UK’s Surveillance Dragnet Legal Challenge

qodimage.php?theme=yougov&numr=3&totalresp=4036&title=The+UK+Investigatory+Powers+Tribunal+(IPT)+has+just+ruled+that+the+UK+intelligence+agency+GCHQ+sharing+information+about+UK+citizens+with+America%27s+National+Security+Agency+did+not+comply+with+human+rights+and+was+unlawful.+Whatever+your+views+about+the+rights+and+wrongs%2C+do+you+think+it+helped+reduce+terrorism%3F&opt1=Yes&votes1=1977&opt2=No&votes2=1098&opt3=Don%27t+know&votes3=961

YouGov Survey following February 2015 Investigatory Powers Tribunal Ruling

A new legal challenge to UK intelligence agency surveillance practices has been filed in the UK by human rights organization Human Rights Watch and three unnamed individuals working in security research, investigative journalism and law. The action is aimed at ascertaining the scope of illegal data sharing that took place between the NSA and GCHQ.
 
The move follows a landmark legal ruling, back in February, when the IPT, the Investigatory Powers Tribunal court, which oversees the UK’s domestic intelligence agencies, ruled that prior to December 2014 GCHQ had acted illegally by receiving data from the NSA’s surveillance dragnets. It was the first time in the court’s 15-year history it had ruled against the agencies.

The claims filed today with the IPT will “seek to establish whether GCHQ has spied on the claimants, whether their communications were part of those unlawfully shared between NSA and GCHQ, and how the Tribunal is interpreting intelligence sharing”, according to pro-privacy organization Privacy International, which was one of the groups which brought the earlier legal challenge.

This June the IPT also found that GCHQ had acted unlawfully in handling intercepted communications data, although the court blamed “error” and “technical” failures for what it said were ‘breaches of internal policies’. That judgment also revealed that two human rights organizations’ communications had been targeted by the intelligence agencies, one of which, the IPT subsequently confirmed, was Amnesty International.

The revelation that the communications of human rights organizations were being targeted by government intelligence agencies is consistent with disclosures by NSA whistleblower Edward Snowden, who told a European parliamentary hearing back in April 2014 that the NSA had spied on human rights groups.
Today’s legal action seeks to probe for further confirmations of the scope of UK intelligence agency spying activity, such as whether journalists, lawyers and security experts have also been directly targeted by state surveillance agencies in the recent past.

Commenting on the action in a statement, Dinah PoKempner, general counsel at Human Rights Watch, said: “Surveillance on a massive scale and data swapping without suspicion or independent oversight pose a grave threat to the lives, safety and work of human rights defenders, researchers, journalists, lawyers and their sources.  We are bringing this case because those who work to protect human rights and expose abuses and war crimes depend on confidentiality of communications.”
In a crowd-sourced pincer movement, Privacy International has also today launched what it’s calling ‘phase two’ of an earlier attempt to make it easy for any web user to find out whether GCHQ spied on them. The organization previously set up an online form to gather sign-ups and authorizations for its legal team to act as a go between claimants and the IPT and GCHQ.

However, earlier this year, the IPT declined to hear consolidated claims, instead insisting that each potential claimant file his or her own complaint individually. Privacy International has now launched another online mechanism aimed at making the process of individual claim-filing easier for people wanting to request information on whether the UK spied on them.

As of last May more than 25,000 people had signed up under phase one of the campaign. Those people and organizations will now need to re-submit individual claims if they want the tribunal to take notice of their requests.
Techcrunch: http://tcrn.ch/1MGoV64

 

« State Proxies & Plausible Deniability: Challenging Conventional Wisdom
Vodafone Leaked Email on 'hacking' of Reporter »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Xcina Consulting (XCL)

Xcina Consulting (XCL)

Xcina Consulting provides high quality business and technology risk assurance and advisory services.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

TeskaLabs

TeskaLabs

TeskaLabs is a software vendor of cybersecurity and data privacy products.

BetaDen

BetaDen

BetaDen provides a revolutionary platform for businesses to develop next-generation technology, such as the internet of things and industry 4.0.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

Industrial Control System Information Sharing and Analysis Center (ICS-ISAC)

ICS-ISAC is a non-profit, public/private Knowledge Sharing Center established to help facilities develop situational awareness in support of local, national and international security.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.