UK MPs are No longer Exempt from Surveillance

qodimage.php?theme=yougov&numr=5&totalresp=4036&title=a)+Does+it+bother+you+that+intelligence+services+could%2C+if+they+wanted+to%2C+be+spying+on+you+right+now%3F+b)+Do+you+think+they+are+in+fact+spying+on+you+personally+in+any+way%3F&opt1=a)+Yes+b)+Yes&votes1=505&opt2=a)+Yes+b)+No&votes2=1307&opt3=a)+No+b)+Yes&votes3=346&opt4=a)+No+b)+No&votes4=1794&opt5=Don%27t+know&votes5=84

YouGov: UK Public Opinion Divided.

James Eadie QC tells Investigatory Powers Tribunal the Wilson doctrine is unworkable in era of bulk interception by intelligence agencies

U.K. Government lawyers have said it is unfeasible for MPs and members of the Lords to be protected from snooping while there is bulk interception. The 50-year-old political convention that the UK’s intelligence agencies will not intercept the communications of MPs and members of the Lords cannot survive in an age of bulk interception, government lawyers have conceded.

The so-called Wilson doctrine “simply cannot work sensibly” when bulk interception is taking place, James Eadie QC told the investigatory powers tribunal – the court that hears complaints about the intelligence agencies.

Moreover, Eadie said, the doctrine does not have force in law and cannot impose legal restraints on the agencies.
The convention is named after the former Labour Prime Minister Harold Wilson, who told MPs in November 1966 that their phones would not be tapped. Tony Blair subsequently extended it to all forms of electronic communications.
The tribunal, which is being asked to rule that the doctrine is legally enforceable, has already heard that GCHQ changed its guidelines in March, when it decided not to apply the convention to members of the devolved parliaments in Scotland, Wales and Northern Ireland, and members of the European parliament.

That revelation has caused fury among members of those institutions: on Friday, the first minister of Scotland, Nicola Sturgeon, wrote to David Cameron asking for urgent clarification. Sturgeon said she accepted spying on MSPs could take place but only in “truly exceptional circumstances involving national security”. In the vast majority of cases “the confidentiality of communications between parliamentarians and their constituents is of the utmost importance”, she told the prime minister.
 
Labour’s Ian Murray, the shadow Scottish secretary, tabled a series of questions in the Commons asking the prime minister to confirm or deny whether Scottish MSPs, MEPs or Welsh parliamentarians had ever been spied on, and to confirm that GCHQ’s rules had changed.

The complaint at the IPT is being brought by the Green party parliamentarians Caroline Lucas and Lady Jones, and the former Respect MP, George Galloway, who argue that their communications must have been intercepted by the sort of programmes exposed by the CIA whistleblower Edward Snowden.

Eadie conceded that this may have happened under bulk interception operations authorised under the Regulation of Investigatory Powers Act (Ripa), but said “there is so much data flowing along the pipe” that it is not examined at the point of interception.
“The interception at that stage isn’t in any event objectionable, if one stands back and takes a broad view of the Wilson doctrine: it isn’t intelligible at the point of interception,” said Eadie.

While ministers have repeatedly reassured MPs and peers that the doctrine remains intact, their statements have been characterised by “ambiguities, at best, whether deliberate or otherwise”, Eadie said. And while the agencies consider the doctrine when drawing up policies governing interception practices, they also require great flexibility. Without this, “national security-critical” practices would become impermissible.
Guardian: http://bit.ly/1gttUth

 

« Fear Killer Robots
Nonstop Cyber Attack - Israel Builds Hack-Proof Defense »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

Olfeo

Olfeo

Olfeo is a content filtering software vendor. Our proxy and filtering solution helps our customers to manage, monitor and secure their Internet traffic.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

CybernetIQ

CybernetIQ

CLAW by CybernetIQ is the industry's most advanced SOAR platform helping unify all cybersecurity tools under one umbrella and providing organizations faster, better and more accurate cybersecurity.

Towerwall

Towerwall

Towerwall offers a comprehensive suite of security services and solutions using best-of-breed tools and information security services.

Oivan

Oivan

Oivan harnesses the strengths of the web, mobile, cloud, cybersecurity, and blockchain technologies to help our clients to launch transformative digital services.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

Eurotech

Eurotech

Eurotech provides Edge Computers and IoT solutions. We help to connect your assets and make them smarter through secure and agnostic hardware and software technologies.

Incyber

Incyber

Incyber is a fully integrated network and cybersecurity solutions provider contracted to safeguard public and private enterprise, high value data and sensitive industries.

Cyber Guru

Cyber Guru

Cyber Guru is an effective cybersecurity awareness training platform, enabling organisations to increase their resistance to cyber-attacks by changing employee behaviour.

ShieldHaus

ShieldHaus

Protect your business from evolving cyber threats with ShieldHaus. Our real-time, AI-powered security solutions block malicious IPs, phishing attempts, and harmful domains to safeguard your systems an

Cyberscope

Cyberscope

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments.