UK-ISC-Masssurveillance

Total Page:16

File Type:pdf, Size:1020Kb

UK-ISC-Masssurveillance Intelligence and Security Committee of Parliament Privacy and Security: A modern and transparent legal framework Intelligence and Security Committee of Parliament Privacy and Security: A modern and transparent legal framework Presented to Parliament pursuant to Section 3 of the Justice and Security Act 2013 Ordered by the House of Commons to be printed on 12 March 2015 HC 1075 © Crown copyright 2015 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3 or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at www.gov.uk/government/publications Any enquiries regarding this publication should be sent to us at [email protected] Print ISBN 9781474116237 Web ISBN 9781474116244 ID 10031502 03/15 47945 19585 Printed on paper containing 75% recycled fibre content minimum Printed in the UK by the Williams Lea Group on behalf of the Controller of Her Majesty’s Stationery Office THE INTELLIGENCE AND SECURITY COMMITTEE OF PARLIAMENT The Rt. Hon. Hazel Blears, MP Dr Julian Lewis, MP The Rt. Hon. Lord Butler KG GCB CVO Ms Fiona Mactaggart, MP The Rt. Hon. Sir Menzies Campbell CH CBE QC, MP The Most Hon. The Marquess of Mr Mark Field, MP Lothian QC PC The Rt. Hon. George Howarth, MP The Rt. Hon. Sir Malcolm Rifkind, MP The Intelligence and Security Committee of Parliament (ISC) is a statutory committee of Parliament that has responsibility for oversight of the UK intelligence community. The Committee was originally established by the Intelligence Services Act 1994, and has recently been reformed, and its powers reinforced, by the Justice and Security Act 2013. The Committee oversees the intelligence and security activities of the UK, including the policies, expenditure, administration and operations1 of the Security Service (MI5), the Secret Intelligence Service (SIS) and the Government Communications Headquarters (GCHQ). The Committee also scrutinises the work of other parts of the UK intelligence community, including the Joint Intelligence Organisation and the National Security Secretariat in the Cabinet Office; Defence Intelligence in the Ministry of Defence; and the Office for Security and Counter-Terrorism in the Home Office. The Committee consists of nine Members drawn from both Houses of Parliament. The Chair is elected by its Members. The Members of the Committee are subject to Section 1(1)(b) of the Official Secrets Act 1989 and are routinely given access to highly classified material in carrying out their duties. The Committee sets its own agenda and work programme. It takes evidence from Government Ministers, the heads of the intelligence Agencies, officials from the intelligence community, and other witnesses as required. The Committee is supported in its work by an independent Secretariat and an Investigator. It also has access to legal, technical and financial expertise where necessary. The Committee produces an Annual Report on the discharge of its functions. The Committee may also produce Reports on specific investigations. Prior to the Committee publishing its Reports, sensitive material that would damage national security is blanked out (‘redacted’). This is indicated by *** in the text. The intelligence and security Agencies may request the redaction of material in the Report if its publication would damage their work, for example by revealing their targets, methods, sources or operational capabilities. The Committee considers these requests for redaction carefully. The Agencies have to demonstrate clearly how publication of the material in question would be damaging before the Committee agrees to redact it. The Committee aims to ensure that only the minimum of text is redacted from the Report. The Committee believes that it is important that Parliament and the public should be able to see where information had to be redacted. This means that the published Report is the same as the classified version sent to the Prime Minister (albeit with redactions). The Committee also prepares from time to time wholly confidential reports which it submits to the Prime Minister. 1 Subject to the criteria set out in Section 2 of the Justice and Security Act 2013. CONTENTS KEY FINDINGS ......................................................................................................1 OVERVIEW ............................................................................................................3 1. INTRODUCTION ...............................................................................................9 2. THE AGENCIES’ USE OF INTRUSIVE CAPABILITIES ............................... 13 The Human Rights Act 1998 ................................................................................ 14 The HRA ‘triple test’ ............................................................................................ 15 3. TARGETED INTERCEPTION OF COMMUNICATIONS .............................. 17 How do the Agencies carry out Targeted Interception of Communications in the UK? ........................................................................................................... 17 Authorisation of Targeted Interception of Communications .................................... 18 What does an 8(1) warrant look like? .................................................................... 19 Thematic warrants ............................................................................................... 21 Collateral intrusion .............................................................................................. 23 4. ‘BULK’ INTERCEPTION: CAPABILITY ....................................................... 25 Choosing which communications links to access ................................................... 27 Selection of communications to be collected ......................................................... 28 Deciding which of the collected communications to examine or read ...................... 30 Does bulk interception work? ............................................................................... 32 5. ‘BULK’ INTERCEPTION: LEGAL AUTHORITY AND PRIVACY CONCERNS ...................................................................................................... 35 Objections to collection in principle ...................................................................... 35 Legal framework: 8(4) warrants and the Certificate ................................................ 37 Legal framework: ‘external’ and ‘internal’ communications ................................... 39 Storage and security ............................................................................................. 44 Oversight and audit .............................................................................................. 45 6. COMMUNICATIONS DATA ............................................................................ 47 Why do the Agencies need access to CD? ............................................................. 47 What categories of CD do the Agencies collect? .................................................... 48 How do the Agencies collect CD? ......................................................................... 48 Key issues ........................................................................................................... 50 7. BULK PERSONAL DATASETS........................................................................ 55 Authorisation ....................................................................................................... 56 Internal controls ................................................................................................... 57 8. OTHER AGENCY CAPABILITIES .................................................................. 61 a) Surveillance ..................................................................................................... 61 b) Interference with Property and Wireless Telegraphy ........................................... 63 c) Reading Encrypted Communications................................................................. 67 d) Covert Human Intelligence Sources .................................................................. 69 9. AUTHORISATIONS AND ACCOUNTABILITY .............................................. 73 Authorisation: Ministers or judges? ...................................................................... 73 Authorisation: official level .................................................................................. 76 Retrospective audit: the Commissioners ................................................................ 77 Complaints: the Investigatory Powers Tribunal ...................................................... 78 Parliamentary oversight ........................................................................................ 80 10. THE LEGISLATIVE FRAMEWORK ............................................................ 83 a) Interaction between legislation .......................................................................... 83 b) Class Authorisations ........................................................................................ 87 c) Exchanging information with overseas partners ................................................. 90
Recommended publications
  • Data Retention Policy (GDPR Compliant)
    Data Retention Policy (GDPR Compliant) Data controller: Habasit (UK) Ltd Habegger House Gannex Park Dewsbury Road Elland HX5 9AF 1 INTRODUCTION 1.1 Habasit (UK) Ltd (“we”, “our”, “us” or “the Company”) must comply with our obligations under data protection laws (including the GDPR and the Data Protection Act 2018) whenever we Process Personal Data relating to our employees, workers, customers and suppliers and any other individuals we interact with. 1.2 This includes the obligation not to Process any Personal Data which permits the identification of Data Subjects for any longer than is necessary and the purpose of this policy is to assist us to comply with that obligation. This policy should be read alongside the Data Retention Matrix which is appended at Schedule 1 to this policy and which provides guideline data retention periods for various different types of Personal Data we hold. 1.3 Compliance with this policy will also assist us to comply with our ‘data minimisation’ and accuracy obligations under data protection laws which require us to ensure that we do not retain Personal Data which is irrelevant, excessive, inaccurate or out of date. 1.4 A failure to comply with data protection laws could result in enforcement action against the Company, which may include substantial fines of up to €20 million or 4% of total worldwide annual turnover (whichever is higher), significant reputational damage and potential legal claims from individuals. It can also have personal consequences for individuals in certain circumstances i.e. criminal fines/imprisonment or director disqualification. 1.5 Compliance with this policy will also assist in reducing the Company’s information storage costs and the burden of responding to requests made by Data Subjects under data protection laws such as access and erasure requests.
    [Show full text]
  • Basic Overview of Data Retention Mandates – Privacy and Cost
    BASIC OVERVIEW OF DATA RETENTION MANDATES – PRIVACY AND COST September 2012 Introduction The use of telephone and Internet services generates information useful to governments in conducting law enforcement and national security investigations. In an effort to guarantee the availability of communications data for investigations, some governments have imposed or have considered imposing legal obligations requiring communications service providers to retain for specified periods of time certain data about all of their users. Generally, under these “data retention” mandates, data about individuals’ use of communications services must be collected and stored in a manner such that it is linked to a specific user’s name or other identification information. Government officials may then request access to this data, pursuant to the laws of their respective countries, for use in investigations. As a tool for addressing law enforcement challenges, data retention comes with a very high cost and is ultimately disproportionate to the goals it seeks to advance. Less privacy-burdensome alternatives are likely to accomplish governments’ legitimate goals just as, and perhaps more, effectively. I. Data Retention: The Basics Data retention laws vary with respect to the types of companies, data, and services that they cover. Types of companies covered: Most of the data retention laws that have been adopted by governments around the world focus on telephone companies (both fixed line and wireless) and Internet service providers (ISPs), including cable companies cable and mobile providers. Some data retention laws also apply to any entity that offers Internet access, such as Internet cafes and WiFi “hotspots.” Some data retention laws place retention obligations on online service providers (OSPs) – companies that provide, among other things, web-hosting services, email services, platforms for user-generated content, and mobile and web applications.
    [Show full text]
  • RAGHIDA DERGHAM With: HE Sir John Sawer HE Brett Mcgurk HR Rania Al Mashat HE Ambassador Yue Xiao Yong
    TRANSCRIPT OF e-POLICY CIRCLE 10 July 8th, 2020 RAGHIDA DERGHAM With: HE Sir John Sawer HE Brett McGurk HR Rania Al Mashat HE Ambassador Yue Xiao Yong Youtube Link: https://www.youtube.com/watch?v=kQvByHy92Ho&t=921s Raghida Dergham: Good morning San Francisco, very good morning and early morning, good afternoon London, Croatia and Cairo. I am in Beirut, and welcome to Beirut Institute Summit e-Policy Circle number 10, and we have a great cast with us today, of course. Sir John Sawer, former Chief of the Secret Intelligence Service (MI6), former Permanent Representative of the UK at the UN where I got the pleasure of knowing you. Of course, right now you are the independent non-Executive Director of BP Global and Executive Chairman of Newbridge Advisory. Brett McGurk, who joined us last year at Beirut Institute Summit in Abu Dhabi, welcome to the e-Policy Circle. He is former Special Assistant to President George W. Bush and Senior Director of Iraq and Afghanistan, former Deputy Assistant Secretary of State for Iraq and Iran, Special Presidential Envoy for the United States campaign against ISIS under President Barack Obama. He is now a Payne distinguished lecturer at Stanford University. Her excellency Rania Al Mashat is Egypt's Minister of International Cooperation, Former Minister of Tourism and previously Adviser to the chief economist of the IMF. And we have Ambassador Yue Xiao Yong, I hope I didn't butcher that, he's a China foreign expert, former Ambassador to Qatar, Jordan, and Ireland, he's Director and Senior Fellow at the Center for Global Studies at Redmond University of China, and he is now in Croatia, he's joining us from Croatia.
    [Show full text]
  • Uncorrected Transcript of Evidence
    INTELLIGENCE AND SECURITY COMMITTEE OF PARLIAMENT UNCORRECTED TRANSCRIPT OF EVIDENCE Given by Sir Iain Lobban Director, Government Communication Headquarters Mr Andrew Parker Director General, Security Service Sir John Sawers Chief, Secret Intelligence Service Thursday, 7 November 2013 2.00pm CHAIRMAN: Good afternoon. It is my pleasure to welcome you all here today at the first ever open evidence session of the Intelligence and Security Committee. I would like to welcome in particular our three witnesses: Sir Iain Lobban, the Director of GCHQ; Andrew Parker, the Director General of the Security Service, MI5; and Sir John Sawers, the Chief of the Secret Intelligence Service, MI6. Thank you, and we are delighted to welcome you, gentlemen. This session, of course, which we as a Committee first considered a year ago, is a very significant step forward in the transparency of our Intelligence Agencies. Having an open Parliamentary evidence session will be, I believe, of real value. Of course, we will not be asking our witnesses to reveal secret information in public. Nor will we today be able to discuss our current investigation into the tragic death of Lee Rigby in Woolwich in May, since obviously we cannot prejudice the trials of the accused which is to take place in the near future. The Intelligence and Security Committee, with its new powers, investigates the operations and scrutinises the capabilities of the Intelligence Agencies, but those sessions are held behind closed doors and must remain secret. This evidence session is being broadcast with a short time delay. This is a safety mechanism to allow us to pause the broadcast if anything is inadvertently mentioned which might endanger national security or the safety of those involved in safeguarding it.
    [Show full text]
  • Facts About the Federal Government's Data Retention Scheme
    Consumer Fact Sheet Facts about the Federal Government’s data retention scheme The Federal Government’s data retention scheme, enacted in March 2015, will come into effect between 13 October 2015 and 12 April 2017. Our fact sheet covers what consumers need to know. What is metadata? Metadata, simply put, is ‘data about data’. In telecommunications it is information about communications (e.g. the time a phone call was made and its duration), information about the people communicating (e.g. the sender and the receiver) including account and location information, and the device used. The scheme requires that service providers retain metadata but not the content or substance of a communication. However metadata can still reveal a lot of information about an individual and those they interact with. The set of metadata that will be required is set out in the legislation – see http://www.ag.gov.au/NationalSecurity/DataRetention/Documents/Dataset.pdf How will your metadata be used? It will be mandatory for telcos and ISPs to store your metadata for two years (some may have a business need for longer retention of some data). This metadata will be available to specified government agencies (such as law enforcement and national security agencies) upon request. You will be able to access your own data and many service providers do some of this already in your ordinary bill. How will it affect consumers? Costs We don’t know how much a data retention scheme will cost to set up but in March the Government estimated it at $400 million to set up and $4 per year, per customer to run.
    [Show full text]
  • 10. GCHQ. Handling Arrangements for Bulk
    OFFICIAL This information has been gisted, GCHQ Bulk Personal Datasets Closed Handling Arrangements 1. introduction 1.1 These handling arrangements are made under section 4(2)(a) of the Intelligence Services Act 1994 (ISA). They come into force on 4 November 2015. 1.2 These arrangements apply to the Government Communications Headquarters (GCHQ) with respect to the obtaining, use and disclosure of the category of information identified in Part 2 below, namely "bulk personal datasets". 1.3 The rules set out in these arrangements are mandatory and must be followed by GCHQ staff. Failure by staff to comply with these arrangements may lead to disciplinary action, which can include dismissal, and potentially to criminal prosecution. 2- Information covered by these arrangements 2.1 The Security and Intelligence Agencies (SIA) have an agreed definition of a 'Bulk Personal Dataset" (BPD). A BPD means any collection of information which: • comprises personal data; • relates to a wide range of individuals, the majority of whom are unlikely to be of intelligence interest; • is held, or acquired for the purpose of holding, on one or more analytical systems within the SIA. 2.2 Bulk Personal Datasets will in general also share the characteristic of being too large to be manually processed (particularly given that benefit is derived from using them in conjunction with other datasets). 2.3 In this context, "personal data" has the meaning given to it in section 1(1) of the Data Protection Act 1998 (DPA), which defines "personal data" as follows: "data which relate to a livingl individual who can be identified — • from those data; or • from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller [e.g.
    [Show full text]
  • NSA) Surveillance Programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) Activities and Their Impact on EU Citizens' Fundamental Rights
    DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens' fundamental rights NOTE Abstract In light of the recent PRISM-related revelations, this briefing note analyzes the impact of US surveillance programmes on European citizens’ rights. The note explores the scope of surveillance that can be carried out under the US FISA Amendment Act 2008, and related practices of the US authorities which have very strong implications for EU data sovereignty and the protection of European citizens’ rights. PE xxx.xxx EN AUTHOR(S) Mr Caspar BOWDEN (Independent Privacy Researcher) Introduction by Prof. Didier BIGO (King’s College London / Director of the Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France). Copy-Editing: Dr. Amandine SCHERRER (Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France) Bibliographical assistance : Wendy Grossman RESPONSIBLE ADMINISTRATOR Mr Alessandro DAVOLI Policy Department Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR To contact the Policy Department or to subscribe to its monthly newsletter please write to: [email protected] Manuscript completed in MMMMM 200X. Brussels, © European Parliament, 200X. This document is available on the Internet at: http://www.europarl.europa.eu/studies DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament.
    [Show full text]
  • Page 1 of 1 UN Security Council Debate on Iran Sanctions 11/30
    UN Security Council debate on Iran sanctions Page 1 of 1 Last updated at 10:11 (UK time) 10 Mar 2009 UN Security Council debate on Iran sanctions 10 March 2009 Statement by John Sawers, Permanent Representative of the United Kingdom of Great Britain and Northern Ireland to the United Nations Statement by John Sawers, Permanent Representative of the United Kingdom of Great Britain and Northern Ireland to the United Nations Thank you Mr President and I'd like to join others in thanking Ambassador Takasu for this, his first report to the Council, and express my Delegation's thanks to him and his team for accepting this important responsibility and for the excellent start that they have made in leading the Committee's work. Mr President, The United Kingdom continues to have serious concerns about Iran's nuclear programme. The latest IAEA report, which issued last month, makes clear that, in defiance of UN Security Council Resolutions, Iran has refused to suspend all its proliferation sensitive nuclear activities, namely its uranium enrichment and related activities and various heavy water projects. The International Atomic Energy Authority reports that Iran now has more than 5,500 centrifuges installed, of which about 4,000 are actively enriching uranium, for which Iran has no plausible civilian use. Iran has also refused access to IAEA inspectors to the heavy water reactor at Arak, for the second time in a row. This is of particular concern because the reactor's design at Arak is ideally suited to producing plutonium, which could be used for nuclear weapons.
    [Show full text]
  • H Subject: Fw: Sawers / Telegraph Articles
    UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05795070 Date: 02/13/2016 RELEASE IN PART B1,1.4(B),1.4(D),B6 From: H <[email protected] > Sent: Friday, July 13, 2012 1:46 AM To: '[email protected]' Subject: Re: Sawers / Telegraph articles Classified by DAS, A/GIS, DoS on 02/13/2016 — Class: Gobsmacking! CONFIDENTIAL — Reason: 1.4(B), 1.4(D) — Declassify on: 07/13/2032 From: Sullivan, Jacob 3 [mailto:[email protected]] Sent: Thursday, July 12, 2012 11:18 PM To: H Subject: Fw: Sawers / Telegraph articles See the article down the string. From: Sherman, Wendy R Sent: Thursday, July 12, 2012 09:25 PM To: Nuland, Victoria 3; Murad, Eshel William; Hammer, Michael A; Ventrell, Patrick H; Sullivan, Jacob 3; Einhorn, Robert 3; 'Benjamin_3._Rhodes <Benjamin_l_Rhodes B6 Cc: Grantham, Chris W; Lakhdhir, Kannala S Subject: Re: Sawers / Telegraph articles Yes, Chris Grantham on my staff sent me an Alert Iran that had this story. Most unfortunate on many levels to say the least. Where to begin... From: Nuland, Victoria J Sent: Thursday, July 12, 2012 09:08 PM To: Murad, Eshel William; Hammer, Michael A; Ventrell, Patrick H• Sullivan Jacob 3; Sherman, Wendy R; Einhorn, Robert 3; 'Benjamin J. Rhodes <Benjamin J._Rhodes B6 Subject: Fw: Sawers / Telegraph articles Fysa - this from my UK embassy contact. Sawers heads MI6. From: James.Barbour [mailto B6 Sent: Thursday, July 12, 2012 06:21 PM To: Nuland, Victoria 3 Cc: Toner, Mark C Subject: FW: Sawers / Telegraph articles Toria, 1.4(B) 1.4(D) B1 UNCLASSIFIED U.S.
    [Show full text]
  • Data Localization and the Role of Infrastructure for Surveillance, Privacy, and Security
    International Journal of Communication 10(2016), 2221–2237 1932–8036/20160005 Data Localization and the Role of Infrastructure for Surveillance, Privacy, and Security TATEVIK SARGSYAN American University, USA Due to the increased awareness of the politics embedded in Internet technologies, there has been a growing tendency for state and nonstate actors around the world to leverage Internet infrastructure configurations to attain various political and economic objectives. Governments push for infrastructure modifications in pursuit of economic development, data privacy and security, and law enforcement and surveillance effectiveness. Information intermediaries set and enact their infrastructure to maximize revenue by enabling data collection and analytics, but have the capacity to implement tools for protecting privacy and limiting government surveillance. Relying on a conceptual framework of the politics of infrastructure, this article explores tensions and competing interests that emerge around intermediaries’ technical and policy infrastructure through analysis of (a) data localization strategies in a number of countries and (b) privacy and security undertakings by information intermediaries. Keywords: privacy, security, Internet infrastructure, surveillance, data localization The Politics of Infrastructure Governments across the world have come to recognize the importance of information intermediaries’ infrastructure for national security, public safety, and other political interests. Law enforcement and intelligence agencies are tasked with addressing various challenges, including the growth of terrorism, cyberattacks, cybercrime, fraud, and—in some regimes—political opposition and social movements. To pursue these goals, government agencies often need to access communications data that are beyond their immediate control, facilitated by a handful of information intermediaries. These companies mediate content by providing online services and communication platforms to global users.
    [Show full text]
  • 2017 Data Mining Report to Congress October 2018 2017 DHS Data Mining Report
    Privacy Office 2017 Data Mining Report to Congress October 2018 2017 DHS Data Mining Report FOREWORD August 2018 I am pleased to present the Department of Homeland Security’s (DHS) 2017 Data Mining Report to Congress. The Federal Agency Data Mining Reporting Act of 2007, 42 U.S.C. § 2000ee- 3, requires DHS to report annually to Congress on DHS activities that meet the Act’s definition of data mining. For each identified activity, the Act requires DHS to provide the following: (1) a thorough description of the activity and the technology and methodology used; (2) the sources of data used; (3) an analysis of the activity’s efficacy; (4) the legal authorities supporting the activity; and (5) an analysis of the activity’s impact on privacy and the protections in place to protect privacy. This is the twelfth comprehensive DHS Data Mining Report and the tenth report prepared pursuant to the Act. Two annexes to this report, which include Law Enforcement Sensitive information and Sensitive Security Information, are being provided separately to Congress as required by the Act. With the creation of DHS, Congress authorized the Department to engage in data mining and the use of other analytical tools in furtherance of Departmental goals and objectives. Consistent with the rigorous compliance process it applies to all DHS programs and systems, the DHS Privacy Office works closely with the programs discussed in this report to ensure that they employ data mining in a manner that both supports the Department’s mission to protect the homeland and protects privacy. www.dhs.gov/privacy 2017 DHS Data Mining Report Pursuant to congressional requirements, this report is being provided to the following Members of Congress: The Honorable Michael Pence President, U.S.
    [Show full text]
  • Intelligence and Security Committee of Parliament
    Intelligence and Security Committee of Parliament Annual Report 2016–2017 Chair: The Rt. Hon. Dominic Grieve QC MP Intelligence and Security Committee of Parliament Annual Report 2016–2017 Chair: The Rt. Hon. Dominic Grieve QC MP Presented to Parliament pursuant to sections 2 and 3 of the Justice and Security Act 2013 Ordered by the House of Commons to be printed on 20 December 2017 HC 655 © Crown copyright 2017 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open- government-licence/version/3 Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at isc.independent.gov.uk Any enquiries regarding this publication should be sent to us via our webform at isc.independent.gov.uk/contact ISBN 978-1-5286-0168-9 CCS1217631642 12/17 Printed on paper containing 75% recycled fibre content minimum Printed in the UK by the APS Group on behalf of the Controller of Her Majesty’s Stationery Office THE INTELLIGENCE AND SECURITY COMMITTEE OF PARLIAMENT This Report reflects the work of the previous Committee,1 which sat from September 2015 to May 2017: The Rt. Hon. Dominic Grieve QC MP (Chair) The Rt. Hon. Richard Benyon MP The Most Hon. the Marquess of Lothian QC PC (from 21 October 2016) The Rt. Hon. Sir Alan Duncan KCMG MP The Rt. Hon. Fiona Mactaggart MP (until 17 July 2016) The Rt. Hon.
    [Show full text]