Enforcing Magna Carta in the Age of Cyberwarfare

Martin_436x2823.jpg

All roads round Runnymede are closed today as the Queen, the Prime Minister, the Archbishop of Canterbury and the Master of the Rolls commemorate the 800th anniversary of Magna Carta at Runnymede. 

Sunday Worship on BBC4 on 14th came from Odiham, whence King John had set out to meet his Barons. It featured a splendid address from The Master of the Temple where the Barons, including 7 Bishops, had plotted their tactics). He reminded us of the background, particularly the role of Stephen Langton, (the Archbishop King John never wanted). 

Langton believed that laws came from God, not the King. He not only helped with the drafting, he arranged for Magna Carta and the more significant revised versions under Henry III, to be copied and "published" across the Kingdom via the Church - to prevent the Monarch/State from backtracking. Today some would argue that the occupants of Buckingham and St James's palaces have joined those of Lambeth Palace among the defenders of civil liberties against threats from those who now occupy the site of the Palace of Whitehall and their allies and accomplices in the Palace of Westminster. 

When Sir Tim Berners Lee, the Stephen Langton of the Internet, received the freedom of the City of London his address to the Common Council on the role of the City in creating and preserving the rule of law instead of the state led through to the potential role of London in the on-line world. His calls for a global on-line On-line Bills of Rights have been well covered by others. This might be impossible to achieve in practice and perhaps we need "merely" to apply the same law on-line as off-line. 

That does, however, require abiding by the spirit, not just the letter, of Magna Carta. That means looking at the theological basis of what Stephen Langton was trying to achieve. We also need to remember that the current threats to civil liberties are very similar to those that led up to the Glorious Revolution of 1688. James II had lost the popularity he had won by taking charge of the efforts to put out the Great Fire (blamed at the time of the terrorists of the day) and had put down the original London-wide Penny Post (supposedly used for scandalous letters between lovers as well as for business), because his men could not steam open the letters. 

In a modern secular society it is doubtful that most of the population would be happy with the Archbishop of Canterbury as the prime guardian of Civil Liberties against the state, but the fourth key player in the celebrations at Runnymede is the Master of the Rolls, the third most senior Judge in Britain (there have been  calls for the oversight of privacy and surveillance in the UK to be properly resourced and report via the Master of the Rolls). That leaves open the question as to whom the Master should be responsible (other than God). Surely,  the ultimate oversight for the policing be a committee of both Houses of Parliament?

The Home Secretary's statement to parliament on David Anderson's report into the practical working of the UK's surveillance law, published a week before the Magna Carta celebrations, should be the starting gun for an open and constructive debate. The overall objective should be to better reconcile the protection of the public from fear and abuse (whether from on-line stalkers or those planning terrorism) with the protection of "peaceful dissidents" and whistle-blowers from action supposedly designed to address organised crime or threats to society as a whole. We should also remember that most of the public wants more, not less surveillance (including for the reasons well-illustrated in the current Channel 5, Caught on Camera, series). 

The arguments should not, therefore be less about the degree of surveillance that is reasonable or acceptable. They should be more about the accountability of those organising it or demanding access to the results. 

Those who understand how modern legislation is negotiated, drafted and implemented might reflect how little has changed in 800 years.
Computer Weekly: http://bit.ly/1QZLYWX

 

« MI6: Snowden Files Hacked to Find Western Spies
US Government Employee Hack & the Future of Warfare »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Information Commissioner's Office (ICO) - UK

Information Commissioner's Office (ICO) - UK

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.

MetaWeb Ventures

MetaWeb Ventures

MetaWeb Ventures is a global venture capital firm focused on pre-seed and seed investments in crypto start-ups.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

Sekoia.io

Sekoia.io

Sekoia.io is a European cybersecurity company whose mission is to develop the best protection capabilities against cyber-attacks.

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.