UK’s Surveillance Dragnet Legal Challenge

qodimage.php?theme=yougov&numr=3&totalresp=4036&title=The+UK+Investigatory+Powers+Tribunal+(IPT)+has+just+ruled+that+the+UK+intelligence+agency+GCHQ+sharing+information+about+UK+citizens+with+America%27s+National+Security+Agency+did+not+comply+with+human+rights+and+was+unlawful.+Whatever+your+views+about+the+rights+and+wrongs%2C+do+you+think+it+helped+reduce+terrorism%3F&opt1=Yes&votes1=1977&opt2=No&votes2=1098&opt3=Don%27t+know&votes3=961

YouGov Survey following February 2015 Investigatory Powers Tribunal Ruling

A new legal challenge to UK intelligence agency surveillance practices has been filed in the UK by human rights organization Human Rights Watch and three unnamed individuals working in security research, investigative journalism and law. The action is aimed at ascertaining the scope of illegal data sharing that took place between the NSA and GCHQ.
 
The move follows a landmark legal ruling, back in February, when the IPT, the Investigatory Powers Tribunal court, which oversees the UK’s domestic intelligence agencies, ruled that prior to December 2014 GCHQ had acted illegally by receiving data from the NSA’s surveillance dragnets. It was the first time in the court’s 15-year history it had ruled against the agencies.

The claims filed today with the IPT will “seek to establish whether GCHQ has spied on the claimants, whether their communications were part of those unlawfully shared between NSA and GCHQ, and how the Tribunal is interpreting intelligence sharing”, according to pro-privacy organization Privacy International, which was one of the groups which brought the earlier legal challenge.

This June the IPT also found that GCHQ had acted unlawfully in handling intercepted communications data, although the court blamed “error” and “technical” failures for what it said were ‘breaches of internal policies’. That judgment also revealed that two human rights organizations’ communications had been targeted by the intelligence agencies, one of which, the IPT subsequently confirmed, was Amnesty International.

The revelation that the communications of human rights organizations were being targeted by government intelligence agencies is consistent with disclosures by NSA whistleblower Edward Snowden, who told a European parliamentary hearing back in April 2014 that the NSA had spied on human rights groups.
Today’s legal action seeks to probe for further confirmations of the scope of UK intelligence agency spying activity, such as whether journalists, lawyers and security experts have also been directly targeted by state surveillance agencies in the recent past.

Commenting on the action in a statement, Dinah PoKempner, general counsel at Human Rights Watch, said: “Surveillance on a massive scale and data swapping without suspicion or independent oversight pose a grave threat to the lives, safety and work of human rights defenders, researchers, journalists, lawyers and their sources.  We are bringing this case because those who work to protect human rights and expose abuses and war crimes depend on confidentiality of communications.”
In a crowd-sourced pincer movement, Privacy International has also today launched what it’s calling ‘phase two’ of an earlier attempt to make it easy for any web user to find out whether GCHQ spied on them. The organization previously set up an online form to gather sign-ups and authorizations for its legal team to act as a go between claimants and the IPT and GCHQ.

However, earlier this year, the IPT declined to hear consolidated claims, instead insisting that each potential claimant file his or her own complaint individually. Privacy International has now launched another online mechanism aimed at making the process of individual claim-filing easier for people wanting to request information on whether the UK spied on them.

As of last May more than 25,000 people had signed up under phase one of the campaign. Those people and organizations will now need to re-submit individual claims if they want the tribunal to take notice of their requests.
Techcrunch: http://tcrn.ch/1MGoV64

 

« State Proxies & Plausible Deniability: Challenging Conventional Wisdom
Vodafone Leaked Email on 'hacking' of Reporter »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

WireX Systems

WireX Systems

WireX is an innovative network intelligence and forensics company that is changing the way businesses resolve cyber-attacks.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

Torq

Torq

Torq's no-code automation modernizes how security & operations teams work with easy workflow building, limitless integrations and numerous pre-built templates.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Salus Cyber

Salus Cyber

Salus is a provider of world-class cyber security services, enabling our clients to identify and manage their cyber risks proactively and effectively.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.