UK Web Snooping Powers Are 'Undemocratic'

c542ec58-1075-11e5-_923137c.jpg

David Anderson QC

A review of phone and Internet surveillance says current "undemocratic and unnecessary" laws need a complete overhaul.
In the report, terror law expert David Anderson QC said that the government needed to do more to prove why security services should be able to monitor our web browsing histories for two years - as has been mooted.
He said that judges, rather than political figures, should issue warrants for interception.
And he recommended that they should lead a new oversight body - the Independent Surveillance and Intelligence Committee - to monitor activity.
Bulk surveillance should be more targeted and better overseen - but will continue.
Mr Anderson said: "The current law is fragmented, obscure, under constant challenge and variable in the protections that it affords the innocent. It is time for a clean slate."
Home Secretary Theresa May, in a speech to Parliament, said: "As (he) makes clear it is imperative that the use of sensitive powers are overseen and fully declared under arrangements set by Parliament. It is right that Parliament has the opportunity to debate those arrangements."
The UK Government can access the content of communications - text messages, emails - with a warrant signed by the Secretary of State.
Communications data - when and with whom your are communicating - can be accessed under RIPA, which is signed off by police forces.
How is this data gathered?
Much of the communications data is gathered through bulk interception - trawling the Internet for huge amounts of communication, which is then sifted for analysis.
Intercepted communications are handed over by phone companies, or by Internet companies; like Facebook, and this is at the request of the authorities. Currently, the latter is done on a voluntary basis.
Is everyone under surveillance, or only specific targets?
Not everyone is being monitored the whole time and GCHQ is not reading the emails of everyone in the country. However, many innocent people’s communications data is swept up by bulk intelligence. Bulk interception may be applied to the communications of specific targets to see whom they're communicating with.
Who has access to it?
Lots of government bodies have access, but it is most important to the work of the security services and police.
Is there proof that access to this data has stopped any terror attacks?
The security services and police say bulk interception is vital. 55% of the intelligence that GCHQ provides comes from bulk interception of communications data, according to the Anderson review.
The security services and police say that bulk interception has stopped terror attacks and other serious crime.
Who currently oversees this system, and are there any safeguards?
There are a variety of bodies, with the Parliamentary Intelligence and Security Committee the most prominent.
The Anderson reports suggests the creation of a new, overarching body called the Independent Surveillance and Intelligence committee, headed by a judge, not a politician. 
Why was this report commissioned?
It was a condition of emergency legislation passed last year by the government to compel phone companies to keep records for two years, after the European Court of Justice said that the existing European law was in fact unlawful.
What are the next steps for his recommendations?
The government will publish its draft surveillance bill – the so-called Snooper's charter – in the autumn. It will take into account Anderson's recommendations although they are just that: recommendations. There's no guarantee they will become law.
Sky: http://bit.ly/1Bds3lI

« The Bright Horizon For Information Security Jobs
North Korea Threatens US with Cyberattacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

Infopulse

Infopulse

Infopulse is a global provider of Software Engineering, Cloud & IT Infrastructure Management, and Cybersecurity services.

OXO Cybersecurity Lab

OXO Cybersecurity Lab

OXO Cybersecurity Lab is the first dedicated cybersecurity incubator in the Central & Eastern Europe region.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

CampusGuard

CampusGuard

CampusGuard focuses on the cybersecurity and compliance needs of campus-based organizations including higher education, healthcare, and state and local government.

AFRY

AFRY

AFRY is a world leading engineering company, trusted as a supplier of services and solutions within the industry, energy, and infrastructure sectors as well as for authorities.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.

Simpson Associates

Simpson Associates

Simpson Associates is a Data Transformation and managed services provider that helps organisations gain valuable insights from their data and make better-informed decisions.