UK Web Snooping Powers Are 'Undemocratic'

c542ec58-1075-11e5-_923137c.jpg

David Anderson QC

A review of phone and Internet surveillance says current "undemocratic and unnecessary" laws need a complete overhaul.
In the report, terror law expert David Anderson QC said that the government needed to do more to prove why security services should be able to monitor our web browsing histories for two years - as has been mooted.
He said that judges, rather than political figures, should issue warrants for interception.
And he recommended that they should lead a new oversight body - the Independent Surveillance and Intelligence Committee - to monitor activity.
Bulk surveillance should be more targeted and better overseen - but will continue.
Mr Anderson said: "The current law is fragmented, obscure, under constant challenge and variable in the protections that it affords the innocent. It is time for a clean slate."
Home Secretary Theresa May, in a speech to Parliament, said: "As (he) makes clear it is imperative that the use of sensitive powers are overseen and fully declared under arrangements set by Parliament. It is right that Parliament has the opportunity to debate those arrangements."
The UK Government can access the content of communications - text messages, emails - with a warrant signed by the Secretary of State.
Communications data - when and with whom your are communicating - can be accessed under RIPA, which is signed off by police forces.
How is this data gathered?
Much of the communications data is gathered through bulk interception - trawling the Internet for huge amounts of communication, which is then sifted for analysis.
Intercepted communications are handed over by phone companies, or by Internet companies; like Facebook, and this is at the request of the authorities. Currently, the latter is done on a voluntary basis.
Is everyone under surveillance, or only specific targets?
Not everyone is being monitored the whole time and GCHQ is not reading the emails of everyone in the country. However, many innocent people’s communications data is swept up by bulk intelligence. Bulk interception may be applied to the communications of specific targets to see whom they're communicating with.
Who has access to it?
Lots of government bodies have access, but it is most important to the work of the security services and police.
Is there proof that access to this data has stopped any terror attacks?
The security services and police say bulk interception is vital. 55% of the intelligence that GCHQ provides comes from bulk interception of communications data, according to the Anderson review.
The security services and police say that bulk interception has stopped terror attacks and other serious crime.
Who currently oversees this system, and are there any safeguards?
There are a variety of bodies, with the Parliamentary Intelligence and Security Committee the most prominent.
The Anderson reports suggests the creation of a new, overarching body called the Independent Surveillance and Intelligence committee, headed by a judge, not a politician. 
Why was this report commissioned?
It was a condition of emergency legislation passed last year by the government to compel phone companies to keep records for two years, after the European Court of Justice said that the existing European law was in fact unlawful.
What are the next steps for his recommendations?
The government will publish its draft surveillance bill – the so-called Snooper's charter – in the autumn. It will take into account Anderson's recommendations although they are just that: recommendations. There's no guarantee they will become law.
Sky: http://bit.ly/1Bds3lI

« The Bright Horizon For Information Security Jobs
North Korea Threatens US with Cyberattacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

Thermo Systems

Thermo Systems

Thermo Systems is a design-build control systems engineering and construction firm. Capabilties include industrial control system cybersecurity.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Secure Systems Innovation Corp (SSIC)

Secure Systems Innovation Corp (SSIC)

SSIC is a cyber risk analytics firm whose mission is to improve how businesses manage cyber risk through the power of data analytics. SSIC developed the X-Analytics cyber risk decisioning platform.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

Datastream Cyber Insurance

Datastream Cyber Insurance

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.