United Kingdom

Total Page:16

File Type:pdf, Size:1020Kb

United Kingdom FREEDOM ON THE NET 2016 United Kingdom 2015 2016 Population: 65.1 million Internet Freedom Status Free Free Internet Penetration 2015 (ITU): 92 percent Social Media/ICT Apps Blocked: No Obstacles to Access (0-25) 2 2 Political/Social Content Blocked: No Limits on Content (0-35) 6 5 Bloggers/ICT Users Arrested: No Violations of User Rights (0-40) 16 16 TOTAL* (0-100) 24 23 Press Freedom 2016 Status: Free * 0=most free, 100=least free Key Developments: June 2015 – May 2016 • The Investigatory Powers Bill was introduced in March 2016 to consolidate and reform government surveillance laws, but critics said it lacked adequate privacy safeguards; it was still being debated in parliament in mid-2016 (see Surveillance, Privacy, and Anonymity). • In March 2016, the Crown Prosecution Service in England and Wales issued guidelines for offenses related to social media, particularly online harassment (see Legal Environment). • On February 16, 2016, Police Scotland arrested a man who made controversial Facebook posts about Syrian refugees (see Prosecutions and Detentions for Online Activities). www.freedomonthenet.org FREEDOM UNITED KINGDOM ON THE NET 2016 Editor’s Note On June 23, 2016, outside the coverage period of this report, citizens of the United Kingdom vot- ed to leave the European Union in a closely contested popular referendum. Prime Minister David Cameron resigned as leader of the ruling Conservative Party. He was replaced by Teresa May, who was previously the home secretary, in July. Introduction Internet freedom improved slightly, with few reports of political and social websites blocked by mistake, though transparency about content controls remains lacking. Online harassment, extremist speech, and privacy remained priority issues in the United Kingdom’s internet policy in 2015 and 2016. The UK has consistently been an early adopter of new information and communication technologies (ICTs). Internet access is rapidly approaching universal, with competitive prices and generally fast speeds. Mobile devices, especially smartphones, have become the most prevalent means of internet access. Strategies to combat extremist as well as offensive speech online periodically threaten to curb legit- imate expression. At least two people were briefly detained following derogatory—though nonvi- olent—social media posts during the coverage period of this report. In February 2016, police were called to a school in Southampton by staff who reported a 15-year-old pupil for accessing the web- site of the populist right-wing United Kingdom Independence Party, concerned about the site’s views on immigration and other matters. The past year saw fierce debate regarding surveillance powers. In June 2015, the Investigato- ry Powers Tribunal identified irregularities in the Government Communications Headquarters (GCHQ) intelligence agency’s handling of communications data intercepted from two civil society groups, Amnesty International and the South Africa-based Legal Resources Center. The tribunal ruled that those irregularities violated human rights standards, though the interception itself was lawful. In February 2016, in a separate case, the tribunal ruled that GCHQ computer network ex- ploitation or hacking activities were also lawful. However, an independent report commissioned by the government and released in June 2015 called the existing legislative framework on surveillance “undemocratic, unnecessary and—in the long run—intolerable.” On March 1, 2016, the government introduced the Investigatory Powers Bill to consolidate and reform surveillance laws. The polarizing piece of legislation was criticized for autho- rizing overreaching surveillance and undermining privacy. In mid-2016, it was still being debated in parliament. Obstacles to Access Access to the internet is considered to be a key element determining societal and democratic participa- www.freedomonthenet.org FREEDOM UNITED KINGDOM ON THE NET 2016 tion in the UK.1 ICT infrastructure is generally strong, allowing high levels of access. The overwhelming majority of UK citizens use the internet frequently on a widening variety of devices, particularly smart- phones.2 In recent years, substantial investments led by the government have led to better levels of ser- vice for many citizens and businesses. For financial and literacy reasons, those over the age of 75 and people in the lowest socioeconomic groups still lack access.3 Policies and regulation in the country tend to favor access, although continuing revelations regarding extensive government surveillance practices may impact how citizens choose to access the internet. Availability and Ease of Access Internet penetration was reported at 87 percent, with the share of homes with fixed and mobile broadband at 80 percent.4 At the beginning of 2016, there were 24.4 million fixed broadband con- nections, representing a 4 percent increase over the previous year.5 The average broadband speed in 2014 was 22.8 Megabits per second (Mbps) according to an August 2015 report,6 continuing a trend of rising speeds and growing satisfaction among consumers served by faster fiber-optic based ser- vices. Nearly 100 percent of all households are within range of ADSL connections. While broadband access is effectively ubiquitous, steady progress continues towards the expansion of “superfast” broadband that has an advertised speed of at least 30 Mbps.7 In 2015, 30 percent of all broadband connections were superfast, compared to 0.2 percent in 2009.8 Funding for a gov- ernment superfast broadband program, which is aimed at improving broadband speed and access, expanded to GBP 1.7 billion (US$ 2.62 billion). 9 In early 2015, an additional 2,411,395 premises had access to superfast broadband through the scheme, meaning a total of 80 percent of all UK premises had superfast broadband access availability, in line with a target of 95 percent by 2017.10 A voucher scheme covering up to GBP 3,000 (US$ 4,440) of installation costs for small and medium enterprises has been in place in 50 British cities since April 2015.11 Mobile telephone penetration is extensive, with a reported penetration rate of 125 percent at the 1 Ofcom, Internet Citizens 2014 (London: Ofcom), November 27, 2014, http://stakeholders.ofcom.org.uk/binaries/research/ telecoms-research/Internet_Citizens_Report_14.pdf, p 1. 2 Ofcom, The Communications Market Report, August 6, 2015, http://stakeholders.ofcom.org.uk/binaries/research/cmr/cmr15/ CMR_UK_2015.pdf, p.1 3 Ofcom, Internet Citizens 2014, p.11. 4 Ofcom, Adults’ media usage and attitudes, April 2016, http://stakeholders.ofcom.org.uk/binaries/research/media-literacy/ adults-literacy-2016/2016-Adults-media-use-and-attitudes.pdf. The International Telecommunication Union reported penetration at 92 percent of the population aged 16 to 74 in 2015. See, International Telecommunication Union, “Percentage of Individuals Using the Internet, 2000-2015,” http://bit.ly/1cblxxY. 5 Ofcom, “Telecommunications market data tables Q3 2015,” January 26, 2016, http://stakeholders.ofcom.org.uk/binaries/ research/cmr/telecoms/Q3-2015.pdf p.2. 6 Ofcom, The Communications Market Report 2015, p.15. Akamai reported average connection speeds of 14.9 Mbps in 2016. See, “‘First Quarter, 2016 State Of The Internet Report,” June 29, 2016, https://www.akamai.com/us/en/about/news/press/2016- press/akamai-first-quarter-2016-state-of-the-internet-connectivity-report.jsp. 7 For local area progress in broadband provision, see DCMS, Table of local broadband projects, October 2014, https://docs. google.com/spreadsheet/ccc?key=0Ah3sVRjT82kKdEltX0lJNjNVWWhNbjBnNGwxeHhqMHc#gid=0. 8 Ofcom, The Communications Market Report 2015, p3. 9 Department for Culture, Media and Sport (DCMS), 2010 to 2015 government policy: broadband investment, updated May 8, 2015, https://www.gov.uk/government/publications/2010-to-2015-government-policy-broadband-investment, Appendix 2. 10 DCMS, 2.5 million more UK homes and businesses can now go superfast, https://www.gov.uk/government/news/25-million- more-uk-homes-and-businesses-can-now-go-superfast . 11 DCMS, 2.5 million more UK homes and businesses can now go superfast note 12. www.freedomonthenet.org FREEDOM UNITED KINGDOM ON THE NET 2016 end of 2015.12 The introduction of faster fourth-generation (4G) services in 2012 encouraged vid- eo streaming and access to other data services. All national mobile network operators offered 4G mobile communication technology, with outdoor 4G coverage from at least one network accessible in over 89 percent of UK premises.13 In 2016, 66 percent of adults reported a smartphone was their primary device for accessing the internet,14 and reported valuing their smartphone over any other communication or media device;15 indeed the smartphone was identified as the primary device for access in five out of nine online activities.16 The UK provides a competitive market for internet access, and prices for communications services compare favorably with those in other countries, with the scope of services increasing while prices continue to fall and remain competitive.17 The average British household spent GBP 81.30 (US$ 125) per month on telecommunication services in 2014, a decrease of 0.1 percent from 2013.18 The dif- ference between superfast and standard services in 2014 was between GBP 5 (US$ 7.66) and GBP 10 (US$ 15.31) per month.19 While 4G services were initially more expensive than non-4G services, the difference is shrinking, and in some cases disappearing. The price basket of mobile services fell by 0.4 percent in 2014.20
Recommended publications
  • National Security Capability Review: a Changing Security Environment
    House of Lords House of Commons Joint Committee on the National Security Strategy National Security Capability Review: A changing security environment First Report of Session 2017–19 Report, together with formal minutes relating to the report Ordered by the House of Lords to be printed 19 March 2018 Ordered by the House of Commons to be printed 19 March 2018 HL Paper 104 HC 756 Published on 23 March 2018 by authority of the House of Lords and the House of Commons The Joint Committee on the National Security Strategy The Joint Committee on the National Security Strategy is appointed by the House of Lords and the House of Commons to consider the National Security Strategy. Current membership House of Lords Lord Brennan (Labour) Lord Campbell of Pittenweem (Liberal Democrat) Lord Hamilton of Epsom (Conservative) Lord Harris of Haringey (Labour) Baroness Healy of Primrose Hill (Labour) Baroness Henig (Labour) Lord King of Bridgwater (Conservative) Baroness Lane-Fox of Soho (Crossbench) Lord Powell of Bayswater (Crossbench) Lord Trimble (Conservative) House of Commons Margaret Beckett MP (Labour, Derby South) (Chair) Yvette Cooper MP (Labour, Normanton, Pontefract and Castleford) James Gray MP (Conservative, North Wiltshire) Mr Dominic Grieve MP (Conservative, Beaconsfield) Dan Jarvis MP (Labour, Barnsley Central) Dr Julian Lewis MP, (Conservative, New Forest East) Angus Brendan MacNeil MP (Scottish National Party, Na h-Eileanan an Iar) Robert Neill MP (Conservative, Bromley and Chislehurst) Rachel Reeves MP (Labour, Leeds West) Tom Tugendhat MP (Conservative, Tonbridge and Malling) Stephen Twigg MP (Labour (Co-op), Liverpool, West Derby) Theresa Villiers MP (Conservative, Chipping Barnet) Powers The Committee has the power to require the submission of written evidence and documents, to examine witnesses, to meet at any time (except when Parliament is prorogued or dissolved), to adjourn from place to place within the United Kingdom, to appoint specialist advisers, and to make Reports to both Houses.
    [Show full text]
  • Transcript of Panel 4: Innovation and Technology: Re-Writing the Rules? Margaret Thatcher Conference on Security Guildhall, London Tuesday 27 June 2017
    Transcript of Panel 4: Innovation and Technology: Re-writing the rules? Margaret Thatcher Conference on Security Guildhall, London Tuesday 27 June 2017 The video recording of this panel is available on the CPS YouTube channel. Deepak Lal: Good evening everyone. I'm Deepak Lal. We're going to talk about innovation and technology. This morning, we've been hearing a lot about social media and various other forms of new technology. Most of them seem to be threats. Anyway, we've got a very distinguished panel. On my immediate left is Commissioner Ian Dyson of the City of London Police, then there is ... Who's next? The Rt. Hon. Matt Hancock who's the minister of estate for digital, then Robert Hannigan who is a former director of GCHQ, and then Lara Poloni who's incoming Chief Executive of AECOM who is sponsoring this conference. I'm going to begin by getting Robert Hannigan to talk about it, because he can give us a global view. He's been in GCHQ for a long time. He just retired as Director. He can tell us what technology is doing to keep us safe or leading to us being attacked. Robert Hannigan: Thank you very much, Deepak. Great to be here. I thought what I'd do is just say a few words about the shifts in power that have been referred to in various sessions during the day, that are caused by, or accelerated by technology. And then say something about the impact that's having particularly on global security and then a couple of thoughts on how we might approach that.
    [Show full text]
  • Intelligence and Security Committee of Parliament
    Intelligence and Security Committee of Parliament Annual Report 2016–2017 Chair: The Rt. Hon. Dominic Grieve QC MP Intelligence and Security Committee of Parliament Annual Report 2016–2017 Chair: The Rt. Hon. Dominic Grieve QC MP Presented to Parliament pursuant to sections 2 and 3 of the Justice and Security Act 2013 Ordered by the House of Commons to be printed on 20 December 2017 HC 655 © Crown copyright 2017 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open- government-licence/version/3 Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at isc.independent.gov.uk Any enquiries regarding this publication should be sent to us via our webform at isc.independent.gov.uk/contact ISBN 978-1-5286-0168-9 CCS1217631642 12/17 Printed on paper containing 75% recycled fibre content minimum Printed in the UK by the APS Group on behalf of the Controller of Her Majesty’s Stationery Office THE INTELLIGENCE AND SECURITY COMMITTEE OF PARLIAMENT This Report reflects the work of the previous Committee,1 which sat from September 2015 to May 2017: The Rt. Hon. Dominic Grieve QC MP (Chair) The Rt. Hon. Richard Benyon MP The Most Hon. the Marquess of Lothian QC PC (from 21 October 2016) The Rt. Hon. Sir Alan Duncan KCMG MP The Rt. Hon. Fiona Mactaggart MP (until 17 July 2016) The Rt. Hon.
    [Show full text]
  • ABSOLUTE FINAL ONEIL Dissertation
    UCLA UCLA Electronic Theses and Dissertations Title Dealing with the Devil? Explaining the Onset of Strategic State-Terrorist Negotiations Permalink https://escholarship.org/uc/item/5td7j61f Author O'Neil, Siobhan Publication Date 2014 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Los Angeles Dealing with the Devil? Explaining the Onset of Strategic State-Terrorist Negotiations A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Political Science by Siobhan O’Neil 2014 ABSTRACT OF THE DISSERTATION Dealing with the Devil? Explaining the Onset of Strategic State-Terrorist Negotiations by Siobhan O’Neil Doctor of Philosophy in Political Science University of California, Los Angeles, 2014 Professor Arthur Stein, Chair Statesmen are quick to declare that they will not negotiate with terrorists. Yet, the empirical record demonstrates that, despite statements to the contrary, many states do eventually negotiate with their terrorist challengers. My dissertation examines the circumstances under which states employ strategic negotiations with terrorist groups to resolve violent conflict. I argue that only when faced with a credible and capable adversary and afforded relative freedom of action domestically will states negotiate with terrorists. To test this theory, I use a multi-method approach that incorporates a cross- national study of all known strategic negotiations from 1968-2006 and three within-case studies (Israel, Northern Ireland, and the Philippines). Initial results suggest that negotiations are employed in about 13% of terrorist campaigns, certain types of groups are privileged, and negotiations only occur when statesmen can overcome domestic ii obstacles, namely public and veto player opposition.
    [Show full text]
  • Unlocking Encryption: Information Security and the Rule of Law
    Unlocking Encryption: Information Security and the Rule of Law BY DANIEL CASTRO AND ALAN MCQUINN | MARCH 2016 Advancements in the field of information security, particularly in how to Advances in use encryption to protect the confidentiality of information, have vastly information security could lead to tradeoffs improved security for consumers and businesses. But as products and in the effectiveness of services have become more secure, it has become harder for law law enforcement, but enforcement and national security agencies to access some information limiting encryption will that could help them prevent and investigate crimes and terrorism.1 This certainly make the has created one of the most difficult policy dilemmas of the digital age, as average consumer and business less secure. encryption both improves security for consumers and businesses and makes it harder for governments to protect them from other threats. There is no way to square this circle, so any choice will come with tradeoffs. However, ITIF believes that the U.S. government should not restrict or weaken encryption, because any attempts to do so would reduce the overall security of law-abiding citizens and businesses, make it more difficult for U.S. companies to compete in global markets, and limit advancements in information security. Moreover, attempts to restrict or weaken encryption would be ineffective at keeping this technology out of the hands of many criminals and terrorists. Cybersecurity is often portrayed as a never-ending arms race pitting those who wish to secure their computers and networks against attackers intent on breaking into their INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | MARCH 2016 PAGE 1 systems.
    [Show full text]
  • Terror and the Internet
    Qatar among the pigeons China’s polluted soil The end of causality TECHNOLOGY QUARTERLY: Civilian drones JUNE 10TH–16TH 2017 Terror and the internet Contents The Economist June 10th 2017 5 7 The world this week 32 Opioids and lawsuits Ohio high 33 Climbing Leaders Rock stars 9 Curbing jihadists 34 Lexington Terror and the internet North Korea 10 Qatar Donald does Doha The Americas 10 The Federal Reserve Check yourself 35 Haiti A time to sow 11 Education in India Skilled immigrants America’s A waste of 260m minds 37 Bello The bogeyman of Mexico new permanent residents are 12 Soil pollution in China arriving better educated than Buried poison ever before, page 30 On the cover Middle East and Africa Technology firms could do Letters 39 Qatar and Saudi Arabia more to counter terror on the A futile family feud 14 On Israel, Singapore, internet—within limits: cinema, writers, GDP 40 Egypt’s crackdown leader, page 9. Tech giants The punishments of Sisi fuss are under fire for facilitating 41 Al-Qaeda terrorism. Though that is Briefing Yemen’s other war unfair, they are not blameless, 18 Pollution in China 41 Travel in Africa page 52. Another attack The bad earth sparks a debate on what A dream of Schengen police need to stop future 42 The Horn of Africa atrocities, page 49 Asia Shepherds staying put 21 Indian schools Now make sure they learn Technology Quarterly Qatar The Trumpian world The Economist online something order means a less stable Middle Civilian drones East: leader, page 10. Its Daily analysis and opinion to 22 Pakistan’s Khyber After
    [Show full text]
  • Post-Snowden, UK Watchdog Issues Online Spying Report 11 June 2015
    Post-Snowden, UK watchdog issues online spying report 11 June 2015 Google and Facebook. Ministers and top spies say new measures are needed to keep Britain safe from groups such as the Islamic State jihadists in Iraq and Syria. But the issue of how far new laws should go is sensitive due to privacy concerns highlighted by leaks from Snowden, an ex-US National Security Agency worker, which claimed Britain's communications nerve centre GCHQ was carrying out bulk data collection. Launching a report into the issue, Anderson, the independent reviewer of terrorism legislation, said security services were in a "cat and mouse game" Proposed new legislation would give intelligence with criminals. services and the police increased powers to monitor Internet and phone use He added that changes to the current system were needed to build public trust in the wake of the Snowden affair. The man responsible for reviewing Britain's anti- terrorism laws called Thursday for more judicial oversight over data interception as ministers prepare legislation firming up the powers of security services following leaks by Edward Snowden. Additional safeguards would be a way of "helping build the relationship" with US technology giants and make it more likely they would comply with requests from British law enforcement agencies, senior lawyer David Anderson said. After winning last month's general election, Prime Minister David Cameron's government wants to Leaks from ex-NSA contractor Edward Snowden claimed pass new legislation giving intelligence services Britain's GCHQ was carrying out bulk data collection and the police increased powers to monitor Internet and phone use.
    [Show full text]
  • Russiagate Roads Lead to London As Evidence Emerges of Joseph Disobedient Media Mifsud’S Links to UK Intelligence, Apr
    All Russiagate Roads Lead To London As Evidence Emerges Of Joseph Disobedient Media Mifsud’s Links To UK Intelligence, Apr. 04, 2018 All Russiagate Roads Lead To London As Evidence Emerges Of Joseph Mifsud’s Links To UK Intelligence Contributors: Elizabeth Vos, Kenneth Whittle April 4, 2018 Photo: Joseph Mifsud. https://disobedientmedia.com/2018/04/all-russiagate-roads-lead-to-london-as- Page 1 evidence-emerges-of-joseph-mifsuds-links-to-uk-intelligence/ All Russiagate Roads Lead To London As Evidence Emerges Of Joseph Disobedient Media Mifsud’s Links To UK Intelligence, Apr. 04, 2018 Over the last few months, Professor Joseph Mifsud has become a feather in the cap for those pushing the Trump-Russia narrative. He is characterized as a “Russian” intelligence asset in mainstream press, despite his declarations to the contrary. However, evidence has surfaced that suggests Mifsud was anything but a Russian spy, and may have actually worked for British intelligence. This new evidence culminates in the ground-breaking conclusion that the UK and its intelligence apparatus may be responsible for the invention of key pillars of the Trump-Russia scandal. If true, this would essentially turn the entire RussiaGate debacle on its head. To give an idea of the scope of this report, a few central points showing the UK connections with the central pillars of the Trump-Russia claims are included here, in the order of discussion in this article: Mifsud allegedly discussed that Russia has ‘dirt’ on Clinton in the form of ‘thousands of emails’ with George Papadopoulos in London in April 2016.
    [Show full text]
  • Letter to the Foreign Secretary
    A3a, Hubble Road Cheltenham Gloucestershire GL51 0EX Robert Hannigan Director Rt Hon Boris Johnson MP Secretary of State for Foreign & Commonwealth Affairs Monday, 23 January 2017 Dear Foreign Secretary, I have had the great privilege of leading the men and women of GCHQ since 2014. I am proud of what we have achieved in those years, not least setting up the National Cyber Security Centre and building greater public understanding of our intelligence work. I am equally proud of the relentless 24 hour operational effort against terrorism, crime and many other national security threats. While this work must remain secret, you will know how many lives have been saved in this country and overseas by the work of GCHQ. Underpinning this is our world-class technology and, above all, our brilliant people. As you know, I have also initiated the greatest internal change within GCHQ for thirty years, and I feel that we are now well on the way to being fit for the next generation of security challenges to the UK in the digital age. 1 of 2 This information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation. Refer any FOIA queries to GCHQ on 01242 221491 x30306 or [email protected] After a good deal of thought I have decided that this is the right time to move on and to allow someone else to lead GCHQ through its next phase. I am, like you, a great enthusiast for our history and I think it is right that a new Director should be firmly embedded by our centenary in 2019.
    [Show full text]
  • The Power of Networks Networks Have Long Been Extolled As Powerful Tools for Business
    The power of networks Networks have long been extolled as powerful tools for business. Robert Hannigan, former Director of GCHQ and Chairman of BlueVoyant, Europe, talks to Inflexion about establishing and maintaining them. Networks can be phenomenal tools Once you identify the right people, Loyalty to networks is important if they consist of the right mix of motivation is key. and comes from having the right people. To mitigate the self-selection People need a common purpose, an leadership. bias inherent in networks, an open enthusiasm around an ambition that is higher This is absolutely crucial if you are at the mind towards recruitment is key. than themselves and has a reward beyond forefront of innovation, since you’ll make a Cybercrime networks for example the purely financial. It needs a meaning number of mistakes – as is normal when beyond their everyday experience, so finding a have a core membership group and venturing into new areas. But in order to take purpose which the network coheres around is risks, which are inherent in entrepreneurship, are good at pulling in appropriate absolutely key. you have to have the confidence the people talent in an agile way. They do this Tapping into that motivation to get a goal to will come with you, rather than tear you apart on an ad hoc and short-term basis, aim for is very important. This is particularly when you fall down. operating very fluidly and flexibly. true when the network is disparate and may You need loyalty to take risks, and you need This is very important in the modern, not meet often, so they need this cohesive risks to get innovation.
    [Show full text]
  • Surveillance After Snowden: Effective Espionage in an Age of Transparency By: Robin Simcox ISBN 978-1-909035-18-8
    SURVEILLANCE AFTER SNOWDEN Effective Espionage in an Age of Transparency Robin Simcox Published in 2015 by The Henry Jackson Society The Henry Jackson Society Millbank Tower 21-24 Millbank London SW1P 4QP Registered charity no. 1140489 Tel: +44 (0)20 7340 4520 www.henryjacksonsociety.org © The Henry Jackson Society 2015 The Henry Jackson Society All rights reserved The views expressed in this publication are those of the author and are not necessarily indicative of those of The Henry Jackson Society or its Trustees. Title: Surveillance after Snowden: Effective Espionage in an Age of Transparency By: Robin Simcox ISBN 978-1-909035-18-8 £10.00 where sold All rights reserved Front Cover Image: Laura Poitras/Praxis Films (© wikimedia.org). www.istockphoto.com SURVEILLANCE AFTER SNOWDEN Effective Espionage in an Age of Transparency Robin Simcox www.henryjacksonsociety.org 5 SURVEILLANCE AFTER SNOWDEN Effective Espionage in an Age of Transparency Acknowledgments Many of those who agreed to speak to me in the course of this project cannot be named. They all have my thanks, as does Elliot Soward for his research assistance. Additional thanks to Richard Black, Samantha Feuer, Mark Finegold, Oscar Isham, Livinia Mouries, Jeevan Vipinachandran, Chris Underwood and Quentin Wight. About the Author Robin Simcox is a Research Fellow at The Henry Jackson Society, where he works on terrorism and security issues. He has written for the likes of Foreign Affairs, Washington Post, Wall Street Journal, Los Angeles Times, The Guardian, New Republic and The Atlantic; and comments in the media for the likes of the BBC, CNN, Sky News, al-Jazeera and Fox News.
    [Show full text]
  • Gov.Uk Gov.Uk
    1/17/2020 Appointment of the new Director of GCHQ - GOV.UK GOV.UK 1. Home (https://www.gov.uk/) 2. Crime, justice and law (https://www.gov.uk/crime-justice-and-law) 3. Counter-terrorism (https://www.gov.uk/crime-justice-and-law/counter-terrorism) Press release Appointment of the new Director of GCHQ Robert Hannigan is appointed as new Director of GCHQ. Published 15 April 2014 From: Foreign & Commonwealth Office (https://www.gov.uk/government/organisations/foreign-commonwealth-office) and The Rt Hon William Hague (https://www.gov.uk/government/people/william-hague) This was published under the 2010 to 2015 Conservative and Liberal Democrat coalition government Robert Hannigan Robert Hannigan has been appointed as successor to Sir Iain Lobban, Foreign Secretary William Hague announced today, with the agreement of the Prime Minister and in consultation with the Deputy Prime Minister. Robert Hannigan has been the Director General, Defence and Intelligence at the Foreign and Commonwealth Office since 2010. He will take over from Sir Iain Lobban when he moves on from the role in the autumn. The appointment was made following a recruitment process chaired by Sir Kim Darroch, National Security Adviser, that was open to crown and civil servants. Foreign Secretary, William Hague said: I am delighted that Robert Hannigan has been appointed as the next Director of GCHQ. GCHQ’s world-class work is vital to the safety and security of the United Kingdom. As well as his impressive personal qualities, Robert brings to the job a wealth of relevant experience in the fields of national security, counter-terrorism and international relations.
    [Show full text]