UK MPs are No longer Exempt from Surveillance

qodimage.php?theme=yougov&numr=5&totalresp=4036&title=a)+Does+it+bother+you+that+intelligence+services+could%2C+if+they+wanted+to%2C+be+spying+on+you+right+now%3F+b)+Do+you+think+they+are+in+fact+spying+on+you+personally+in+any+way%3F&opt1=a)+Yes+b)+Yes&votes1=505&opt2=a)+Yes+b)+No&votes2=1307&opt3=a)+No+b)+Yes&votes3=346&opt4=a)+No+b)+No&votes4=1794&opt5=Don%27t+know&votes5=84

YouGov: UK Public Opinion Divided.

James Eadie QC tells Investigatory Powers Tribunal the Wilson doctrine is unworkable in era of bulk interception by intelligence agencies

U.K. Government lawyers have said it is unfeasible for MPs and members of the Lords to be protected from snooping while there is bulk interception. The 50-year-old political convention that the UK’s intelligence agencies will not intercept the communications of MPs and members of the Lords cannot survive in an age of bulk interception, government lawyers have conceded.

The so-called Wilson doctrine “simply cannot work sensibly” when bulk interception is taking place, James Eadie QC told the investigatory powers tribunal – the court that hears complaints about the intelligence agencies.

Moreover, Eadie said, the doctrine does not have force in law and cannot impose legal restraints on the agencies.
The convention is named after the former Labour Prime Minister Harold Wilson, who told MPs in November 1966 that their phones would not be tapped. Tony Blair subsequently extended it to all forms of electronic communications.
The tribunal, which is being asked to rule that the doctrine is legally enforceable, has already heard that GCHQ changed its guidelines in March, when it decided not to apply the convention to members of the devolved parliaments in Scotland, Wales and Northern Ireland, and members of the European parliament.

That revelation has caused fury among members of those institutions: on Friday, the first minister of Scotland, Nicola Sturgeon, wrote to David Cameron asking for urgent clarification. Sturgeon said she accepted spying on MSPs could take place but only in “truly exceptional circumstances involving national security”. In the vast majority of cases “the confidentiality of communications between parliamentarians and their constituents is of the utmost importance”, she told the prime minister.
 
Labour’s Ian Murray, the shadow Scottish secretary, tabled a series of questions in the Commons asking the prime minister to confirm or deny whether Scottish MSPs, MEPs or Welsh parliamentarians had ever been spied on, and to confirm that GCHQ’s rules had changed.

The complaint at the IPT is being brought by the Green party parliamentarians Caroline Lucas and Lady Jones, and the former Respect MP, George Galloway, who argue that their communications must have been intercepted by the sort of programmes exposed by the CIA whistleblower Edward Snowden.

Eadie conceded that this may have happened under bulk interception operations authorised under the Regulation of Investigatory Powers Act (Ripa), but said “there is so much data flowing along the pipe” that it is not examined at the point of interception.
“The interception at that stage isn’t in any event objectionable, if one stands back and takes a broad view of the Wilson doctrine: it isn’t intelligible at the point of interception,” said Eadie.

While ministers have repeatedly reassured MPs and peers that the doctrine remains intact, their statements have been characterised by “ambiguities, at best, whether deliberate or otherwise”, Eadie said. And while the agencies consider the doctrine when drawing up policies governing interception practices, they also require great flexibility. Without this, “national security-critical” practices would become impermissible.
Guardian: http://bit.ly/1gttUth

 

« Fear Killer Robots
Nonstop Cyber Attack - Israel Builds Hack-Proof Defense »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Nameshield Group

Nameshield Group

Nameshield is one of most experienced domain name registrars, trademark protection specialists and managers of online reputational risk in the world today.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.

Cyber7

Cyber7

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio.

Avrem Technologies

Avrem Technologies

Avrem Technologies is a business IT and cybersecurity consulting firm. We design, implement, manage and monitor the networks, servers, computers and software that our clients rely on each day.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

LevelBlue

LevelBlue

LevelBlue simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research.

CliffGuard Cybersecurity

CliffGuard Cybersecurity

CliffGuard Cybersecurity deliver comprehensive services designed to protect your organization from the ever-evolving landscape of cyber threats.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.