ip bill issues

Post on 12-Apr-2017

218 Views

Category:

Internet

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Draft Investigatory Powers Bill

New Web Surveillance Powers: ensuring public safety and catching criminals in the digital agePublic Policy Exchange

Grange Wellington Hotel, London

Ray Corrigan, The Open University

12 January 2016

Ray Corrigan, Open University

Universal agreementSerious threats – • terrorists• organised crime• dangerous dictators• …

SIS & LE need – • intelligence• skills• tools• resources

12/01/2016

Ray Corrigan, Open University

Unique opportunityMature debate (Andrew Parker)• Nature• Scope• Reach• Proportionality• Necessity• Legality• Clarity• Practicality• Etc

Historic first: Bring secret state intelligence operations fully under rule of law

12/01/2016

Ray Corrigan, Open University

What’s in the IP Bill?General protectionsTargeted and/or bulk:• interception• acquisition• retention • equipment interferenceBulk personal datasetsDual lock oversight

12/01/2016

Ray Corrigan, Open University

Bulk Equipment InterferenceIP Bill Part 6 Chapter 3Intelligence Services Act 1994 s7(4)(a)Police Act 1997 s93Code of Practice on Equipment Interference 2015 s7.11Hacking of overseas related communications, private information & equipment (s135 IP Bill)S135(4) authorises anyone to do anything to aid bulk EI warrant holder

12/01/2016

Ray Corrigan, Open University

Some immediate issuesVery short timescaleClarity e.g. 14 interlinked definitions part of “relevant communications data”

Including (s195): “data” includes any information which is not data

Diagram © Graham Smith Nov 2015http://cyberleagle.blogspot.co.uk/2015/11/never-mind-internet-connection-records.html

12/01/2016

Ray Corrigan, Open University

More issuesEffort to codify in law & expand existing activitiesExisting activities may not comply with rule of law (Entick v Carrington 1765 to Digital Rights Ireland 2014 & Schrems 2015 both in ECJ, to Zakharov 2015 in ECrtHR)

Trust gapEfficacy of bulk surveillance questionable (base rate fallacy)Targeted surveillance preferableWill need international cooperation & political signoff won’t washExtraterritoriality Others including despots watching for UK benchmark

12/01/2016

Ray Corrigan, Open University

Complex system securityComms infrastructure complex, fragile, insecureSecurity hard, complexity kills itPower to compromise security will create holes & unintended consequencesBad security hygieneObama review group: SIS should defend not attack networkSecurity of retained dataSecurity holes for exclusive use of good guys

12/01/2016

Ray Corrigan, Open University

Recommendation Remove Part 6, Chapter 3 on bulk equipment interference

12/01/2016

Ray Corrigan, Open University

IP Bill research groupInvestigatory Powers Bill Research Group resourceshttp://infolawcentre.blogs.sas.ac.uk/investigatory-powers-bill/investigatory-powers-bill-research-group-resources/

Source legislation and reviews for the Investigatory Powers Draft Billhttps://infolawcentre.blogs.sas.ac.uk/investigatory-powers-bill/source-legislation-for-the-investigatory-powers-draft-bill/

A clause-by-clause review of the Draft Investigatory Powers Billhttps://infolawcentre.blogs.sas.ac.uk/2015/12/23/some-things-old-some-things-new-a-clause-by-clause-review-of-the-draft-investigatory-powers-bill/

12/01/2016

Ray Corrigan, Open University

Phone tapping in ancient historyhttp://www.britishpathe.com/video/is-your-phone-tapped

12/01/2016

top related