Enforcing Magna Carta in the Age of Cyberwarfare

Martin_436x2823.jpg

All roads round Runnymede are closed today as the Queen, the Prime Minister, the Archbishop of Canterbury and the Master of the Rolls commemorate the 800th anniversary of Magna Carta at Runnymede. 

Sunday Worship on BBC4 on 14th came from Odiham, whence King John had set out to meet his Barons. It featured a splendid address from The Master of the Temple where the Barons, including 7 Bishops, had plotted their tactics). He reminded us of the background, particularly the role of Stephen Langton, (the Archbishop King John never wanted). 

Langton believed that laws came from God, not the King. He not only helped with the drafting, he arranged for Magna Carta and the more significant revised versions under Henry III, to be copied and "published" across the Kingdom via the Church - to prevent the Monarch/State from backtracking. Today some would argue that the occupants of Buckingham and St James's palaces have joined those of Lambeth Palace among the defenders of civil liberties against threats from those who now occupy the site of the Palace of Whitehall and their allies and accomplices in the Palace of Westminster. 

When Sir Tim Berners Lee, the Stephen Langton of the Internet, received the freedom of the City of London his address to the Common Council on the role of the City in creating and preserving the rule of law instead of the state led through to the potential role of London in the on-line world. His calls for a global on-line On-line Bills of Rights have been well covered by others. This might be impossible to achieve in practice and perhaps we need "merely" to apply the same law on-line as off-line. 

That does, however, require abiding by the spirit, not just the letter, of Magna Carta. That means looking at the theological basis of what Stephen Langton was trying to achieve. We also need to remember that the current threats to civil liberties are very similar to those that led up to the Glorious Revolution of 1688. James II had lost the popularity he had won by taking charge of the efforts to put out the Great Fire (blamed at the time of the terrorists of the day) and had put down the original London-wide Penny Post (supposedly used for scandalous letters between lovers as well as for business), because his men could not steam open the letters. 

In a modern secular society it is doubtful that most of the population would be happy with the Archbishop of Canterbury as the prime guardian of Civil Liberties against the state, but the fourth key player in the celebrations at Runnymede is the Master of the Rolls, the third most senior Judge in Britain (there have been  calls for the oversight of privacy and surveillance in the UK to be properly resourced and report via the Master of the Rolls). That leaves open the question as to whom the Master should be responsible (other than God). Surely,  the ultimate oversight for the policing be a committee of both Houses of Parliament?

The Home Secretary's statement to parliament on David Anderson's report into the practical working of the UK's surveillance law, published a week before the Magna Carta celebrations, should be the starting gun for an open and constructive debate. The overall objective should be to better reconcile the protection of the public from fear and abuse (whether from on-line stalkers or those planning terrorism) with the protection of "peaceful dissidents" and whistle-blowers from action supposedly designed to address organised crime or threats to society as a whole. We should also remember that most of the public wants more, not less surveillance (including for the reasons well-illustrated in the current Channel 5, Caught on Camera, series). 

The arguments should not, therefore be less about the degree of surveillance that is reasonable or acceptable. They should be more about the accountability of those organising it or demanding access to the results. 

Those who understand how modern legislation is negotiated, drafted and implemented might reflect how little has changed in 800 years.
Computer Weekly: http://bit.ly/1QZLYWX

 

« MI6: Snowden Files Hacked to Find Western Spies
US Government Employee Hack & the Future of Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Lacuna Talent

Lacuna Talent

Lacuna Talent delivers the combined power of Via Resource, the international Cyber Security recruiter, and Lacuna Talent, the Specialist AI/Data recruiter.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Grayshift

Grayshift

Grayshift is the leading provider of mobile device digital forensics, specializing in lawful access and extraction.

Rostelecom Solar

Rostelecom Solar

Rostelecom-Solar is a Cyber Security Company, providing software and managed detection and response (MDR) services to protect critical information from advanced cyber threats.

Kape Technologies

Kape Technologies

Kape Technologies is a cybersecurity company focused on helping consumers around the world have a better digital experience with greater privacy and protection.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

Cenobe Cyber Security

Cenobe Cyber Security

Cenobe provides customized solutions to keep you ahead of potential threats and ensure the security of your organization's systems and data.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.