UK MPs are No longer Exempt from Surveillance

qodimage.php?theme=yougov&numr=5&totalresp=4036&title=a)+Does+it+bother+you+that+intelligence+services+could%2C+if+they+wanted+to%2C+be+spying+on+you+right+now%3F+b)+Do+you+think+they+are+in+fact+spying+on+you+personally+in+any+way%3F&opt1=a)+Yes+b)+Yes&votes1=505&opt2=a)+Yes+b)+No&votes2=1307&opt3=a)+No+b)+Yes&votes3=346&opt4=a)+No+b)+No&votes4=1794&opt5=Don%27t+know&votes5=84

YouGov: UK Public Opinion Divided.

James Eadie QC tells Investigatory Powers Tribunal the Wilson doctrine is unworkable in era of bulk interception by intelligence agencies

U.K. Government lawyers have said it is unfeasible for MPs and members of the Lords to be protected from snooping while there is bulk interception. The 50-year-old political convention that the UK’s intelligence agencies will not intercept the communications of MPs and members of the Lords cannot survive in an age of bulk interception, government lawyers have conceded.

The so-called Wilson doctrine “simply cannot work sensibly” when bulk interception is taking place, James Eadie QC told the investigatory powers tribunal – the court that hears complaints about the intelligence agencies.

Moreover, Eadie said, the doctrine does not have force in law and cannot impose legal restraints on the agencies.
The convention is named after the former Labour Prime Minister Harold Wilson, who told MPs in November 1966 that their phones would not be tapped. Tony Blair subsequently extended it to all forms of electronic communications.
The tribunal, which is being asked to rule that the doctrine is legally enforceable, has already heard that GCHQ changed its guidelines in March, when it decided not to apply the convention to members of the devolved parliaments in Scotland, Wales and Northern Ireland, and members of the European parliament.

That revelation has caused fury among members of those institutions: on Friday, the first minister of Scotland, Nicola Sturgeon, wrote to David Cameron asking for urgent clarification. Sturgeon said she accepted spying on MSPs could take place but only in “truly exceptional circumstances involving national security”. In the vast majority of cases “the confidentiality of communications between parliamentarians and their constituents is of the utmost importance”, she told the prime minister.
 
Labour’s Ian Murray, the shadow Scottish secretary, tabled a series of questions in the Commons asking the prime minister to confirm or deny whether Scottish MSPs, MEPs or Welsh parliamentarians had ever been spied on, and to confirm that GCHQ’s rules had changed.

The complaint at the IPT is being brought by the Green party parliamentarians Caroline Lucas and Lady Jones, and the former Respect MP, George Galloway, who argue that their communications must have been intercepted by the sort of programmes exposed by the CIA whistleblower Edward Snowden.

Eadie conceded that this may have happened under bulk interception operations authorised under the Regulation of Investigatory Powers Act (Ripa), but said “there is so much data flowing along the pipe” that it is not examined at the point of interception.
“The interception at that stage isn’t in any event objectionable, if one stands back and takes a broad view of the Wilson doctrine: it isn’t intelligible at the point of interception,” said Eadie.

While ministers have repeatedly reassured MPs and peers that the doctrine remains intact, their statements have been characterised by “ambiguities, at best, whether deliberate or otherwise”, Eadie said. And while the agencies consider the doctrine when drawing up policies governing interception practices, they also require great flexibility. Without this, “national security-critical” practices would become impermissible.
Guardian: http://bit.ly/1gttUth

 

« Fear Killer Robots
Nonstop Cyber Attack - Israel Builds Hack-Proof Defense »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

Elysium Analytics

Elysium Analytics

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Cyber Legion

Cyber Legion

Cyber Legion Ltd is a UK-based Cyber Security as a Service (CSaaS) start-up that provides IT security testing services to various organizations around the globe.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.

ACDS (Advanced Cyber Defence Systems)

ACDS (Advanced Cyber Defence Systems)

ACDS was founded in the belief that cyber security can be done better. We’re combining emerging technologies and proven methods to bring a new approach to tackling the growing threat landscape.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.