UK MPs are No longer Exempt from Surveillance

qodimage.php?theme=yougov&numr=5&totalresp=4036&title=a)+Does+it+bother+you+that+intelligence+services+could%2C+if+they+wanted+to%2C+be+spying+on+you+right+now%3F+b)+Do+you+think+they+are+in+fact+spying+on+you+personally+in+any+way%3F&opt1=a)+Yes+b)+Yes&votes1=505&opt2=a)+Yes+b)+No&votes2=1307&opt3=a)+No+b)+Yes&votes3=346&opt4=a)+No+b)+No&votes4=1794&opt5=Don%27t+know&votes5=84

YouGov: UK Public Opinion Divided.

James Eadie QC tells Investigatory Powers Tribunal the Wilson doctrine is unworkable in era of bulk interception by intelligence agencies

U.K. Government lawyers have said it is unfeasible for MPs and members of the Lords to be protected from snooping while there is bulk interception. The 50-year-old political convention that the UK’s intelligence agencies will not intercept the communications of MPs and members of the Lords cannot survive in an age of bulk interception, government lawyers have conceded.

The so-called Wilson doctrine “simply cannot work sensibly” when bulk interception is taking place, James Eadie QC told the investigatory powers tribunal – the court that hears complaints about the intelligence agencies.

Moreover, Eadie said, the doctrine does not have force in law and cannot impose legal restraints on the agencies.
The convention is named after the former Labour Prime Minister Harold Wilson, who told MPs in November 1966 that their phones would not be tapped. Tony Blair subsequently extended it to all forms of electronic communications.
The tribunal, which is being asked to rule that the doctrine is legally enforceable, has already heard that GCHQ changed its guidelines in March, when it decided not to apply the convention to members of the devolved parliaments in Scotland, Wales and Northern Ireland, and members of the European parliament.

That revelation has caused fury among members of those institutions: on Friday, the first minister of Scotland, Nicola Sturgeon, wrote to David Cameron asking for urgent clarification. Sturgeon said she accepted spying on MSPs could take place but only in “truly exceptional circumstances involving national security”. In the vast majority of cases “the confidentiality of communications between parliamentarians and their constituents is of the utmost importance”, she told the prime minister.
 
Labour’s Ian Murray, the shadow Scottish secretary, tabled a series of questions in the Commons asking the prime minister to confirm or deny whether Scottish MSPs, MEPs or Welsh parliamentarians had ever been spied on, and to confirm that GCHQ’s rules had changed.

The complaint at the IPT is being brought by the Green party parliamentarians Caroline Lucas and Lady Jones, and the former Respect MP, George Galloway, who argue that their communications must have been intercepted by the sort of programmes exposed by the CIA whistleblower Edward Snowden.

Eadie conceded that this may have happened under bulk interception operations authorised under the Regulation of Investigatory Powers Act (Ripa), but said “there is so much data flowing along the pipe” that it is not examined at the point of interception.
“The interception at that stage isn’t in any event objectionable, if one stands back and takes a broad view of the Wilson doctrine: it isn’t intelligible at the point of interception,” said Eadie.

While ministers have repeatedly reassured MPs and peers that the doctrine remains intact, their statements have been characterised by “ambiguities, at best, whether deliberate or otherwise”, Eadie said. And while the agencies consider the doctrine when drawing up policies governing interception practices, they also require great flexibility. Without this, “national security-critical” practices would become impermissible.
Guardian: http://bit.ly/1gttUth

 

« Fear Killer Robots
Nonstop Cyber Attack - Israel Builds Hack-Proof Defense »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

Deepnet Security

Deepnet Security

Deepnet Security is a leading security software developer and hardware provider in Multi-Factor Authentication (MFA), Single Sign-On (SSO) and Identity & Access Management (IAM).

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

SphereX Technologies

SphereX Technologies

SphereX is the first on-chain security solution for Web3 applications.

Accelerynt

Accelerynt

Accelerynt was founded with a singular purpose: help teams like yours build cybersecurity resilience.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.

Softcell Technologies Global

Softcell Technologies Global

Softcell is one of India's leading System Integrators. We serve enterprise customers in the areas of IT Security, Mobility, Optimised IT Infrastructure, Cloud and Engineering Services.

Freeze

Freeze

Freeze prevents attacks before they can start by finding, removing, and stopping the spread of information about your organization and employees.