20150312-P+S-051-Justice Annex

Total Page:16

File Type:pdf, Size:1020Kb

20150312-P+S-051-Justice Annex Freedom from Suspicion Surveillance Reform for a Digital Age a JUSTICE report Freedom from Suspicion Surveillance Reform for a Digital Age October 2011 JUS_Freedom from Suspicion_aw.indd 1 25/10/11 11:14:58 JUSTICE – 50 years of defending the rule of law JUSTICEisanindependentlawreformandhumanrightsorganisation. It works largely through policy-orientated research; interventions in court proceedings; education and training; briefings, lobbying and policy advice. It is the British section of the International Commission of Jurists (ICJ). JUSTICE relies heavily on the help of its members and supporters for the funds to carry out its work. For more information visit www.justice.org.uk. JUSTICE, 59 Carter Lane, London EC4V 5AQ 020 7329 5100 [email protected] www.justice.org.uk © JUSTICE 2011 ISBN: 978-0-907247-53-1 Designed by Adkins Design Printed by Hobbs the Printers JUS_Freedom from Suspicion_aw.indd 2 25/10/11 11:14:58 Freedom from Suspicion JUSTICE Contents Executive summary.......................................................................................................... 5 Acknowledgements ......................................................................................................... 6 Chapter 1: Introduction................................................................................................... 7 Key terms ..................................................................................................................................................... 17 •Interception of Communications ........................................................................................................ 17 •Communications data ........................................................................................................................ 17 •‘Directed’ and ‘intrusive’ surveillance.................................................................................................. 18 •‘Covert human intelligence sources’ ................................................................................................... 18 •Encryption keys .................................................................................................................................. 19 Chapter 2: Surveillance and the right to privacy............................................................ 20 Privacy as a public good............................................................................................................................... 20 What is surveillance?..................................................................................................................................... 21 Privacy and the common law ...................................................................................................................... 23 Article 8 and UK law..................................................................................................................................... 28 •‘In accordance with the law’ .............................................................................................................. 30 •For alegitimate aim ........................................................................................................................... 34 •‘Necessaryinademocratic society’ .................................................................................................... 34 Chapter 3: Interception of communications ................................................................. 38 Lack of prior judicial authorisation ................................................................................................................ 42 Inadequate ex post facto oversight............................................................................................................... 49 Poor drafting and failure to keep pace with technology ............................................................................... 59 Intercept as evidence.................................................................................................................................... 65 Recommendations........................................................................................................................................ 69 Chapter 4: Communications Data ................................................................................. 71 Inadequate authorisation and oversight........................................................................................................ 75 Unnecessarily broad access........................................................................................................................... 79 Increasingly intrusive nature of communications data................................................................................... 82 The riots and social media............................................................................................................................ 84 Recommendations........................................................................................................................................ 85 Chapter 5: ‘Intrusive’ Surveillance.................................................................................. 87 Lack of judicial control of authorisations by Secretary of State...................................................................... 93 Lack of comprehensive oversight.................................................................................................................. 96 Flawed definition of ‘intrusive’...................................................................................................................... 99 Recommendations...................................................................................................................................... 100 3 JUS_Freedom from Suspicion_aw.indd 3 25/10/11 11:14:58 JUSTICE Freedom from Suspicion Chapter 6: ‘Directed’ Surveillance .............................................................................. 102 Flawed definition of ‘directed’ .................................................................................................................... 103 Inadequate authorisation............................................................................................................................ 105 Inadequate oversight.................................................................................................................................. 109 ANPR and CCTV ......................................................................................................................................... 111 Recommendations...................................................................................................................................... 113 Chapter 7: Covert human intelligence sources ............................................................ 115 The need for prior judicial authorisation ..................................................................................................... 117 Recommendations...................................................................................................................................... 119 Chapter 8: Encryption keys.......................................................................................... 120 Unnecessarily complex authorisation and oversight.................................................................................... 123 Encryption and the fight against terrorism.................................................................................................. 125 The right against self-incrimination............................................................................................................. 129 Legal professional privilege......................................................................................................................... 131 Recommendations...................................................................................................................................... 132 Chapter 9: The Investigatory Powers Tribunal.............................................................. 133 Lack of effectiveness ................................................................................................................................... 136 Excessive secrecy and lack of procedural fairness ........................................................................................ 141 Recommendations...................................................................................................................................... 152 Chapter 10: Conclusion............................................................................................... 154 Surveillance reform for a digital age ........................................................................................................... 154 Summary of Recommendations....................................................................................159 Annex: Comparative use of judicial authorsation for surveillance powers in other European and common law countries .............................................................................. 162 4 JUS_Freedom from Suspicion_aw.indd 4 25/10/11 11:14:58 Freedom from Suspicion JUSTICE Executive summary • In 2000, Parliament enacted RIPA. At the time, it was acclaimed by government ministers as human rights-compliant, forward-looking legislation. • Since RIPAcame into force in 2000, there have been: –more than 20,000 warrants for the interception of phone
Recommended publications
  • Serious and Organised Crime Strategy
    Serious and Organised Crime Strategy Cm 8715 Serious and Organised Crime Strategy Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty October 2013 Cm 8715 £21.25 © Crown copyright 2013 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www. nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us [email protected] You can download this publication from our website at https://www.gov.uk/government/ publications ISBN: 9780101871525 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID 2593608 10/13 33233 19585 Printed on paper containing 75% recycled fibre content minimum. Contents Home Secretary Foreword 5 Executive Summary 7 Introduction 13 Our Strategic Response 25 PURSUE: Prosecuting and disrupting serious and 27 organised crime PREVENT: Preventing people from engaging 45 in serious and organised crime PROTECT: Increasing protection against 53 serious and organised crime PREPARE: Reducing the impact of serious and 65 organised crime Annex A: Accountability, governance and funding 71 Annex B: Departmental roles and responsibilities for 73 tackling serious and organised crime 4 Serious and Organised Crime Strategy Home Secretary Foreword 5 Home Secretary Foreword The Relentless Disruption of Organised Criminals Serious and organised crime is a threat to our national security and costs the UK more than £24 billion a year.
    [Show full text]
  • The Wilson Doctrine Pat Strickland
    BRIEFING PAPER Number 4258, 19 June 2015 By Cheryl Pilbeam The Wilson Doctrine Pat Strickland Inside: 1. Introduction 2. Historical background 3. The Wilson doctrine 4. Prison surveillance 5. Damian Green 6. The NSA files and metadata 7. Labour MPs: police monitoring www.parliament.uk/commons-library | intranet.parliament.uk/commons-library | [email protected] | @commonslibrary Number 4258, 19 June 2015 2 Contents Summary 3 1. Introduction 4 2. Historical background 4 3. The Wilson doctrine 5 3.1 Criticism of the Wilson doctrine 6 4. Prison surveillance 9 4.1 Alleged events at Woodhill prison 9 4.2 Recording of prisoner’s telephone calls – 2006-2012 10 5. Damian Green 12 6. The NSA files and metadata 13 6.1 Prism 13 6.2 Tempora and metadata 14 Legal challenges 14 7. Labour MPs: police monitoring 15 Cover page image copyright: Chamber-070 by UK Parliament image. Licensed under CC BY 2.0 / image cropped 3 The Wilson Doctrine Summary The convention that MPs’ communications should not be intercepted by police or security services is known as the ‘Wilson Doctrine’. It is named after the former Prime Minister Harold Wilson who established the rule in 1966. According to the Times on 18 November 1966, some MPs were concerned that the security services were tapping their telephones. In November 1966, in response to a number of parliamentary questions, Harold Wilson made a statement in the House of Commons saying that MPs phones would not be tapped. More recently, successive Interception of Communications Commissioners have recommended that the forty year convention which has banned the interception of MPs’ communications should be lifted, on the grounds that legislation governing interception has been introduced since 1966.
    [Show full text]
  • Hacking Affair Is Not Over – but What Would a Second Leveson Inquiry Achieve?
    7/10/2019 Hacking affair is not over – but what would a second Leveson inquiry achieve? Academic rigour, journalistic flair Hacking affair is not over – but what would a second Leveson inquiry achieve? July 25, 2014 3.57pm BST Author John Jewell Director of Undergraduate Studies, School of Journalism, Media and Cultural Studies, Cardiff University On we go. Ian Nicholson/PA In the latest episode in the long-running saga that is the phone hacking affair, Dan Evans, a former journalist at the News of the World and Sunday Mirror, has received a 10 month suspended sentence after being convicted of two counts of phone hacking, one of making illegal payments to officials, and one of perverting the course of justice. Coming so soon after the conviction of Andy Coulson and the acquittal of Rebekah Brooks and others, one could be forgiven for assuming that the whole phone hacking business is now done and dusted. Not a bit of it. As Julian Petley has written: “Eleven more trials are due to take place involving 20 current or former Sun and News of the World journalists, who are accused variously of making illegal payments to public officials, conspiring to intercept voicemail and accessing data on stolen mobile phones.” We also learned in June that Scotland Yard had officially told Rupert Murdoch of their intention to interview him as part of their inquiry into allegations of crime at his British newspapers. The Guardian revealed that Murdoch was first contacted in 2013, but the police ceded to his lawyers’ request that any interrogation should wait until the Coulson–Brooks trial had finished.
    [Show full text]
  • Unauthorised Tapping Into Or Hacking of Mobile Communications
    House of Commons Home Affairs Committee Unauthorised tapping into or hacking of mobile communications Thirteenth Report of Session 2010–12 1. This report is strictly embargoed and is not for broadcast or publication, in any form, before 05.00hrs, Wednesday 20 July 2011. 2. This report is issued under the condition that it should not be forwarded or copied to anyone else. 3. Under no circumstances should you distribute copies to anyone else or speak to the media before the publication time about the content of this report. 4. The report is subject to parliamentary copyright and you are not permitted to distribute, replicate, or publish further copies either in hard copy or on the internet either before or after publication. 5. If these instructions are unclear in any way please contact Alex Paterson on 020 7219 1589 or email [email protected] HC 907 Unauthorised tapping into or hacking of mobile communications 3 House of Commons Home Affairs Committee Unauthorised tapping into or hacking of mobile communications Thirteenth Report of Session 2010–12 Ordered by the House of Commons to be printed 19 July 2011 HC 907 Published on 20 July 2011 by authority of the House of Commons London: The Stationery Office Limited £0.00 The Home Affairs Committee The Home Affairs Committee is appointed by the House of Commons to examine the expenditure, administration, and policy of the Home Office and its associated public bodies. Current membership Rt Hon Keith Vaz MP (Labour, Leicester East) (Chair) Nicola Blackwood MP (Conservative, Oxford West
    [Show full text]
  • Aftermath of the Anti-Terrorism Police Raids in Forest Gate on 2 June 2006
    Scrutiny by the Metropolitan Police Authority of communication and media at the Metropolitan Police Service with particular reference to the handling of media and communications during the Forest Gate incident of June 2006 Aftermath of the Anti-Terrorism Police Raids in Forest Gate on 2 June 2006 Submission of Newham Monitoring Project 27 September 2006 Aftermath of the Police Raids in Forest Gate on 2 June 2006 1. Terms of Reference 1.1. On Friday 2 June, 2006 police carried out raids on 46 and 48 Lansdown Road, Forest Gate, London. In the weeks following these raids the Metropolitan Police Authority (MPA) amended its existing scrutiny programme of the Metropolitan Police Service (MPS) for 2006/7 to include the media and communications strategy of the MPS. 1.2. The stated objectives of this amendment to the MPA’s scrutiny programme is to : a) Assess the extent to which the MPS has the strategies, policies, protocols and processes in place to ensure efficient and effective communication, media and reputation management, particularly in the context of the 24 hour news environment. b) Undertake a detailed analysis of the handling of the media and communication during the Forest Gate incident in June 2006. c) Assess how effectively the MPS engages internally to manage communication to the media, Londoners and stakeholders, particularly during sensitive operations. d) Understand the culture of the MPS towards communication and media management and the impact this has on the delivery of an effective service. e) Evaluate the use of resources available to the MPS to deliver this key function, including understanding the division of resources and lines of accountability between central and local directorates.
    [Show full text]
  • The Wilson Doctrine Samantha Godec
    BRIEFING PAPER Number 4258, 12 June 2017 By Pat Strickland Joanna Dawson The Wilson Doctrine Samantha Godec Inside: 1. Introduction 2. Historical background 3. The Wilson doctrine 4. The NSA files and metadata 5. The Investigatory Powers Tribunal judgment 6. Prison surveillance 7. Labour MPs: police monitoring 8. Investigatory Powers Act 2016 www.parliament.uk/commons-library | intranet.parliament.uk/commons-library | [email protected] | @commonslibrary Number 4258, 12 June 2017 2 Contents Summary 3 1. Introduction 4 2. Historical background 4 3. The Wilson doctrine 5 3.1 Criticism of the Wilson doctrine 6 4. The NSA files and metadata 9 4.1 Prism 9 4.2 Tempora and metadata 10 5. The Investigatory Powers Tribunal judgment 11 Emergency debate 12 6. Prison surveillance 13 6.1 Alleged events at Woodhill prison 13 6.2 Recording of prisoners’ telephone calls – 2006-2012 14 7. Labour MPs: police monitoring 15 8. Investigatory Powers Act 2016 16 Cover page image copyright: Chamber-070 by UK Parliament image. Licensed under CC BY 2.0 / image cropped 3 The Wilson Doctrine Summary The convention that MPs’ communications should not be intercepted by police or security services is known as the ‘Wilson Doctrine’. It is named after the former Prime Minister Harold Wilson who announced the policy in 1966. According to The Times on 18 November 1966, some MPs were concerned that the security services were tapping their telephones. In November 1966, in response to a number of parliamentary questions, Harold Wilson made a statement in the House of Commons saying that MPs phones would not be tapped.
    [Show full text]
  • User Guide to Crime Statistics for England and Wales
    User Guide to Crime Statistics for England and Wales April 2017 Office for National Statistics About us Copyright and reproduction The Office for National Statistics © Crown copyright 2017 The Office for National Statistics (ONS) is the executive You may re-use this information (not including logos) office of the UK Statistics Authority, a non-ministerial free of charge in any format or medium, under the terms department which reports directly to Parliament. ONS of the Open Government Licence. is the UK government’s single largest statistical producer. It compiles information about the UK’s To view this licence, go to: society and economy, and provides the evidence-base http://www.nationalarchives.gov.uk/doc/open- for policy and decision-making, the allocation of government-licence resources, and public accountability. The Director- or write to the Information Policy Team, The National General of ONS reports directly to the National Archives, Kew, London TW9 4DU Statistician who is the Authority's Chief Executive and the Head of the Government Statistical Service. email: [email protected] The Government Statistical Service Any enquiries regarding this publication should be sent The Government Statistical Service (GSS) is a network to: [email protected] of professional statisticians and their staff operating both within the Office for National Statistics and across This publication is available for download at: more than 30 other government departments and www.ons.gov.uk agencies. Contacts This publication For information
    [Show full text]
  • St 9617 2004 Dcl 1
    Council of the European Union Brussels, 30 November 2020 (OR. en) 9617/04 DCL 1 LIMITE SCH-EVAL 33 COMIX 344 DECLASSIFICATION of document: 9617/04 RESTREINT UE dated: 17 May 2004 new status: LIMITE Subject: Questionnaire – Questions to UK on data protection arrangements relating to the UK’s national implementation of the Schengen Information System. - Answers from the UK Delegations will find attached the declassified version of the above document. The text of this document is identical to the previous version. 9617/04 DCL 1 KAL SMART 2.C.S1 LIMITE EN RESTREINT UE COUNCIL OF Brussels, 17 May 2004 THE EUROPEAN UNION 9617/04 RESTREINT UE SCH-EVAL 33 COMIX 344 NOTE from : UK delegation to : Schengen Evaluation Working Party No. prev. doc. : 9227/04 SCH-EVAL 25 COMIX 308 + ADD 1 Subject : Questionnaire – Questions to UK on data protection arrangements relating to the UK’s national implementation of the Schengen Information System. - Answers from the UK The United Kingdom has asked the Schengen Evaluation Group to undertake an evaluation of the data protection arrangements which it has in place to support the introduction of the Schengen Information System to the UK. As the UK’s technical solution to the SIS has not yet been finalised, the questions relate only to data protection arrangements. Questions relating to the management and handling of the data will be answered in the context of the full SIS evaluation which will take place once the UK’s national solution has been fully implemented. 1. Provide the list of services with access to SIS data See Annex A and Annex B 9617/04 WvdR/kve 1 DG H RESTREINT UE EN RESTREINT UE 2.
    [Show full text]
  • Asset Recovery Action Plan (
    GOV.UK 1. Home (https://www.gov.uk/) 2. Asset recovery action plan (https://www.gov.uk/government/publications/asset-recovery-action-plan) 1. Home Office (https://www.gov.uk/government/organisations/home-office) Policy paper Asset Recovery Action Plan, accessible Updated 13 September 2019 Contents Ministerial Foreword Introduction Section 1: Legal Powers Section 2: Strengthening our Operational Response Section 3: Continuously Review and Embed Best Practice Section 4: Fostering Innovation and Collaboration Appendix A: table of actions © Crown copyright 2019 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government- licence/version/3 (https://www.nationalarchives.gov.uk/doc/open-government-licence/version/3) or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at https://www.gov.uk/government/publications/asset-recovery-action- plan/asset-recovery-action-plan Ministerial Foreword Serious and organised crime is a threat to our national security. Money is the common thread that runs through almost all offending, as criminals use the proceeds of their crime to fund their lifestyle and conduct further crime. As set out in the Serious & Organised Crime Strategy (https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/752850/SOC-2018- web.pdf) we are committed to working collaboratively with our partners and stakeholders to leave no safe space for those seeking to move, hide or use the proceeds of crime and corruption or to evade sanctions.
    [Show full text]
  • Summer 2011 Bulletinprimary.Indd
    A PUBLICATION OF THE SILHA CENTER FOR THE STUDY OF MEDIA ETHICS AND LAW | SUMMER 2011 Not Just a ‘Rogue Reporter’: ‘Phone Hacking’ Scandal Spreads Far and Wide The so-called “phone hacking” scandal has led to more than Murdoch Closes News of the World and a dozen arrests, resignations by top News Corp. executives Speaks to Parliament while Public and British police, the launching of several new investigations Outrage Grows over Tabloid Crime, into News Corp. business practices, and pressured Murdoch to retreat from a business deal to purchase the remaining Collusion, and Corruption portion of BSkyB that he did not own. The U.S. Department of Justice and the Securities and Exchange Commission (SEC) massive ethical and legal scandal enveloped the are reportedly conducting preliminary investigations into the Rupert Murdoch-owned British tabloid News of possibility of international law violations. The FBI is reportedly the World in the summer of 2011, leading to its investigating allegations that Murdoch journalists hacked into sudden closure. New allegations arose almost the phones of victims of the Sept. 11, 2001 terrorist attacks daily that reporters and private investigators or their families. British police have teamed up with Scottish Aillegally accessed the voice mail messages of politicians, authorities to continue investigating claims of phone hacking. celebrities, and private citizens. The revelations sparked Parliament launched a formal inquiry into the scandal and has worldwide public outcry and led to sweeping law enforcement questioned top News Corp. offi cials including Rupert Murdoch investigations directed at top editors of the paper, executives and his son, James Murdoch.
    [Show full text]
  • Report Into the London Terrorist Attacks on 7 July 2005
    ISC Annual Report_prelims 9/5/06 11:06 am Page TPi Intelligence and Security Committee Report into the London Terrorist Attacks on 7 July 2005 Chairman: The Rt. Hon. Paul Murphy, MP Presented to Parliament by the Prime Minister by Command of Her Majesty MAY 2006 Cm 6785 £10.50 ISC Annual Report_prelims 8/5/06 11:50 pm Page ii © Crown Copyright 2006 The text in this document (excluding the Royal Arms and departmental logos) may be reproduced free of charge in any format or medium providing that it is reproduced accurately and not used in a misleading context. The material must be acknowledged as Crown copyright and the title of the document specified. Any enquiries relating to the copyright in this document should be addressed to The Licensing Division, HMSO, St Clements House, 2–16 Colegate, Norwich NR3 1BQ. Fax: 01603 723000 or e-mail: [email protected] ISC Annual Report_prelims 8/5/06 11:50 pm Page iii From: The Chairman, The Rt. Hon. Paul Murphy, MP INTELLIGENCE AND SECURITY COMMITTEE 70 Whitehall London SW1A 2AS ISC 105/2006 30 March 2006 Rt. Hon. Tony Blair, MP Prime Minister 10 Downing Street London SW1A 2AA On 7 July 2006 fifty-two people were killed in the terrorist attacks in London. The Intelligence and Security Committee has examined the intelligence and security matters relevant to the attacks and I enclose with this letter a Report which covers our findings. Investigations into the 7 and 21 July events continue, and therefore some information remains sub judice.
    [Show full text]
  • Joint Annual Report of the MPS/MPA 2004-05
    Metropolitan Police Service and Metropolitan Police Authority Annual Report 2004/05 Contents Joint foreword by the Commissioner of the Metropolitan Police Service and the Chair of the Metropolitan Police Authority 3 Introduction 4 The priorities 5 Priority: Protecting the capital against terrorism 6 Objective: To minimise the risk to life and property from terrorist activity in London 6 Objective: To maintain an effective response to suspected and actual terrorist incidents 6 Priority: Reducing serious crime 10 Objective: To reduce the level of gun-enabled crime 10 Objective: To disrupt organised criminal activity of persons identified as Class A drugs suppliers 12 Objective: To dismantle organised criminal networks and seize their assets 13 Objective: To safeguard children and young persons from physical and sexual abuse 15 Priority: Promoting reassurance 16 Objective: To improve neighbourhood safety 16 Objective: To reduce the level of robbery compared with 2003/04 24 Objective: To improve our contribution to the criminal justice system 26 Objective: To recognise and respond appropriately to the differential impact of crime on people, taking into account their race, gender, sexual orientation, faith, age or disability 28 Supporting the priorities 34 Supporting the priorities 34 Managing our resources – the Directorate of Resources 37 Supporting our people – the Human Resources Directorate 41 Communicating our message – the Directorate of Public Affairs (DPA) 45 MPS financial performance 2004/05 45 The MPS response to the tsunami crisis 48 MPA review of performance 2004/05 50 MPA review of performance 2004/05 50 Performance indicators 2004/05 55 Performance tables 56 Objectives, measures and targets for 2005/06 61 Threatened/civil actions and damages paid 63 Police officers and police staff punished as a result of misconduct proceedings during 2004/05 64 Deaths following police contact during 2004/05 65 Alternative languages 66 Front cover: photo BRD Associates The assistance of the staff and students of Welling School, Bexley is gratefully acknowledged.
    [Show full text]