UK MPs are No longer Exempt from Surveillance

qodimage.php?theme=yougov&numr=5&totalresp=4036&title=a)+Does+it+bother+you+that+intelligence+services+could%2C+if+they+wanted+to%2C+be+spying+on+you+right+now%3F+b)+Do+you+think+they+are+in+fact+spying+on+you+personally+in+any+way%3F&opt1=a)+Yes+b)+Yes&votes1=505&opt2=a)+Yes+b)+No&votes2=1307&opt3=a)+No+b)+Yes&votes3=346&opt4=a)+No+b)+No&votes4=1794&opt5=Don%27t+know&votes5=84

YouGov: UK Public Opinion Divided.

James Eadie QC tells Investigatory Powers Tribunal the Wilson doctrine is unworkable in era of bulk interception by intelligence agencies

U.K. Government lawyers have said it is unfeasible for MPs and members of the Lords to be protected from snooping while there is bulk interception. The 50-year-old political convention that the UK’s intelligence agencies will not intercept the communications of MPs and members of the Lords cannot survive in an age of bulk interception, government lawyers have conceded.

The so-called Wilson doctrine “simply cannot work sensibly” when bulk interception is taking place, James Eadie QC told the investigatory powers tribunal – the court that hears complaints about the intelligence agencies.

Moreover, Eadie said, the doctrine does not have force in law and cannot impose legal restraints on the agencies.
The convention is named after the former Labour Prime Minister Harold Wilson, who told MPs in November 1966 that their phones would not be tapped. Tony Blair subsequently extended it to all forms of electronic communications.
The tribunal, which is being asked to rule that the doctrine is legally enforceable, has already heard that GCHQ changed its guidelines in March, when it decided not to apply the convention to members of the devolved parliaments in Scotland, Wales and Northern Ireland, and members of the European parliament.

That revelation has caused fury among members of those institutions: on Friday, the first minister of Scotland, Nicola Sturgeon, wrote to David Cameron asking for urgent clarification. Sturgeon said she accepted spying on MSPs could take place but only in “truly exceptional circumstances involving national security”. In the vast majority of cases “the confidentiality of communications between parliamentarians and their constituents is of the utmost importance”, she told the prime minister.
 
Labour’s Ian Murray, the shadow Scottish secretary, tabled a series of questions in the Commons asking the prime minister to confirm or deny whether Scottish MSPs, MEPs or Welsh parliamentarians had ever been spied on, and to confirm that GCHQ’s rules had changed.

The complaint at the IPT is being brought by the Green party parliamentarians Caroline Lucas and Lady Jones, and the former Respect MP, George Galloway, who argue that their communications must have been intercepted by the sort of programmes exposed by the CIA whistleblower Edward Snowden.

Eadie conceded that this may have happened under bulk interception operations authorised under the Regulation of Investigatory Powers Act (Ripa), but said “there is so much data flowing along the pipe” that it is not examined at the point of interception.
“The interception at that stage isn’t in any event objectionable, if one stands back and takes a broad view of the Wilson doctrine: it isn’t intelligible at the point of interception,” said Eadie.

While ministers have repeatedly reassured MPs and peers that the doctrine remains intact, their statements have been characterised by “ambiguities, at best, whether deliberate or otherwise”, Eadie said. And while the agencies consider the doctrine when drawing up policies governing interception practices, they also require great flexibility. Without this, “national security-critical” practices would become impermissible.
Guardian: http://bit.ly/1gttUth

 

« Fear Killer Robots
Nonstop Cyber Attack - Israel Builds Hack-Proof Defense »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Digital Ship

Digital Ship

Digital Ship provides news, information, conferences and events focused on digital ship systems, information technology and security relating to maritime operations.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Injazat

Injazat

Injazat Data Systems is an industry recognized market leader in the Gulf region for Information Technology, Data Center and Managed Services.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) protects Singapore from external threats and safeguards its interests in areas related to terrorism, cyber security, other transnational threats, and geopolitics

In-Q-Tel (IQT)

In-Q-Tel (IQT)

IQT is the non-profit strategic investor that accelerates the development and delivery of cutting-edge technologies to U.S. government agencies that keep our nation safe.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

Klaatu IT Security (KITS)

Klaatu IT Security (KITS)

Klaatu IT Security is a boutique provider of cyber security services, empowering our clients to prioritise and reduce their cyber risk.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.