The Investigatory Powers Bill recommendations for the Labour Party. March 2016

Size: px
Start display at page:

Download "The Investigatory Powers Bill recommendations for the Labour Party. March 2016"

Transcription

1 The Investigatory Powers Bill recommendations for the Labour Party March 2016

2 Executive Summary The Investigatory Powers Bill (IPB) marks the culmination of the debate about mass surveillance in the UK. On the one hand, it is an extraordinary step forward. It brings the activities of GCHQ, Britain s communications spy agency, out into the open and gives them a firm legal basis. On the other hand, the Bill enshrines into law many of the surveillance practices that have generated public concern, while offering inadequate safeguards to prevent their misuse. Worse still, the effectiveness of the proposed powers remains in doubt. There is strong reason to believe they are at best a distraction from effective counterterrorism techniques, and at worse wholly counter-productive. This briefing covers a range of issues in the debate around the IPB, including the Bill s likely impact on privacy, the potential for misuse and the proposed oversight system, encryption, and the efficacy of the powers. LCHR supports a Bill that would switch to a system of targeted surveillance, incorporating the highest standard of safeguards and protecting encryption. To this end, we recommend Labour MPs pursue the following changes to the IPB: Remove the section of the IPB proposing bulk retention of internet connection records in its entirety. Replace provisions for bulk communications intercept with targeted intercept only, abolishing the system of general warrants and replacing them with a system of individual warrants issued on the basis of reasonable suspicion. This will be more effective and avoid alienating communities. Switch from a system of ministerial authorisation of interception warrants to a system of judicial authorisation, with a judge playing the exclusive oversight role. Failing this, ensure judges have the scope (including access to all relevant material) to conduct a full merits review of warrants rather than just examine the procedure. Ensure the new Investigatory Powers Commission is properly resourced. Reform the Intelligence and Security Committee so that it is chaired by an opposition MP, information cannot be withheld from it, and its membership selection is not subject to a prime ministerial veto. Ensure the IPB protects encryption by removing provisions that may force companies to provide back doors to encrypted data for the security services.

3 Introduction The Labour Campaign for Human Rights has been campaigning on mass surveillance since our formation in August Since then we have attempted to stimulate discussion and debate within Labour about its efficacy and its impact on privacy. We have met Labour MPs on both sides of the debate, hosted parliamentary events, authored articles, consulted experts, produced briefings, and taken the discussions to dozens of CLPs through our workshop events. The Investigatory Powers Bill marks the culmination of the debate about mass surveillance in the UK. On the one hand, it is an extraordinary step forward. It brings the activities of GCHQ, Britain s communications spy agency, out into the open and gives them a firm legal basis. On the other hand, the Bill enshrines into law many of the surveillance practices that have generated public concern, while offering inadequate safeguards to prevent their misuse. Worse still, the effectiveness of the proposed powers remains in doubt. There is strong reason to believe they are at best a distraction from effective counter-terrorism techniques, and at worse wholly counter-productive. The IPB should not be viewed in isolation. It is one element of a broader strategy by the Tory government to strengthen executive power. Taken together with the Trade Union Bill, plans to abolish the Human Rights Act, freedom of information review and boundary changes, this Bill is part of a bigger story that ends with a dramatic shift of power away from political opposition, civil society, and citizens, and towards the government. This briefing covers a range of issues in the debate around the IPB, including the Bill s likely impact on privacy, the potential for misuse and the proposed oversight system, encryption, and the efficacy of the powers. The IPB s impact on privacy Part 6 of the Investigatory Powers Bill enshrines in law the sweeping powers of mass surveillance that were first revealed to the public by Edward Snowden in Instead of using individual warrants to conduct targeted surveillance on the basis of suspicion, under this system approximately twenty general warrants are used to target entire communications systems or sections of the public. GCHQ is believed to collect, en masse, approximately 50 billion communications events per day, including s, browsing records, webpages, locations, and other data. 1 The vast majority of this data is collected from people who are under no suspicion. While these powers are focused on external communications, in practice the nature of the modern internet means even communications that are domestic will often pass through servers based abroad, thus allowing them to be treated as external. Moreover, according to the Draft Bill, material collected in this way can be examined for general purposes for which there is currently little guidance. As Liberty has stated in its evidence to the Joint Committee on the Draft Investigatory Powers Bill, the definition of this could in theory be as broad in its nature as the three grounds on which the warrant was originally justified. 2 Bulk data collection is highly invasive. It allows the data of millions of innocent people to be gathered and potentially examined either by computer software or human analysts. This includes information about which websites we visit, where we are located when we send messages, and the content of our s. From this information a detailed portrait can be drawn of our lives, including about our personal relationships, financial details, health and legal issues, and daily movements. 1 Evidence by Liberty to Joint Committee on the Investigatory Powers Bill, 82 ( 2 Evidence by Liberty to Joint Committee on the Investigatory Powers Bill, 84 (

4 The Bill also includes a new provision to allow for the bulk retention of internet connection records. This means every internet user s browsing histories will be stored automatically by internet service providers for 12 months. Considering the variety of modern internet uses, this provides for a further intrusion into people s daily lives. As the respected technology blogger Paul Bernal has said, Monitoring the websites we visit isn t like having an itemised telephone bill it s like following a person around as they visit the shops go the pub, go to the cinema, turn on their radio, go to the park, visit the travel agent, look at books in the library and so forth. 3 It also helps to build a picture of trends and patterns in people s lives over time. Even worse, a plethora of public authorities will have access to these internet connection records, including HMRC and the Food Standards Agency. Moreover, a warrant will not be required for access, with access instead being authorised by a designated person within the relevant public authority. LCHR believes both the bulk intercept powers and the bulk retention of internet connection records provided for in this Bill represent an unacceptable infringement on privacy, fundamentally upsetting the correct balance of power between state and citizen in a modern, healthy democracy. LCHR s recommendation: - Remove the section of the IPB proposing bulk retention of internet connection records in its entirety. - Replace provisions for bulk communications intercept with targeted intercept only, abolishing the system of general warrants and replacing them with a system of individual warrants issued on the basis of reasonable suspicion. Potential for misuse and the oversight system Potential for misuse The security services have a long history of misusing their powers, including in cases that have affected the Labour movement directly. For example, intelligence agencies carried out surveillance on trade unions in the 1970s and 1980s as part of counter-subversion activities meant to halt the spread of communism. Even MI5 operatives sometimes thought the government went too far in applying this to industrial disputes, and the future director general commented in 1977 that senior officials tended to equate subversion with activity which threatens a Government s polices. 4 This surveillance of the unions reached a peak during the miners strike, under the orders of the Thatcher government. The security services tapped the phones of the entire national and local leadership of the National Miners Union (NUM), rented the building opposite the NUM s headquarters in Sheffield in order to spy at close quarters, and bugged a hotel and restaurant frequented by top union officials. 5 The police and security services infiltrated the union s highest levels in the 1970s, the NUM s president was himself an informant for Special Branch, 6 while a chief executive who accused the union leadership of corruption and embezzlement was later accused in parliament of having been an MI5 agent. 7 Further details on the police s surveillance of unions after the Cold War was revealed by whistleblower Peter Francis, who said that in his career as an undercover police officer he 3 A few words on Internet Connection Records, Paul Bernal 4 Christopher Andrew, The Threat of Subversion, MI5 History. 5 Seumas Milne, The Enemy Within (2014), p BBC, Former NUM chief was police informer,24 October Early Day Motion 2352, Mrs Stella Rimington and the Miners' Union, 20 July

5 spied on members of unions including: Unison, the Fire Brigades Union, Communication Workers Union, National Union of Teachers, and the National Union of Students. 8 He confirmed the identity of former undercover officer Mark Jenner, who posed as a joiner and used a false name to join UCATT, a construction workers union, and gather information on its members some of whom were added to blacklists. 9 The police and intelligence services also have a history of spying on Labour politicians. The police special branch carried out covert monitoring of 10 MPs during the 1990s all of them from the Labour Party, according to recent revelations by former undercover officer Peter Francis. Several became cabinet ministers in this period: Jack Straw, Harriet Harman and Peter Hain. The files contained personal information on the politicians finances and private lives. 10 Labour MP Sadiq Khan was also bugged by police while visiting prison in 2005 and 2006 as part of his campaign to help a terror suspect avoid extradition to the United States. 11 According to MI5 s official history, the Thatcher government saw the peace movement as the biggest source of subversive threat. 12 The agency targeted the Campaign for Nuclear Disarmament (CND) in the 1970s and 1980s, and held a permanent file on CND secretary general Bruce Kent, who they described as a possible anarchist. 13 Covert monitoring of activists continued after the fall of the Soviet Union. One officer, who lived undercover as an environmental activist for seven years, was unmasked as part of a court case in There is evidence of the police s recent attempts to spy on student groups, including video footage of an officer trying to recruit an activist to report on the activities of students from Cambridge University in exchange for money. 14 Whistleblower Peter Francis has also revealed his work in the 1990s to infiltrate anti-racism groups under a false identity and gather information to discredit the family of murdered teenager Stephen Lawrence. 15 Meanwhile, documents leaked by Edward Snowdon revealed that GCHQ, along with the NSA, have been using their mass surveillance capabilities to collect communications data from civil society groups such as Médecins du Monde and the United Nations bodies UNDP and UNICEF. 16 In July 2015, UK s Investigatory Powers Tribunal also revealed that GCHQ has been intercepting, accessing, and storing the communications of human rights group Amnesty International. Other notable revelations about GCHQ s activities include evidence from the Snowden files that they have intercepted and collected millions of people s private webcam images, targeting 1.8 millions users in one month alone. 17 This includes sexually explicit material. 8 Paul Lewis and Rob Evans Covert police unit spied on trade union members, whistleblower reveals, The Guardian, 13 March Nick Sommerlad, Undercover cop joined construction union UCATT to spy on workers, The Mirror,2 March Rob Evans and Rowena Mason, Police continued spying on Labour activists after their election as MPs, The Guardian, 25 March BBC MP was bugged twice, report says, 21 February Christopher Andrew, The Defence of the Realm: The Authorized History of MI5, Christopher Andrew, The Defence of the Realm: The Authorized History of MI5, Rob Evans and Mustafa Khalili, Police tried to spy on Cambridge students, secret footage shows, The Guardian, 14 November Rob Evans and Paul Lewis, Police 'smear' campaign targeted Stephen Lawrence's friends and family, The Guardian, 24 June James Ball and Nick Hopkins, GCHQ and NSA targeted charities, Germans, Israeli PM and EU chief, The Guardian, 20 December

6 There is an often mistaken assumption that the security services only use powers to protect the public. In fact, as the evidence above demonstrates, throughout their history and right up until the present day, they have used them for reasons that stretch far beyond this. Spying on unions, activists, and human rights groups as well as politicians and millions of webcam users suggests not only a risk but a propensity for misuse. In light of this, it is concerning that the IPB is set to grant the security services such extensive powers with such poor checks and balances. Oversight system The IPB proposes two main changes to the system of oversight surrounding mass surveillance. The changes are billed as an improvement to current safeguards, but as they stand are wholly inadequate. The first proposal is to switch from ministerial authorisation for intercept warrants to a doublelock system of ministerial authorisation combined with judicial review. While at first seeming to incorporate the key proposal of the Anderson report to allow independent, judicial authorisation of intercept warrants, the proposed change stops far short of this. 18 As Andy Burnham, the Shadow Home Secretary, stated in a letter to the Home Secretary last year, the proposed system only allows a judge to review the procedure by which a warrant is authorised rather than weigh the evidence for the warrant itself: 19 [You] created the impression that both the home secretary and a senior judge would review the evidence. Indeed, you may recall that I asked you in the House about what would happen if there were a difference of opinion between the two. On closer inspection of the wording of the bill, it would seem that it does not deliver the strong safeguard that you appeared to be accepting. The current wording of the draft bill requires the judge to review the process undertaken by the Home Secretary in the same way applied to a judicial review. 20 Without full judicial oversight, the government is effectively signing off on its own warrant requests. No other country in the five eyes intelligence community, including the USA, Canada, New Zealand, and Australia, uses this system. However, by giving a judge the ability to review the proportionately and necessity of warrant requests, an independent safeguard would be assured. The IPB also proposes that in urgent cases, ministerial authorisation is enough by itself so long as it is followed by judicial review within a period of five days. The definition of urgent must be tightly worded to ensure this procedure is not abused. The second major proposal is for the Interception of Communications Commissioner, the Intelligence Services Commissioner, and the Chief Surveillance Commissioner to be merged into a new Investigatory Powers Commission. It is vital that this new body is properly resourced so that it can play its oversight role effectively. The IPB does not include provisions to reform the Intelligence and Security Committee (ISC), which provides parliamentary oversight of the intelligence services. The ISC has lost much credibility over its perceived closeness to the intelligence community following the Snowden revelations and it could benefit from reform to ensure its independence from the government Letter from Andy Burnham MP to the Home Secretary

7 LCHR s recommendations: - Switch from a system of ministerial authorisation of interception warrants to a system of judicial authorisation, with a judge playing the exclusive oversight role. Failing this, ensure judges have the scope (including access to all relevant material) to conduct a full merits review of warrants rather than just examine the procedure. - Ensure the new Investigatory Powers Commission is properly resourced. - Reform the Intelligence and Security Committee so that it is chaired by an opposition MP, information cannot be withheld from it, and its membership selection is not subject to a prime ministerial veto. The IPB s impact on encryption Encryption refers to the process of transforming data from plain text into cipher text so that only authorised parties can access it. It is one of the prime ways of ensuring internet data security and privacy as encrypted communications can only be accessed by using an encryption key or password. The original Draft IPB aimed to change the current state of encryption by making it a legal obligation for companies to bypass encryption when possible in order to allow security services to hack into and bug computers or phones for surveillance purposes. It demanded that companies submit decrypted communications to the Home Office, if requested. This may mean that end-to end encryption has to be banned because these strongly encoded communications cannot undergo decryption. However, the recent re-draft of the Bill makes it clear that the government will take a pragmatic approach and not ask companies to remove encryption unless it s technically feasible and affordable. Nonetheless, there is still considerable concern about potential overreach with these powers. Apple, which applies end-to-end encryption in its imessage, is critical of the Bill, insisting that [w]e believe it would be wrong to weaken security for hundreds of millions of law-abiding customers so that it will also be weaker for the very few who pose a threat. In this rapidly evolving cyber-threat environment, companies should remain free to implement strong encryption to protect customers. 21 Similarly, Facebook, Google, Microsoft, Yahoo Microsoft and Twitter submitted written evidence to the Joint Committee on the Draft Investigatory Powers Bill stating that [w]e reject any proposals that would require companies to deliberately weaken the security of their products via backdoors, forced decryption, or any other means. 22 Encryption is highly important because it ensures that information is kept private and inaccessible to third parties. This is important in terms of sharing any sensitive data such as financial transactions or s. Alongside protecting individual citizens data, there is also the national interest to consider. One of the significant current security threats to Britain is cyberwarfare. Cyber security campaigners representing 42 countries recently signed an open letter to world governments attempting to uphold the importance of encryption, writing that [s]trong encryption and the secure tools and systems that rely on it are critical to improving cybersecurity. 23 Yet the IBP could actually legalise a form of cyber-warfare. LCHR s recommendation: - Ensure the IPB protects encryption by removing provisions that may force companies to provide back doors to encrypted data for the security services. 21 Written evidence. Available at: 22 Written evidence. Available at: %20Facebook%20Inc.%2C%20Google%20Inc.%2C%20Microsoft%20Corp.%2C%20Twitter%20Inc.pdf 23 Security For All. Available at:

8 Effectiveness There are serious reasons to doubt the effectiveness of mass surveillance. Not only is it remarkably inaccurate as a detection tool, it also diverts significant resources away from traditional methods that would do more to prevent terrorist attacks. Moreover, mass surveillance may make the fight against terrorism harder in the long run by alienating communities and contributing to radicalisation. A 2009 report by the US government found that only 1.2 per cent of tips provided to the FBI by mass surveillance techniques made a significant contribution to counter-terrorism efforts. 24 Another recent study by the New America Foundation found that National Security Agency mass data collection played a role in, at most, 1.8 per cent of terrorism cases examined. 25 By contrast, traditional investigative methods initiated 60 per cent of investigations. 26 The technology itself is the reason for its lack of utility, being highly inaccurate. Indeed, computer scientist Ray Corrigan has written, Even if your magic terrorist-catching machine has a false positive rate of 1 in 1,000 and no security technology comes anywhere near this every time you asked it for suspects in the UK it would flag 60,000 innocent people. 27 Perversely, this lack of precision means mass surveillance can actually frustrate counterterrorism efforts. Both Michael Adebolajo and the Hebdo killers were well known to security services prior to their attacks, indicating the intelligence failures were to do with lack of attention rather than lack of data. Mass surveillance means intelligence analysts are forced to spend their time sifting through a large amount of data rather than carrying out the targeted monitoring and detection that s really needed. Counter-radicalisation experts have also argued that mass surveillance may alienate Muslim communities and possibly contribute to radicalisation. In 2014, Jonathan Russell from the counter-extremism group Quilliam wrote that the introduction of a sweeping [mass surveillance] law will be exploited by extremists to show that the government wants to spy on its own citizens [and] that all Muslims are suspected of being terrorists. 28 LCHR s recommendation: - Remove all provisions for bulk data collection by the security services in order to free up resources for targeted surveillance and to avoid alienating communities. Conclusion LCHR believes the mass surveillance provisions outlined in the Investigatory Powers Bill represent a disproportionate infringement on privacy, are ineffective against terrorism, and are not currently accompanied by adequate safeguards to prevent misuse. We recommend that Labour MPs pursue the following changes to the Bill: Remove the section of the IPB proposing bulk retention of internet connection records in its entirety. Replace provisions for bulk communications intercept with targeted intercept only, abolishing the system of general warrants and replacing them with a system of individual warrants issued on the basis of reasonable suspicion. This will be more effective and avoid alienating communities. Switch from a system of ministerial authorisation of interception warrants to a system of judicial authorisation, with a judge playing the exclusive oversight role. Failing this, errorism_gathering_intelligence_on_all_is_statistically.html html

9 ensure judges have the scope (including access to all relevant material) to conduct a full merits review of warrants rather than just examine the procedure. Ensure the new Investigatory Powers Commission is properly resourced. Reform the Intelligence and Security Committee so that it is chaired by an opposition MP, information cannot be withheld from it, and its membership selection is not subject to a prime ministerial veto. Ensure the IPB protects encryption by removing provisions that may force companies to provide back doors to encrypted data for the security services.

Investigatory Powers Bill

Investigatory Powers Bill Investigatory Powers Bill How to make it fit-for-purpose A briefing for the House of Lords by the Don t Spy on Us coalition Contents Introduction 1 About Don t Spy on Us 1 The Bill fails to introduce independent

More information

Spying on humanitarians: implications for organisations and beneficiaries

Spying on humanitarians: implications for organisations and beneficiaries Spying on humanitarians: implications for organisations and beneficiaries Executive Summary The global communications surveillance mandates of American, British and other Western intelligence agencies

More information

1 June Introduction

1 June Introduction Privacy International's submission in advance of the consideration of the periodic report of the United Kingdom, Human Rights Committee, 114 th Session, 29 June 24 July 2015 1. Introduction 1 June 2015

More information

Privacy And? Surveillance

Privacy And? Surveillance University of Leeds From the SelectedWorks of Subhajit Basu Fall November 28, 2015 Privacy And? Surveillance Subhajit Basu Available at: https://works.bepress.com/subhajitbasu/88/ School of something FACULTY

More information

Investigatory Powers Bill Briefing

Investigatory Powers Bill Briefing Investigatory Powers Bill Briefing What is the Investigatory Powers Bill? Running to 245 pages, the Investigatory Powers Bill is an attempt to establish a clear framework for the authorisation and use

More information

Investigatory Powers Bill. How to make it fit-for-purpose

Investigatory Powers Bill. How to make it fit-for-purpose Investigatory Powers Bill How to make it fit-for-purpose Contents Introduction 1 The draft Bill fails in its mission to be clear and comprehensive 2 The operational case has not been made for all powers

More information

Plea for referral to police for investigation of alleged s.1 RIPA violations by GCHQ

Plea for referral to police for investigation of alleged s.1 RIPA violations by GCHQ 16th March 2014 The Rt. Hon Dominic Grieve QC MP, Attorney General, 20 Victoria Street London SW1H 0NF c.c. The Rt. Hon Theresa May, Home Secretary Dear Mr. Grieve, Plea for referral to police for investigation

More information

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC CODE OF PRACTICE Preliminary draft code: This document is circulated by the Home Office in advance of enactment of the RIP Bill as an indication

More information

On 4 November the government published the draft Investigatory Powers Bill, set to be. Understanding the Investigatory Powers Bill.

On 4 November the government published the draft Investigatory Powers Bill, set to be. Understanding the Investigatory Powers Bill. Royal United Services Institute for Defence and Security Studies Briefing Paper, November 2015 Understanding the Investigatory Powers Bill Calum Jeffray Key Points Many of the most significant proposed

More information

The Right to Privacy in the Digital Age: Meeting Report

The Right to Privacy in the Digital Age: Meeting Report The Right to Privacy in the Digital Age: Meeting Report In light of the recent revelations regarding mass surveillance, interception and data collection the Permanent Missions of Austria, Brazil, Germany,

More information

IN THE EUROPEAN COURT OF HUMAN RIGHTS Application no /15. -v- UNITED KINGDOM SUBMISSIONS MADE IN LIGHT OF THE THIRD IPT JUDGMENT OF 22 JUNE 2015

IN THE EUROPEAN COURT OF HUMAN RIGHTS Application no /15. -v- UNITED KINGDOM SUBMISSIONS MADE IN LIGHT OF THE THIRD IPT JUDGMENT OF 22 JUNE 2015 IN THE EUROPEAN COURT OF HUMAN RIGHTS Application no. 24960/15 B E T W E E N:- 10 HUMAN RIGHTS ORGANISATIONS -v- UNITED KINGDOM Applicants Respondent Government Introduction SUBMISSIONS MADE IN LIGHT OF

More information

BULK POWERS IN THE INVESTIGATORY POWERS BILL:

BULK POWERS IN THE INVESTIGATORY POWERS BILL: BULK POWERS IN THE INVESTIGATORY POWERS BILL: The Question Of Trust Remains Unanswered September 2016 1/10 Introduction We are on the brink of introducing the most pervasive and intrusive surveillance

More information

LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL

LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL Background 1. This memorandum has been lodged by Michael Matheson, Cabinet Secretary for Justice, under Rule 9B.3.1(a) of the Parliament s Standing

More information

INVESTIGATORY POWERS BILL EXPLANATORY NOTES

INVESTIGATORY POWERS BILL EXPLANATORY NOTES INVESTIGATORY POWERS BILL EXPLANATORY NOTES What these notes do These Explanatory Notes relate to the Investigatory Powers Bill as brought from the House of Commons on 8. These Explanatory Notes have been

More information

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: APPENDIX THE EQUIPMENT INTERFERENCE REGIME 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes: (a) (b) (c) (d) the Intelligence

More information

Letter from Rt Hon Theresa May MP, Home Secretary, to the Chair of the Committee, 26 April Communication Data

Letter from Rt Hon Theresa May MP, Home Secretary, to the Chair of the Committee, 26 April Communication Data Letter from Rt Hon Theresa May MP, Home Secretary, to the Chair of the Committee, 26 April 2012 Communication Data Thank you for your letter of 2 April regarding Home Office plans on electronic surveillance.

More information

Q. What do the Law Commission and the Ministry of Justice recommend?

Q. What do the Law Commission and the Ministry of Justice recommend? Review of the Search and Surveillance Act 2012 Questions and Answers The Act Q. What does the Search and Surveillance Act do? A. The Act outlines rules for how New Zealand Police and some other government

More information

Liberty s briefing on an amendment to require pre-judicial authorisation for police use of covert human intelligence sources

Liberty s briefing on an amendment to require pre-judicial authorisation for police use of covert human intelligence sources Liberty s briefing on an amendment to require pre-judicial authorisation for police use of covert human intelligence sources September 2013 About Liberty Liberty (The National Council for Civil Liberties)

More information

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND Mandates of the Special Rapporteur on the promotion and protection

More information

Submission to the Joint Committee on the draft Investigatory Powers Bill

Submission to the Joint Committee on the draft Investigatory Powers Bill 21 December 2015 Submission to the Joint Committee on the draft Investigatory Powers Bill 1. The UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression;

More information

Statutory Frameworks. Safeguarding and Prevent. 1. Safeguarding

Statutory Frameworks. Safeguarding and Prevent. 1. Safeguarding Safeguarding and Prevent Statutory Frameworks 1. Safeguarding The legal framework for the protection of children in the UK is set out in the Children Act 1989. A child is defined by this act as any person

More information

I. REGULATION OF INVESTIGATORY POWERS BILL

I. REGULATION OF INVESTIGATORY POWERS BILL These notes refer to the Regulation of Investigatory Powers Bill as introduced in the House of Commons on 9th February 2000 [Bill 64] I. REGULATION OF INVESTIGATORY POWERS BILL II. EXPLANATORY NOTES INTRODUCTION

More information

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security. Government Surveillance of Citizens Raises Civil Liberty Concerns Two revelations about government programs designed to sift through the public s phone calls and social media interaction have raised questions

More information

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes INTRODUCTION 11.1 Earlier this year, the report of the first Independent Review of Intelligence and Security was tabled

More information

Regulation of Investigatory Powers Bill

Regulation of Investigatory Powers Bill Regulation of Investigatory Powers Bill EXPLANATORY NOTES Explanatory Notes to the Bill, prepared by the Home Office, will be published separately as Bill. EUROPEAN CONVENTION ON HUMAN RIGHTS Mr Secretary

More information

With the current terrorist threat facing European Union Member States, including the UK

With the current terrorist threat facing European Union Member States, including the UK Passenger Information Latest Update 26 th February 2015 Author David Lowe Liverpool John Moores University Introduction With the current terrorist threat facing European Union Member States, including

More information

BHAIRAV ACHARYA, KEVIN BANKSTON, ROSS SCHULMAN, ANDI WILSON DECIPHERING THE EUROPEAN ENCRYPTION DEBATE: UNITED KINGDOM

BHAIRAV ACHARYA, KEVIN BANKSTON, ROSS SCHULMAN, ANDI WILSON DECIPHERING THE EUROPEAN ENCRYPTION DEBATE: UNITED KINGDOM BHAIRAV ACHARYA, KEVIN BANKSTON, ROSS SCHULMAN, ANDI WILSON DECIPHERING THE EUROPEAN ENCRYPTION DEBATE: UNITED KINGDOM JUNE 2017 About the Authors Bhairav Acharya is a lawyer and policy specialist interested

More information

Electronic Privacy Information Center September 24, 2001

Electronic Privacy Information Center September 24, 2001 Electronic Privacy Information Center September 24, 2001 Analysis of Provisions of the Proposed Anti-Terrorism Act of 2001 Affecting the Privacy of Communications and Personal Information In response to

More information

Liberty s briefing on Part 5 of the Investigatory Powers Bill for Committee Stage in the House of Commons

Liberty s briefing on Part 5 of the Investigatory Powers Bill for Committee Stage in the House of Commons Liberty s briefing on Part 5 of the Investigatory Powers Bill for Committee Stage in the House of Commons April 2016 1 About Liberty Liberty (The National Council for Civil Liberties) is one of the UK

More information

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING INTRODUCTION 1.1. In its report, Under Surveillance, JUSTICE came to the overall conclusion that the present legislative and procedural framework

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Electronic Surveillance and FISA Eric Rosenbach and Aki J. Peritz Electronic Surveillance and FISA Electronic surveillance is one

More information

Conducting surveillance in a public place

Conducting surveillance in a public place Ministerial Policy Statement Conducting surveillance in a public place Summary It is lawful for the Government Communications Security Bureau (GCSB) and the New Zealand Security Intelligence Service (NZSIS)

More information

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden.

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden. Deutscher Bundestag 1st Committee of Inquiry in the 18th electoral term Hearing of Experts Surveillance Reform After Snowden September 8, 2016 Written Statement of Timothy H. Edgar Senior Fellow Watson

More information

COMMON GROUND BETWEEN COMPANY AND CIVIL SOCIETY SURVEILLANCE REFORM PRINCIPLES

COMMON GROUND BETWEEN COMPANY AND CIVIL SOCIETY SURVEILLANCE REFORM PRINCIPLES COMMON GROUND BETWEEN COMPANY AND CIVIL SOCIETY SURVEILLANCE REFORM PRINCIPLES January 15, 2014 On December 9, AOL, Apple, Facebook, Google, Linkedin, Microsoft, Twitter, and Yahoo! issued a call for governments

More information

Agreement on counter-terrorism measures

Agreement on counter-terrorism measures 10/12/2015 Agreement on counter-terrorism measures We stand united in the fight against terrorism. Accountability and cooperation are required if the population of Sweden are to feel safe and secure. Having

More information

Leading the Way Positive-Sum Solutions to Protecting Privacy, Civil Liberties and Security

Leading the Way Positive-Sum Solutions to Protecting Privacy, Civil Liberties and Security Information & Privacy Commissioner Ontario, Canada Commissaire à l information et à la protection de la vie privée Ontario, Canada Leading the Way Positive-Sum Solutions to Protecting Privacy, Civil Liberties

More information

Acquisition and Disclosure of Communications Data. A public consultation

Acquisition and Disclosure of Communications Data. A public consultation Acquisition and Disclosure of Communications Data A public consultation A PUBLIC CONSULTATION Summary This consultation paper seeks views on the contents of a revised draft statutory code of practice on

More information

Regulation of Investigatory Powers Act 2000

Regulation of Investigatory Powers Act 2000 ch2300a00a 01-08-00 22:01:07 ACTA Unit: paga RA Proof 20.7.2000 Regulation of Investigatory Powers Act 2000 CHAPTER 23 ARRANGEMENT OF SECTIONS Part I Communications Chapter I Interception Unlawful and

More information

Case 1:17-cv Document 1 Filed 07/05/17 Page 1 of 21 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

Case 1:17-cv Document 1 Filed 07/05/17 Page 1 of 21 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA Case 1:17-cv-01324 Document 1 Filed 07/05/17 Page 1 of 21 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA PRIVACY INTERNATIONAL 62 BRITTON STREET LONDON, EC1M 5UY, UNITED KINGDOM Plaintiffs,

More information

Covert Human Intelligence Sources Code of Practice

Covert Human Intelligence Sources Code of Practice Covert Human Intelligence Sources Code of Practice Presented to Parliament pursuant to section 71(4) of the Regulation of Investigatory Powers Act 2000. 2 Covert Human Intelligence Sources Code of Practice

More information

Conference report Privacy, security and surveillance: tackling dilemmas and dangers in the digital realm Monday 17 Wednesday 19 November 2014 WP1361

Conference report Privacy, security and surveillance: tackling dilemmas and dangers in the digital realm Monday 17 Wednesday 19 November 2014 WP1361 Image: geralt Conference report Privacy, security and surveillance: tackling dilemmas and dangers in the digital realm Monday 17 Wednesday 19 November 2014 WP1361 In partnership with: With support from:

More information

Counter-Extremism Strategy

Counter-Extremism Strategy Counter-Extremism Strategy Purpose For discussion and direction. Summary In the summer the Prime Minister set out how the government would look to tackle the threat posed by extremism through a Counter

More information

I. Does International Law Prohibit the U.S. Government from Monitoring Foreign Citizens in Foreign Countries?

I. Does International Law Prohibit the U.S. Government from Monitoring Foreign Citizens in Foreign Countries? Statement to the Privacy & Civil Liberties Oversight Board Eric A. Posner University of Chicago Law School March 14, 2014 You have asked me for my views on U.S. data collection efforts under Section 702

More information

Testimony of Peter P. Swire

Testimony of Peter P. Swire Testimony of Peter P. Swire Review Group on Intelligence and Communications Technology Before the HOUSE COMMITTEE ON THE JUDICIARY Hearing on: Examining Recommendations to Reform FISA Authorities February

More information

Mass Surveillance, Counterterrorism and Privacy: The Way Forward

Mass Surveillance, Counterterrorism and Privacy: The Way Forward Transcript Mass Surveillance, Counterterrorism and Privacy: The Way Forward Ben Emmerson QC UN Special Rapporteur on Counterterrorism and Human Rights Rt Hon Sir Malcolm Rifkind MP Chairman, Intelligence

More information

Director: Mr Yaman Akdeniz Tel: Fax:

Director: Mr Yaman Akdeniz Tel: Fax: Cyber-Rights & Cyber-Liberties (UK) Faculty of Law University of Leeds Leeds LS2 9JT Director: Mr Yaman Akdeniz (lawya@cyber-rights.org) Tel: 0498 865116 Fax: 0113 2335056 Open Letter to: The Right Honourable

More information

and fundamental freedoms while countering terrorism: Ten areas of best practice, Martin Scheinin A/HRC/16/51 (2010)

and fundamental freedoms while countering terrorism: Ten areas of best practice, Martin Scheinin A/HRC/16/51 (2010) 1. International human rights background 1.1 New Zealand s international obligations in relation to the civil rights affected by terrorism and counter terrorism activity are found in the International

More information

tinitrd~tat s~fnatf WASHINGTON, DC 20510

tinitrd~tat s~fnatf WASHINGTON, DC 20510 tinitrd~tat s~fnatf WASHINGTON, DC 20510 December 14, 2005 Dear Colleague, Prior to the Thanksgiving recess, several Senators expressed strong opposition to the draft Patriot Act reauthorization conference

More information

PRIVACY INTERNATIONAL. and. (1) THE SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) THE GOVERNMENT COMMUNICATIONS HEADQUARTERS Respondents

PRIVACY INTERNATIONAL. and. (1) THE SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) THE GOVERNMENT COMMUNICATIONS HEADQUARTERS Respondents IN THE INVESTIGATORY POWERS TRIBUNAL BETWEEN: PRIVACY INTERNATIONAL and Case No. IPT 14/85/CH Claimant (1) THE SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) THE GOVERNMENT COMMUNICATIONS

More information

REGULATION OF INVESTIGATORY POWERS ACT 2000: Consolidating Orders and Codes of Practice. A Public Consultation Paper

REGULATION OF INVESTIGATORY POWERS ACT 2000: Consolidating Orders and Codes of Practice. A Public Consultation Paper REGULATION OF INVESTIGATORY POWERS ACT 2000: Consolidating Orders and Codes of Practice A Public Consultation Paper Contents Foreword 2 The Rt Hon Jacqui Smith MP, Home Secretary 1. Executive Summary 3

More information

The National Security Agency s Warrantless Wiretaps

The National Security Agency s Warrantless Wiretaps The National Security Agency s Warrantless Wiretaps In 2005, the press revealed that President George W. Bush had authorized government wiretaps without a court warrant of U.S. citizens suspected of terrorist

More information

AUSSIE ISLAMIC LEADERS UNITE AGAINST TERRORISM

AUSSIE ISLAMIC LEADERS UNITE AGAINST TERRORISM AUSSIE ISLAMIC LEADERS UNITE AGAINST TERRORISM Peter Adamis 2 July 2014 The news is good and it demonstrates the Abbotts government mature approach to dealing with those who are and were intent on leaving

More information

STATEMENTS OF SUPPORT. R Street Op-Ed:

STATEMENTS OF SUPPORT. R Street Op-Ed: STATEMENTS OF SUPPORT Recent Op-Eds and Letters of Support: President Obama Statement of Administration Policy: http://www.whitehouse.gov/sites/default/files/omb/legislative/sap/113/saps2685s20141117.pdf

More information

FINAL WORKING DOCUMENT

FINAL WORKING DOCUMENT EUROPEAN PARLIAMT 2009-2014 Committee on Foreign Affairs 20.11.2013 FINAL WORKING DOCUMT on Foreign Policy Aspects of the Inquiry on Electronic Mass Surveillance of EU Citizens Committee on Foreign Affairs

More information

Safeguarding Equality

Safeguarding Equality Safeguarding Equality For many Americans, the 9/11 attacks brought to mind memories of the U.S. response to Japan s attack on Pearl Harbor 60 years earlier. Following that assault, the government forced

More information

Response to invitation for submissions on issues relevant to the proportionality of bulk powers

Response to invitation for submissions on issues relevant to the proportionality of bulk powers Response to invitation for submissions on issues relevant to the proportionality of bulk powers Written submission by Dr. Daragh Murray, Prof. Pete Fussey and Prof. Maurice Sunkin QC (Hon), members of

More information

Investigatory Powers Bill

Investigatory Powers Bill Investigatory Powers Bill [AS AMENDED ON REPORT] CONTENTS PART 1 GENERAL PRIVACY PROTECTIONS Overview and general privacy duties 1 Overview of Act 2 General duties in relation to privacy Prohibitions against

More information

Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission

Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission Joint Committee on the Draft Investigatory Powers Bill Information Commissioner s submission Executive Summary: The draft bill is far-reaching with the potential to intrude into the private lives of individuals.

More information

NSW Council for Civil Liberties Inc.

NSW Council for Civil Liberties Inc. NSW Council for Civil Liberties Inc. Postal address: PO BOX A1386 SYDNEY SOUTH NSW 1235 Office address: suite 203, 105 Pitt Street SYDNEY NSW 2000 Phone: 02 8090 2952 Fax: 02 8580 4633 Email: office@nswccl.org.au

More information

WORKSHOP ON TRANSNATIONAL SECURITY AND HUMAN RIGHTS

WORKSHOP ON TRANSNATIONAL SECURITY AND HUMAN RIGHTS UCLAN WORKSHOP ON TRANSNATIONAL SECURITY AND HUMAN RIGHTS Time to plug the UK security gap: why there is a need to widen surveillance on electronic communications data Dr David Lowe Liverpool John Moores

More information

January 14, Dear Chairman Graham and Ranking Member Feinstein:

January 14, Dear Chairman Graham and Ranking Member Feinstein: January 14, 2019 The Honorable Lindsey Graham, Chairman The Honorable Dianne Feinstein, Ranking Member U.S. Senate Committee on the Judiciary Dirksen Senate Office Building 224 Washington, DC 20510 Dear

More information

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been Issue #35, Winter 2015 Infiltrate the NSA To re-establish the balance between security and civil liberties, we don t just need more laws. We need more civil libertarians in the security state. Margo Schlanger

More information

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES AT A HEARING ENTITLED ENCRYPTION TIGHTROPE: BALANCING AMERICANS

More information

Parliamentary Joint Committee on Intelligence and Security in respect of the National Security Legislation Amendment Bill (No.

Parliamentary Joint Committee on Intelligence and Security in respect of the National Security Legislation Amendment Bill (No. Blueprint for Free Speech Submission to: Parliamentary Joint Committee on Intelligence and Security in respect of the National Security Legislation Amendment Bill (No. 1) 2014 6 August 2014 Submission

More information

Spies for hire and information peddlers: A new threat to security in Africa?

Spies for hire and information peddlers: A new threat to security in Africa? African Security Review 17.4 Institute for Security Studies Spies for hire and information peddlers: A new threat to security in Africa? Lauren Hutton* In July 2007, the Ministry of Intelligence Services

More information

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act Statement for the Record House Judiciary Subcommittee on Crime, Terrorism and Homeland Security Hearing on Reauthorizing the Patriot Act Statement for the Record Robert S. Litt General Counsel Office of

More information

Legislative Brief The Information Technology (Amendment) Bill, 2006

Legislative Brief The Information Technology (Amendment) Bill, 2006 Legislative Brief The Information Technology (Amendment) Bill, 2006 Highlights of the Bill The Bill was introduced in the Lok Sabha on 15 th December, 2006 and referred to the Standing Committee on Information

More information

Protecting Human Rights and National Security in the New Era of Data Nationalism

Protecting Human Rights and National Security in the New Era of Data Nationalism Protecting Human Rights and National Security in the New Era of Data Nationalism In this research program, I seek to study the new era of data nationalism, the increasingly common actions by nations to

More information

Douwe Korff Professor of International Law London Metropolitan University, London (UK)

Douwe Korff Professor of International Law London Metropolitan University, London (UK) NOTE on EUROPEAN & INTERNATIONAL LAW ON TRANS-NATIONAL SURVEILLANCE PREPARED FOR THE CIVIL LIBERTIES COMMITTEE OF THE EUROPEAN PARLIAMENT to assist the Committee in its enquiries into USA and European

More information

The Australian Privacy Foundation (APF) is the country's leading privacy advocacy organisation. A brief backgrounder is attached.

The Australian Privacy Foundation (APF) is the country's leading privacy advocacy organisation. A brief backgrounder is attached. http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 5 May 2013 Mr B. O'Farrell Premier of NSW cc. Mr G. Smith NSW Attorney-General and Minister for Justice

More information

Guidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff

Guidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff RM Guidelines on the Safe use of the Internet and Social Media by Police Officers and Police Staff The Association of Chief Police Officers has agreed to these guidelines being circulated to, and adopted

More information

Technology and the Law. Jackie Charles

Technology and the Law. Jackie Charles Technology and the Law Jackie Charles jackie@ruleoflaw.org.au What is the Rule of Law? Cyber Crime Definition fraudulent financial transactions identity theft theft of information for commercial gain/piracy

More information

The Open Rights Group

The Open Rights Group The Open Rights Group Response to Forensic Use of bioinformation: ethical issues, Consultation Paper of the Nuffield Council on Bioethics from The Open Rights Group 1. The interpretation of bioinformation

More information

COUNTER TERRORISM AND SECURITY BILL DELEGATED POWERS MEMORANDUM BY THE HOME OFFICE

COUNTER TERRORISM AND SECURITY BILL DELEGATED POWERS MEMORANDUM BY THE HOME OFFICE COUNTER TERRORISM AND SECURITY BILL DELEGATED POWERS MEMORANDUM BY THE HOME OFFICE References to clauses are to the Bill as introduced to the House of Lords. References are square bracketed and include

More information

SECTION 8: REPORTING CRIME AND ANTI-SOCIAL BEHAVIOUR

SECTION 8: REPORTING CRIME AND ANTI-SOCIAL BEHAVIOUR SECTION 8: REPORTING CRIME AND ANTI-SOCIAL BEHAVIOUR 8.1 INTRODUCTION 8.1 Introduction 8.2 Principles 8.3 Mandatory Referrals 8.4 Practices Reporting Crime Dealing with Criminals and Perpetrators of Anti-Social

More information

Regulation of Interception of Act 18 Communications Act 2010

Regulation of Interception of Act 18 Communications Act 2010 ACTS SUPPLEMENT No. 7 3rd September, 2010. ACTS SUPPLEMENT to The Uganda Gazette No. 53 Volume CIII dated 3rd September, 2010. Printed by UPPC, Entebbe, by Order of the Government. Regulation of Interception

More information

Recommendation for a COUNCIL DECISION

Recommendation for a COUNCIL DECISION EUROPEAN COMMISSION Brussels, 20.12.2017 COM(2017) 806 final Recommendation for a COUNCIL DECISION authorising the opening of negotiations for an agreement between the European Union and the State of Israel

More information

Report on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013

Report on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013 Report on the Findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection 27 November 2013 Report on the Findings of the EU Co-Chairs of the Ad Hoc EU-US Working Group on Data Protection

More information

Report of the Interception of Communications Commissioner

Report of the Interception of Communications Commissioner Report of the Interception of Communications Commissioner Review of directions given under section 94 of the Telecommunications Act (1984) The Rt Hon. Sir Stanley Burnton July 2016 Report of the Interception

More information

A QUESTION OF TRUST REPORT OF THE INVESTIGATORY POWERS REVIEW. DAVID ANDERSON Q.C. Independent Reviewer of Terrorism Legislation

A QUESTION OF TRUST REPORT OF THE INVESTIGATORY POWERS REVIEW. DAVID ANDERSON Q.C. Independent Reviewer of Terrorism Legislation A QUESTION OF TRUST REPORT OF THE INVESTIGATORY POWERS REVIEW by DAVID ANDERSON Q.C. Independent Reviewer of Terrorism Legislation JUNE 2015 Presented to the Prime Minister pursuant to section 7 of the

More information

THE RUTHERFORD INSTITUTE

THE RUTHERFORD INSTITUTE THE RUTHERFORD INSTITUTE Post Office Box 7482 Charlottesville, Virginia 22906-7482 JOHN W. WHITEHEAD Founder and President TELEPHONE 434 / 978-3888 FACSIMILE 434/ 978 1789 www.rutherford.org Via Email,

More information

Code of Practice - Covert Human Intelligence Sources. Covert Human Intelligence Sources. Code of Practice

Code of Practice - Covert Human Intelligence Sources. Covert Human Intelligence Sources. Code of Practice Covert Human Intelligence Sources Code of Practice Regulation of Investigatory Powers (Bailiwick of Guernsey) Law, 2003 Code ofpractice - Covert Human Intelligence Sources COVERT NUItlAN INTELLIGENCE SOURCES

More information

Additional Case study UK electoral system

Additional Case study UK electoral system Additional Case study UK electoral system The UK is a parliamentary democracy and hence is reliant on an effective electoral system (Jones and Norton, 2010). General elections are held after Parliament

More information

Preventing Violent Extremism A Strategy for Delivery

Preventing Violent Extremism A Strategy for Delivery Preventing Violent Extremism A Strategy for Delivery i. Contents Introduction 3 Undermine extremist ideology and support mainstream voices 4 Disrupt those who promote violent extremism, and strengthen

More information

FREEDOM OF INFORMATION REQUEST

FREEDOM OF INFORMATION REQUEST FREEDOM OF INFORMATION REQUEST Request Number: F-2009-00835 Keyword: Crime Subject: COVERT HUMAN INTELLIGENCE SOURCES (CHIS) Request and Answer: Question 1 Please advise how much money has been paid to

More information

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory

More information

Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill

Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill Contact Persons Janet Anderson-Bidois Chief Legal Adviser New Zealand Human Rights Commission

More information

Re: The Council's Draft CCTV Code of Practice

Re: The Council's Draft CCTV Code of Practice http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 7 September 2010 Mr Kevin Crameri OAM The Mayor Penrith Council Dear Mr Crameri Re: The Council's Draft

More information

Investigatory Powers Bill 2016: Part 8. Surveillance Oversight. Briefing for House of Commons Committee Stage. April 2016

Investigatory Powers Bill 2016: Part 8. Surveillance Oversight. Briefing for House of Commons Committee Stage. April 2016 Investigatory Powers Bill 2016: Part 8 Surveillance Oversight Briefing for House of Commons Committee Stage April 2016 For further information contact Angela Patrick, Director of Human Rights Policy email:

More information

Investigatory Powers Bill LCM

Investigatory Powers Bill LCM Investigatory Powers Bill LCM Published 5th October 2016 SP Paper 19 2nd Report, 2016 (Session 5) Web Published in Scotland by the Scottish Parliamentary Corporate Body. All documents are available on

More information

Report on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection

Report on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection COUNCIL OF THE EUROPEAN UNION Brussels, 27 November 2013 16987/13 JAI 1078 USA 61 DATAPROTECT 184 COTER 151 ENFOPOL 394 NOTE from: to: Subject: Presidency and Commission Services COREPER Report on the

More information

14480/1/17 REV 1 MP/mj 1 DG D 2B LIMITE EN

14480/1/17 REV 1 MP/mj 1 DG D 2B LIMITE EN Council of the European Union Brussels, 1 December 2017 (OR. en) NOTE From: To: Presidency Council No. prev. doc.: 14068/17 Subject: 14480/1/17 REV 1 LIMITE JAI 1064 COPEN 361 DAPIX 375 ENFOPOL 538 CYBER

More information

Tunisia. Constitution JANUARY 2016

Tunisia. Constitution JANUARY 2016 JANUARY 2016 COUNTRY SUMMARY Tunisia Tunisia experienced several deadly attacks by Islamist extremists in 2015 that left dozens of people dead and others injured. On March 18, two gunmen attacked the Bardo

More information

EUROPEAN PARLIAMENT COMMITTEE ON CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS

EUROPEAN PARLIAMENT COMMITTEE ON CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS EUROPEAN PARLIAMENT COMMITTEE ON CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS Data Protection in a : Future EU-US international agreement on the protection of personal data when transferred and processed

More information

LEGAL BASIS OBJECTIVES ACHIEVEMENTS

LEGAL BASIS OBJECTIVES ACHIEVEMENTS PERSONAL DATA PROTECTION Protection of personal data and respect for private life are important fundamental rights. The European Parliament has always insisted on the need to strike a balance between enhancing

More information

Law Enforcement processing (Part 3 of the DPA 2018)

Law Enforcement processing (Part 3 of the DPA 2018) Law Enforcement processing (Part 3 of the DPA 2018) Introduction This part of the Act transposes the EU Data Protection Directive 2016/680 (Law Enforcement Directive) into domestic UK law. The Directive

More information

COUNTERING TERRORIST FIGHTERS LEGISLATION BILL Human Rights Commission Submission to the Foreign Affairs, Defence and Trade Committee 27 November 2014

COUNTERING TERRORIST FIGHTERS LEGISLATION BILL Human Rights Commission Submission to the Foreign Affairs, Defence and Trade Committee 27 November 2014 COUNTERING TERRORIST FIGHTERS LEGISLATION BILL Human Rights Commission Submission to the Foreign Affairs, Defence and Trade Committee 27 November 2014 1. Introduction 1.1 The Human Rights Commission (the

More information

Pirate Party Australia

Pirate Party Australia Submission to the Senate Legal and Constitutional Affairs References Committee Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979 Pirate Party Australia Simon Frew (simon.frew@pirateparty.org.au)

More information

UN Human Rights Council Universal Periodic Review 30th session April-May 2018

UN Human Rights Council Universal Periodic Review 30th session April-May 2018 UN Human Rights Council Universal Periodic Review 30th session April-May 2018 Contribution by Reporters Without Borders (RSF), a non-governmental organization with special consultative status, on freedom

More information

Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979

Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979 Inquiry into Comprehensive Revision of the Telecommunications (Interception and Access) Act 1979 Northern Territory Police Submission to the Senate Legal and Constitutional Affairs Committee March 2014

More information