UK IP Bill Will Allow Government To Spy On Journalists

The Investigatory Powers Bill will allow the UK Intelligence services and the Police to monitor and access journalist Internet, phone and data records. 

The House of Lords has peers who have warned against the Bill’s new computer hacking powers.
Peers have issued a serious warning that the government’s proposed “snooper’s charter” law could endanger journalists and their sources.

The House of Lords heard a strong cross-party plea that greater protection for journalists’ sources was needed in Theresa May’s investigatory powers bill, which seeks to extend the powers of state surveillance.

The committee stage of the bill recently heard statements from peers that “computer hacking” powers in the bill could allow the state to access a journalist’s notes or video footage stored on their phone, or use its microphone as a bug.

Ministers heard that the powers could lead to footage filmed by journalists of riots or demonstrations that turn violent being accessed remotely by the police despite safeguards in the bill that such state hacking would only be warranted in cases involving national security or serious crime.

They also heard warnings that safeguards in the bill were too weak to protect the confidentiality of journalistic and other sources from being identified through police and security service access to communications data, including phone and internet connection records, which will track an individual’s web history.

Lord Colville, a BBC producer and director, moved a cross-party amendment on Monday night calling for stronger protections in the bill for journalists’ sources and material, including a right for media organisations to be notified of a request for a warrant targeting them before it is approved by a judicial commissioner.

He told peers that he wanted to see protections for journalists already in the bill, covering state access to phone records and other communications data, extended to other state surveillance powers in the bill.

“I am particularly keen for the power for targeted equipment interference to be covered by a safeguard for sources. This could be material owned by the journalist or the source who is giving the information,” said Colville. “Targeted equipment interference includes the ability to use a mobile phone’s microphone as a bug. It could also include looking at a journalist’s electronic notebook and at footage shot in the course of a story, which, as a broadcast journalist, worries me a lot.”

Lord Black of Brentwood, an executive director of the Telegraph Media Group, supporting the cross-party amendment, said that the protection of sources was crucial for investigative reporting, whistleblowing and unfettered political debate.

He said there had been “unprecedented cooperation” across the media to seek strong protections for sources in the bill, citing recent examples where surveillance legislation had been used by police and councils to identify the sources of leaks despite previous specific assurances by ministers.

Black said existing safeguards in the bill only governed acquisition of communications data solely for the purpose of identifying or confirming the identity of a journalistic source.

“Crucially, it does not apply to acquisition of data for other purposes. But most importantly, it does not allow for prior notification to the media of an application to use the bill’s powers, and the opportunity for the media to make submissions on whether this will impact on the confidentiality of a source,” he said.

“It is all very well having judicial safeguards in place, but they will not work unless the judicial commissioner assessing the application has all the relevant information before applying his or her judgment and making an informed decision. After all, how can a judicial commissioner possibly know what they do not know? That is almost Kafkaesque.
“Without input from the media – and I recognise that there must be exceptions to this where a journalist or media organisation is under suspicion – they could not possibly, for instance, know how the use of surveillance could actually place the life of a source, or indeed of a journalist, in danger and other such considerations,” added Black.

For the government, Earl Howe said the bill had already been strengthened to protect journalists’ sources, including an overarching privacy clause which required the police and judicial commissioners to consider the public interest when obtaining and granting warrants.

But he rejected the amendment saying it was seeking “blanket protection” for journalists from legitimate investigation simply because of their chosen profession. The amendment was withdrawn pending further discussions but is likely to be pressed again at a later stage of the bill.

Guardian

« US and EU Implement Privacy Shield
UK National Crime Agency: Criminals Winning 'Cyber Arms Race' »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Caldew Consulting

Caldew Consulting

Caldew specialise in providing information assurance and cyber security consultancy, covering the full spectrum of the security life cycle.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Security Research Labs (SRLabs)

Security Research Labs (SRLabs)

Security Research Labs is a Berlin-based hacking research collective and consulting think tank.

OSSEC

OSSEC

OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS).

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

Seltek Technology Solutions

Seltek Technology Solutions

Seltek provides Digital Forensics, eDiscovery, Cybersecurity Assessments and IT Support services.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

British Blockchain Association (BBA)

British Blockchain Association (BBA)

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

FirstWave Cloud Technology

FirstWave Cloud Technology

FirstWave Cloud Technology is a global cyber security company which has been delivering Cybersecurity-as-a-service solutions to the market since 2004.

AirITSystems

AirITSystems

AirITSystems offer companies comprehensive IT security solutions that take all security considerations into account and are tailored to your business.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

VicOne

VicOne

With a vision to secure the vehicles of tomorrow, VicOne delivers a broad portfolio of cybersecurity software and services for the automotive industry.