minister, the Archbishop of Canterbury and the Master of the Rolls commemorate the 800th anniversary of Magna Carta at Runnymede. 

Sunday Worship on BBC4 on 14th came from Odiham, whence King John had set out to meet his Barons. It featured a splendid address from The Master of the Temple where the Barons, including 7 Bishops, had plotted their tactics). He reminded us of the background, particularly the role of Stephen Langton, (the Archbishop King John never wanted). 

Langton believed that laws came from God, not the King. He not only helped with the drafting, he arranged for Magna Carta and the more significant revised versions under Henry III, to be copied and "published" across the Kingdom via the Church - to prevent the Monarch/State from backtracking. Today some would argue that the occupants of Buckingham and St James's palaces have joined those of Lambeth Palace among the defenders of civil liberties against threats from those who now occupy the site of the Palace of Whitehall and their allies and accomplices in the Palace of Westminster. 

When Sir Tim Berners Lee, the Stephen Langton of the Internet, received the freedom of the City of London his address to the Common Council on the role of the City in creating and preserving the rule of law instead of the state led through to the potential role of London in the on-line world. His calls for a global on-line On-line Bills of Rights have been well covered by others. This might be impossible to achieve in practice and perhaps we need "merely" to apply the same law on-line as off-line. 

That does, however, require abiding by the spirit, not just the letter, of Magna Carta. That means looking at the theological basis of what Stephen Langton was trying to achieve. We also need to remember that the current threats to civil liberties are very similar to those that led up to the Glorious Revolution of 1688. James II had lost the popularity he had won by taking charge of the efforts to put out the Great Fire (blamed at the time of the terrorists of the day) and had put down the original London-wide Penny Post (supposedly used for scandalous letters between lovers as well as for business), because his men could not steam open the letters. 

In a modern secular society it is doubtful that most of the population would be happy with the Archbishop of Canterbury as the prime guardian of Civil Liberties against the state, but the fourth key player in the celebrations at Runnymede is the Master of the Rolls, the third most senior Judge in Britain (there have been  calls for the oversight of privacy and surveillance in the UK to be properly resourced and report via the Master of the Rolls). That leaves open the question as to whom the Master should be responsible (other than God). Surely,  the ultimate oversight for the policing be a committee of both Houses of Parliament?

The Home Secretary's statement to parliament on David Anderson's report into the practical working of the UK's surveillance law, published a week before the Magna Carta celebrations, should be the starting gun for an open and constructive debate. The overall objective should be to better reconcile the protection of the public from fear and abuse (whether from on-line stalkers or those planning terrorism) with the protection of "peaceful dissidents" and whistle-blowers from action supposedly designed to address organised crime or threats to society as a whole. We should also remember that most of the public wants more, not less surveillance (including for the reasons well-illustrated in the current Channel 5, Caught on Camera, series). 

The arguments should not, therefore be less about the degree of surveillance that is reasonable or acceptable. They should be more about the accountability of those organising it or demanding access to the results. 

Those who understand how modern legislation is negotiated, drafted and implemented might reflect how little has changed in 800 years.
Computer Weekly: http://bit.ly/1QZLYWX

 

« MI6: Snowden Files Hacked to Find Western Spies
US Government Employee Hack & the Future of Warfare »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

Peris.ai

Peris.ai

Peris.ai is a cybersecurity as a service startup that protects businesses and organizations from online threats.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

Borwell

Borwell

Borwell delivers software and IT solutions to the UK MoD and to UK Government departments, which are secure by design.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

Securitybricks

Securitybricks

Securitybricks specialize in cloud security and compliance. Our mission is to automate regulatory compliance backed by human validation.

Datagroup

Datagroup

Datagroup makes IT easy. Our IT experts ensure that your technology is always up to date with perfectly customized solutions.