UK’s Surveillance Dragnet Legal Challenge

qodimage.php?theme=yougov&numr=3&totalresp=4036&title=The+UK+Investigatory+Powers+Tribunal+(IPT)+has+just+ruled+that+the+UK+intelligence+agency+GCHQ+sharing+information+about+UK+citizens+with+America%27s+National+Security+Agency+did+not+comply+with+human+rights+and+was+unlawful.+Whatever+your+views+about+the+rights+and+wrongs%2C+do+you+think+it+helped+reduce+terrorism%3F&opt1=Yes&votes1=1977&opt2=No&votes2=1098&opt3=Don%27t+know&votes3=961

YouGov Survey following February 2015 Investigatory Powers Tribunal Ruling

A new legal challenge to UK intelligence agency surveillance practices has been filed in the UK by human rights organization Human Rights Watch and three unnamed individuals working in security research, investigative journalism and law. The action is aimed at ascertaining the scope of illegal data sharing that took place between the NSA and GCHQ.
 
The move follows a landmark legal ruling, back in February, when the IPT, the Investigatory Powers Tribunal court, which oversees the UK’s domestic intelligence agencies, ruled that prior to December 2014 GCHQ had acted illegally by receiving data from the NSA’s surveillance dragnets. It was the first time in the court’s 15-year history it had ruled against the agencies.

The claims filed today with the IPT will “seek to establish whether GCHQ has spied on the claimants, whether their communications were part of those unlawfully shared between NSA and GCHQ, and how the Tribunal is interpreting intelligence sharing”, according to pro-privacy organization Privacy International, which was one of the groups which brought the earlier legal challenge.

This June the IPT also found that GCHQ had acted unlawfully in handling intercepted communications data, although the court blamed “error” and “technical” failures for what it said were ‘breaches of internal policies’. That judgment also revealed that two human rights organizations’ communications had been targeted by the intelligence agencies, one of which, the IPT subsequently confirmed, was Amnesty International.

The revelation that the communications of human rights organizations were being targeted by government intelligence agencies is consistent with disclosures by NSA whistleblower Edward Snowden, who told a European parliamentary hearing back in April 2014 that the NSA had spied on human rights groups.
Today’s legal action seeks to probe for further confirmations of the scope of UK intelligence agency spying activity, such as whether journalists, lawyers and security experts have also been directly targeted by state surveillance agencies in the recent past.

Commenting on the action in a statement, Dinah PoKempner, general counsel at Human Rights Watch, said: “Surveillance on a massive scale and data swapping without suspicion or independent oversight pose a grave threat to the lives, safety and work of human rights defenders, researchers, journalists, lawyers and their sources.  We are bringing this case because those who work to protect human rights and expose abuses and war crimes depend on confidentiality of communications.”
In a crowd-sourced pincer movement, Privacy International has also today launched what it’s calling ‘phase two’ of an earlier attempt to make it easy for any web user to find out whether GCHQ spied on them. The organization previously set up an online form to gather sign-ups and authorizations for its legal team to act as a go between claimants and the IPT and GCHQ.

However, earlier this year, the IPT declined to hear consolidated claims, instead insisting that each potential claimant file his or her own complaint individually. Privacy International has now launched another online mechanism aimed at making the process of individual claim-filing easier for people wanting to request information on whether the UK spied on them.

As of last May more than 25,000 people had signed up under phase one of the campaign. Those people and organizations will now need to re-submit individual claims if they want the tribunal to take notice of their requests.
Techcrunch: http://tcrn.ch/1MGoV64

 

« State Proxies & Plausible Deniability: Challenging Conventional Wisdom
Vodafone Leaked Email on 'hacking' of Reporter »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI) is a premier federal law enforcement agency within the Department of Homeland Security (DHS).

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

VXRL

VXRL

VXRL is a Hong Kong-based cybersecurity company. We provide consulting services, penetration testing, and corporate training.

Infopulse

Infopulse

Infopulse is a global provider of Software Engineering, Cloud & IT Infrastructure Management, and Cybersecurity services.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Mosaic 451

Mosaic 451

Mosaic451 is a bespoke IT managed services provider and consultancy specializing in information security, operations and design.

Blockchains LLC

Blockchains LLC

Blockchains is committed to changing the world for the better. Using blockchain and other innovative technologies, we’ll build new systems, new security, and new interactions.

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

Crosspoint Capital Partners

Crosspoint Capital Partners

Crosspoint Capital Partners is a private equity investment firm focused on the cybersecurity and privacy sectors.

Meditology

Meditology

Meditology Services is a top-ranked provider of information risk management, cybersecurity, privacy, and regulatory compliance consulting services exclusively for healthcare organizations.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

Nine23

Nine23

Nine23 are a highly focused cyber security solutions company that defines, builds and manages innovative services, enabling end-users to use technology securely in today’s workplace.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.

Scalefusion

Scalefusion

Scalefusion provides a comprehensive suite of products engineered to simplify endpoint, user, and access management for IT teams.