UK’s Surveillance Dragnet Legal Challenge

qodimage.php?theme=yougov&numr=3&totalresp=4036&title=The+UK+Investigatory+Powers+Tribunal+(IPT)+has+just+ruled+that+the+UK+intelligence+agency+GCHQ+sharing+information+about+UK+citizens+with+America%27s+National+Security+Agency+did+not+comply+with+human+rights+and+was+unlawful.+Whatever+your+views+about+the+rights+and+wrongs%2C+do+you+think+it+helped+reduce+terrorism%3F&opt1=Yes&votes1=1977&opt2=No&votes2=1098&opt3=Don%27t+know&votes3=961

YouGov Survey following February 2015 Investigatory Powers Tribunal Ruling

A new legal challenge to UK intelligence agency surveillance practices has been filed in the UK by human rights organization Human Rights Watch and three unnamed individuals working in security research, investigative journalism and law. The action is aimed at ascertaining the scope of illegal data sharing that took place between the NSA and GCHQ.
 
The move follows a landmark legal ruling, back in February, when the IPT, the Investigatory Powers Tribunal court, which oversees the UK’s domestic intelligence agencies, ruled that prior to December 2014 GCHQ had acted illegally by receiving data from the NSA’s surveillance dragnets. It was the first time in the court’s 15-year history it had ruled against the agencies.

The claims filed today with the IPT will “seek to establish whether GCHQ has spied on the claimants, whether their communications were part of those unlawfully shared between NSA and GCHQ, and how the Tribunal is interpreting intelligence sharing”, according to pro-privacy organization Privacy International, which was one of the groups which brought the earlier legal challenge.

This June the IPT also found that GCHQ had acted unlawfully in handling intercepted communications data, although the court blamed “error” and “technical” failures for what it said were ‘breaches of internal policies’. That judgment also revealed that two human rights organizations’ communications had been targeted by the intelligence agencies, one of which, the IPT subsequently confirmed, was Amnesty International.

The revelation that the communications of human rights organizations were being targeted by government intelligence agencies is consistent with disclosures by NSA whistleblower Edward Snowden, who told a European parliamentary hearing back in April 2014 that the NSA had spied on human rights groups.
Today’s legal action seeks to probe for further confirmations of the scope of UK intelligence agency spying activity, such as whether journalists, lawyers and security experts have also been directly targeted by state surveillance agencies in the recent past.

Commenting on the action in a statement, Dinah PoKempner, general counsel at Human Rights Watch, said: “Surveillance on a massive scale and data swapping without suspicion or independent oversight pose a grave threat to the lives, safety and work of human rights defenders, researchers, journalists, lawyers and their sources.  We are bringing this case because those who work to protect human rights and expose abuses and war crimes depend on confidentiality of communications.”
In a crowd-sourced pincer movement, Privacy International has also today launched what it’s calling ‘phase two’ of an earlier attempt to make it easy for any web user to find out whether GCHQ spied on them. The organization previously set up an online form to gather sign-ups and authorizations for its legal team to act as a go between claimants and the IPT and GCHQ.

However, earlier this year, the IPT declined to hear consolidated claims, instead insisting that each potential claimant file his or her own complaint individually. Privacy International has now launched another online mechanism aimed at making the process of individual claim-filing easier for people wanting to request information on whether the UK spied on them.

As of last May more than 25,000 people had signed up under phase one of the campaign. Those people and organizations will now need to re-submit individual claims if they want the tribunal to take notice of their requests.
Techcrunch: http://tcrn.ch/1MGoV64

 

« State Proxies & Plausible Deniability: Challenging Conventional Wisdom
Vodafone Leaked Email on 'hacking' of Reporter »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

H3C Group

H3C Group

H3C provides a full range of Computer, Storage, Networking and Security solutions.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Rostelecom

Rostelecom

Rostelecom is Russia’s largest integrated provider of digital services and solutions, covering all market segments including consumer, governmental and private organizations.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

Oregon Systems

Oregon Systems

Oregon Systems is a Regional Leader & Distributor with value added services for OT, IoT, IIoT & IT Cybersecurity products, Solutions & professional services throughout the middle-east region.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.