The Investigatory Powers Bill and journalism

Post on 21-Feb-2017

501 views 0 download

transcript

@PaulBradshaw, Online Journalism Blog Birmingham City University

(and journalism)The #IPBill

Mass collection Thematic warrants Data sharing Hacking powers Poor oversight

How many problems?

**

“This application produced five telephone numbers, all of which were researched for connections with the MPS [Metropolitan Police Service]. One number was identified as the switchboard number for Hinchingbrooke Hospital in Cambridgeshire. It was established that Officer 15 DPG’s wife Member of Public 3, was employed at that hospital

”Enquiries were made with Siemens in order to identify from the data on the exhibit, which extension within the hospital the call to The Sun was made from.”

Operation Alice Report, Metropolitan Police

http://www.iocco-uk.info/docs/Met%20Operation%20Alice%20Closing%20Report.pdf

https://www.bigbrotherwatch.org.uk/wp-content/uploads/2016/03/Data-Retention.pdf

The person calling the crisis line is not ordering pizza. The profiler’s assumption that the device is equal to, or identical with, or identifiable with its user is an obvious pragmatic reduction

Oliver Leistert: “Data doubles”

Leistert, Oliver. Data Retention in the European Union: When a Call Returns, International Journal of Communication 2 (2008)

*

http://www.telegraph.co.uk/technology/news/9182991/Digital-surveillance-what-my-phone-records-say-about-me.html

**

Your devices may betray you.

*http://webkay.robinlinus.com/

*https://www.eff.org/pages/tor-and-https

“We kill people based on metadata”

General Michael Hayden, former director of CIA and NSA

https://www.theguardian.com/commentisfree/2016/feb/21/death-from-above-nia-csa-skynet-algorithm-drones-pakistan

**

Why might you be targeted?

Because you used the wrong words

*

https://www.theguardian.com/politics/2016/apr/28/police-anti-extremism-unit-monitoring-green-party-caroline-lucas-sian-berry

http://www.iocco-uk.info/docs/2015%20Half-yearly%20report%20(web%20version).pdf

“It is inevitable that an investigator will be tempted to use every means at his disposal and to keep his options open when planning covert surveillance; to be, as often quoted in my presence at ACPO conferences, “lawfully audacious”

Sam Lincoln, Office of Surveillance Commissioners

http://ukhumanrightsblog.com/2015/10/13/surveillance-under-ripa-neither-a-strict-legal-framework-nor-rigorously-overseen-sam-lincoln/

*

http://bigstory.ap.org/article/govt-obtains-wide-ap-phone-records-probe

What might be used against you?

*

https://onlinejournalismblog.com/2016/03/18/investigatory-powers-bill-hacking-publishers/

*

http://arstechnica.co.uk/tech-policy/2015/08/associated-press-sues-fbi-over-fake-news-story/

Data sharing

*

*

*

https://haveibeenpwned.com/

http://www.telegraph.co.uk/technology/news/9182991/Digital-surveillance-what-my-phone-records-say-about-me.html http://www.iocco-uk.info/docs/IOCCO%20Report%20March%202015%20(Web).pdf

517,236 searches 795 public bodies 1 year

“When it comes to contracts, suppliers that have routinely messed up are handed more deals. When it comes to policy, approaches that have proved unsuccessful get dusted off and pushed with renewed vigour.”

Kat Hall, The Register

http://www.theregister.co.uk/2016/09/19/ukgov_digital_economy_shambles/

The health sector has the most data breaches, followed by local government. Furthermore, not all threats to cyber security or data protection are from external actors: over 40% are caused by employees, contractors and third party suppliers, and half of these are accidental.

Information Commissioner’s Office

http://www.parliament.uk/business/committees/committees-a-z/commons-select/culture-media-and-sport-committee/news-parliament-2015/cyber-security-report-published-16-17/

https://haveibeenpwned.com/

*http://www.telegraph.co.uk/news/uknews/law-and-order/9372965/Foreign-powers-will-be-allowed-to-access-email-and-phone-records.html http://www.bbc.co.uk/news/uk-politics-18434112

*http://www.independent.co.uk/news/uk/home-news/gchq-spying-programme-spy-watchdog-is-understaffed-and-totally-ineffective-8708231.html hhttp://www.markpack.org.uk/31123/six-reasons-the-interception-of-communications-commissioner-has-failed/ hthttp://www.telegraph.co.uk/news/uknews/law-and-order/9621493/Use-stronger-snooping-powers-against-fly-tipping-watchdog-urges.html

*