UK IP Bill Will Allow Government To Spy On Journalists

The Investigatory Powers Bill will allow the UK Intelligence services and the Police to monitor and access journalist Internet, phone and data records. 

The House of Lords has peers who have warned against the Bill’s new computer hacking powers.
Peers have issued a serious warning that the government’s proposed “snooper’s charter” law could endanger journalists and their sources.

The House of Lords heard a strong cross-party plea that greater protection for journalists’ sources was needed in Theresa May’s investigatory powers bill, which seeks to extend the powers of state surveillance.

The committee stage of the bill recently heard statements from peers that “computer hacking” powers in the bill could allow the state to access a journalist’s notes or video footage stored on their phone, or use its microphone as a bug.

Ministers heard that the powers could lead to footage filmed by journalists of riots or demonstrations that turn violent being accessed remotely by the police despite safeguards in the bill that such state hacking would only be warranted in cases involving national security or serious crime.

They also heard warnings that safeguards in the bill were too weak to protect the confidentiality of journalistic and other sources from being identified through police and security service access to communications data, including phone and internet connection records, which will track an individual’s web history.

Lord Colville, a BBC producer and director, moved a cross-party amendment on Monday night calling for stronger protections in the bill for journalists’ sources and material, including a right for media organisations to be notified of a request for a warrant targeting them before it is approved by a judicial commissioner.

He told peers that he wanted to see protections for journalists already in the bill, covering state access to phone records and other communications data, extended to other state surveillance powers in the bill.

“I am particularly keen for the power for targeted equipment interference to be covered by a safeguard for sources. This could be material owned by the journalist or the source who is giving the information,” said Colville. “Targeted equipment interference includes the ability to use a mobile phone’s microphone as a bug. It could also include looking at a journalist’s electronic notebook and at footage shot in the course of a story, which, as a broadcast journalist, worries me a lot.”

Lord Black of Brentwood, an executive director of the Telegraph Media Group, supporting the cross-party amendment, said that the protection of sources was crucial for investigative reporting, whistleblowing and unfettered political debate.

He said there had been “unprecedented cooperation” across the media to seek strong protections for sources in the bill, citing recent examples where surveillance legislation had been used by police and councils to identify the sources of leaks despite previous specific assurances by ministers.

Black said existing safeguards in the bill only governed acquisition of communications data solely for the purpose of identifying or confirming the identity of a journalistic source.

“Crucially, it does not apply to acquisition of data for other purposes. But most importantly, it does not allow for prior notification to the media of an application to use the bill’s powers, and the opportunity for the media to make submissions on whether this will impact on the confidentiality of a source,” he said.

“It is all very well having judicial safeguards in place, but they will not work unless the judicial commissioner assessing the application has all the relevant information before applying his or her judgment and making an informed decision. After all, how can a judicial commissioner possibly know what they do not know? That is almost Kafkaesque.
“Without input from the media – and I recognise that there must be exceptions to this where a journalist or media organisation is under suspicion – they could not possibly, for instance, know how the use of surveillance could actually place the life of a source, or indeed of a journalist, in danger and other such considerations,” added Black.

For the government, Earl Howe said the bill had already been strengthened to protect journalists’ sources, including an overarching privacy clause which required the police and judicial commissioners to consider the public interest when obtaining and granting warrants.

But he rejected the amendment saying it was seeking “blanket protection” for journalists from legitimate investigation simply because of their chosen profession. The amendment was withdrawn pending further discussions but is likely to be pressed again at a later stage of the bill.

Guardian

« US and EU Implement Privacy Shield
UK National Crime Agency: Criminals Winning 'Cyber Arms Race' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

SevenShift

SevenShift

SevenShift is a security consulting firm with a wealth of experience in the worlds of Cybersecurity and Internet of Things (IoT).

International Accreditation Forum (IAF)

International Accreditation Forum (IAF)

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Somerville

Somerville

Somerville are a full service IT partner with over 40 years experience delivering exceptional service and value to our customers.

National Information and Cybersecurity Council (NICC)

National Information and Cybersecurity Council (NICC)

National Information and Cybersecurity Council is a leading collaborative effort between Government of India and Industry to raise Cybersecurity awareness nationally.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.