ip bill issues
Post on 12-Apr-2017
218 Views
Preview:
TRANSCRIPT
Draft Investigatory Powers Bill
New Web Surveillance Powers: ensuring public safety and catching criminals in the digital agePublic Policy Exchange
Grange Wellington Hotel, London
Ray Corrigan, The Open University
12 January 2016
Ray Corrigan, Open University
Universal agreementSerious threats – • terrorists• organised crime• dangerous dictators• …
SIS & LE need – • intelligence• skills• tools• resources
12/01/2016
Ray Corrigan, Open University
Unique opportunityMature debate (Andrew Parker)• Nature• Scope• Reach• Proportionality• Necessity• Legality• Clarity• Practicality• Etc
Historic first: Bring secret state intelligence operations fully under rule of law
12/01/2016
Ray Corrigan, Open University
What’s in the IP Bill?General protectionsTargeted and/or bulk:• interception• acquisition• retention • equipment interferenceBulk personal datasetsDual lock oversight
12/01/2016
Ray Corrigan, Open University
Bulk Equipment InterferenceIP Bill Part 6 Chapter 3Intelligence Services Act 1994 s7(4)(a)Police Act 1997 s93Code of Practice on Equipment Interference 2015 s7.11Hacking of overseas related communications, private information & equipment (s135 IP Bill)S135(4) authorises anyone to do anything to aid bulk EI warrant holder
12/01/2016
Ray Corrigan, Open University
Some immediate issuesVery short timescaleClarity e.g. 14 interlinked definitions part of “relevant communications data”
Including (s195): “data” includes any information which is not data
Diagram © Graham Smith Nov 2015http://cyberleagle.blogspot.co.uk/2015/11/never-mind-internet-connection-records.html
12/01/2016
Ray Corrigan, Open University
More issuesEffort to codify in law & expand existing activitiesExisting activities may not comply with rule of law (Entick v Carrington 1765 to Digital Rights Ireland 2014 & Schrems 2015 both in ECJ, to Zakharov 2015 in ECrtHR)
Trust gapEfficacy of bulk surveillance questionable (base rate fallacy)Targeted surveillance preferableWill need international cooperation & political signoff won’t washExtraterritoriality Others including despots watching for UK benchmark
12/01/2016
Ray Corrigan, Open University
Complex system securityComms infrastructure complex, fragile, insecureSecurity hard, complexity kills itPower to compromise security will create holes & unintended consequencesBad security hygieneObama review group: SIS should defend not attack networkSecurity of retained dataSecurity holes for exclusive use of good guys
12/01/2016
Ray Corrigan, Open University
Recommendation Remove Part 6, Chapter 3 on bulk equipment interference
12/01/2016
Ray Corrigan, Open University
IP Bill research groupInvestigatory Powers Bill Research Group resourceshttp://infolawcentre.blogs.sas.ac.uk/investigatory-powers-bill/investigatory-powers-bill-research-group-resources/
Source legislation and reviews for the Investigatory Powers Draft Billhttps://infolawcentre.blogs.sas.ac.uk/investigatory-powers-bill/source-legislation-for-the-investigatory-powers-draft-bill/
A clause-by-clause review of the Draft Investigatory Powers Billhttps://infolawcentre.blogs.sas.ac.uk/2015/12/23/some-things-old-some-things-new-a-clause-by-clause-review-of-the-draft-investigatory-powers-bill/
12/01/2016
Ray Corrigan, Open University
Phone tapping in ancient historyhttp://www.britishpathe.com/video/is-your-phone-tapped
12/01/2016
top related