{"id":2957,"date":"2015-11-11T11:02:02","date_gmt":"2015-11-11T16:02:02","guid":{"rendered":"http:\/\/blogs.shu.edu\/diplomacy\/?p=2957"},"modified":"2016-02-20T13:36:19","modified_gmt":"2016-02-20T18:36:19","slug":"changing-safeguards-in-britains-intelligence-community","status":"publish","type":"post","link":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/2015\/11\/changing-safeguards-in-britains-intelligence-community\/","title":{"rendered":"Changing Safeguards in Britain\u2019s Intelligence Community"},"content":{"rendered":"<p><span style=\"font-weight: 400\">The <\/span><a href=\"https:\/\/twitter.com\/search?q=%23IPBill&amp;src=tyah\"><span style=\"font-weight: 400\">twitterverse<\/span><\/a><span style=\"font-weight: 400\"> has been up in arms this past week about what Internet users are calling an undemocratic and \u201cbreathtaking\u201d attack on privacy. A new \u201c<\/span><a href=\"https:\/\/www.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/473770\/Draft_Investigatory_Powers_Bill.pdf\"><span style=\"font-weight: 400\">Investigatory Powers Bill<\/span><\/a><span style=\"font-weight: 400\">\u201d (frequently described as the \u201csnooper\u2019s charter\u201d) was presented to the British Parliament this past Wednesday for initial review and consulting. It is slated to be introduced as a bill come the New Year. In order to become a law, it will have to pass in both houses of the British Parliament. An incredible amount of the rhetoric used by major British media outlets in covering this bill makes it sound as if Britain is facing a momentous occasion to see whether or not George Orwell\u2019s <\/span><i><span style=\"font-weight: 400\">1984<\/span><\/i><span style=\"font-weight: 400\"> will really come true. In a tweet yesterday, renowned hacker group Anonymous shared a Guardian <\/span><a href=\"http:\/\/www.theguardian.com\/commentisfree\/2015\/nov\/08\/surveillance-bill-snoopers-charter-george-orwell\"><span style=\"font-weight: 400\">article that reads<\/span><\/a><span style=\"font-weight: 400\"> \u201cU.K. Snooper\u2019s Charter makes George Orwell look like he lacked vision.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400\">The forward in the draft bill, written by the Right Honourable Theresa May, highlights missing persons, child exploitation, and drug cartels as the predominant threats that warrant the proposed increase in intelligence power. Indeed, the first case study in the published document referenced a child sexual exploitation case involving the lead singer of the band <\/span><i><span style=\"font-weight: 400\">Lostprophets<\/span><\/i><span style=\"font-weight: 400\">, Ian Watkins; a case based on recovered emails and other web-based communications. It is easier to sell a product when you\u2019re using it to save children and missing persons, but many UK citizens are concerned about what these newly proposed powers would mean for themselves and their families. If you are an average citizen of the United Kingdom reading this right now, and you\u2019re curious about what this new legislation means to you, you can find a helpful breakdown <\/span><a href=\"https:\/\/theconversation.com\/us\"><span style=\"font-weight: 400\">here<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Ideally, according to this forward, these powers will be subject to \u201crobust safeguards and visible, effective oversight.\u201d Emphasizing oversight has been a hugely important aspect of the publication of this bill. The draft bill seeks to consolidate existing powers of the three parties that currently serve as overseers for the intelligence community, create some new oversight mechanisms altogether and update legislation to accommodate an era where communication is largely Internet-based. This draft bill has been lauded as the result of three reviews and 198 resulting recommendations regarding the use and oversight of investigatory powers by the U.K.\u2019s intelligence agencies. According to the text of the draft bill, there are currently three oversight bodies in the United Kingdom, which is \u201cmore confusing than a single, authoritative body which has all the skills and resources it needs.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400\">A recent <\/span><a href=\"http:\/\/www.economist.com\/news\/britain\/21677611-new-surveillance-bill-extends-powers-spies-mi5-love\"><span style=\"font-weight: 400\">article by the Economist<\/span><\/a><span style=\"font-weight: 400\"> notes that this draft bill has experienced more consensus than surveillance bills of the past, likely helped by the fact that the U.K.\u2019s <\/span><a href=\"http:\/\/www.electionguide.org\/elections\/id\/2417\/\"><span style=\"font-weight: 400\">Liberal Democrat party lost 49<\/span><\/a><span style=\"font-weight: 400\"> seats this past May (they served as the main pro-privacy voice in the legislature). The main changes in this bill involve requiring judges to issue a warrant before an intelligence agency can acquire the data, communications agencies to hold onto all their client\u2019s data for 12 months (lest they become suspect of anything), and authorities will allegedly not be allowed to know which specific web pages were viewed, rather the category of Internet usage. One of the major concessions in the draft bill is that it does not \u00a0require \u00a0technology companies to avoid or build \u201cback doors\u201d to encryption mechanisms, although some <\/span><a href=\"http:\/\/theconversation.com\/investigatory-powers-bill-will-remove-isps-right-to-protect-your-privacy-50178\"><span style=\"font-weight: 400\">commentators are still angry<\/span><\/a><span style=\"font-weight: 400\"> that \u201cend-to end\u201d encryption (where the only actors who can access the information are the two users involved) is still banned. It is also suggested that the \u201cbulk inference\u201d and \u201cbulk data retention\u201d parts of the bill refer to giving the intelligence bureaus relatively explicit power to hack into the systems of suspects and retain mass surveillance of its population, wording that is worrisome to British privacy and civil-liberties groups. <\/span><\/p>\n<p><a href=\"http:\/\/www.bbc.com\/news\/uk-politics-34715872\"><span style=\"font-weight: 400\">The draft bill&#8217;s measures include<\/span><\/a><span style=\"font-weight: 400\">:<\/span><\/p>\n<ul>\n<li style=\"text-align: left\"><span style=\"font-weight: 400\">Giving a panel of judges the power to block spying operations authorised by the home secretary. \u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">A new criminal offence of &#8220;knowingly or recklessly obtaining communications data from a telecommunications operator without lawful authority&#8221;, carrying a prison sentence of up to two years<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Local councils to retain some investigatory powers, such as surveillance of benefit cheats, but they will not be able to access online data stored by Internet firms<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">The Wilson doctrine &#8211; preventing surveillance of Parliamentarians&#8217; communications &#8211; to be written into law<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Police will not be able to access journalistic sources without the authorisation of a judge<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">A legal duty on British companies to help law enforcement agencies hack devices to acquire information if it is reasonably practical to do so<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Former Appeal Court judge Sir Stanley Burnton has been \u00a0<\/span><a href=\"https:\/\/www.gov.uk\/government\/news\/sir-stanley-burnton-appointed-interception-of-communications-commissioner\"><b>appointed as the new interception of communications commissioner<\/b><\/a><span style=\"font-weight: 400\">. This role is outlined in section 57 of the draft bill, where the Prime Minister gets to appoint a person of high judicial office to review the <\/span><a href=\"https:\/\/www.gov.uk\/government\/news\/sir-stanley-burnton-appointed-interception-of-communications-commissioner\"><span style=\"font-weight: 400\">Interception of Communications warrants<\/span><\/a><span style=\"font-weight: 400\">. <\/span><\/p>\n<p><span style=\"font-weight: 400\">May was <\/span><a href=\"http:\/\/www.tmay.co.uk\/biography\"><span style=\"font-weight: 400\">appointed Home Secretary<\/span><\/a><span style=\"font-weight: 400\"> in the spring of \u00a02010. Her biography notes an interest in securing the U.K.\u2019s borders against immigration and terrorism as her top priorities. <\/span><\/p>\n<p><span style=\"font-weight: 400\">Many people see this bill as a reaction to Edward Snowden\u2019s NSA leak. Snowden\u2019s twitter <\/span><a href=\"http:\/\/www.theguardian.com\/politics\/blog\/live\/2015\/nov\/04\/surveillance-internet-snoopers-charter-may-plans-politics-live\"><span style=\"font-weight: 400\">responses have been furious<\/span><\/a><span style=\"font-weight: 400\">, In one of his more popular tweets he wrote; \u00a0<\/span><span style=\"font-weight: 400\">\u201cIt\u2019s only communications data\u201d = \u201cIt\u2019s only a comprehensive record of your private activities.\u201d It\u2019s the activity log of your life. <\/span><\/p>\n<p><span style=\"font-weight: 400\">We\u2019ll see over the next couple of months how this piece of legislation plays out, and whether the new powers outlined in the new draft Bill really measure up to the hype.<\/span><\/p>\n<p>&#8212;<\/p>\n<p><em><b>Sarah Ireland<\/b><span style=\"font-weight: 400\"> is a Deputy Editor-in-Chief for the Journal of Diplomacy and International Relations. She is currently pursuing her M.A. in Diplomacy and International Relations at Seton Hall University, where she is specializing in Foreign Policy Analysis and the Middle East.<\/span><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Follow the Journal of Diplomacy on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/JournalofDiplo\" target=\"_blank\">@JournalofDiplo<\/a><\/p>\n<p><em><a href=\"http:\/\/www.theguardian.com\/politics\/2015\/nov\/03\/may-calls-for-internet-companies-to-store-details-of-website-visits#img-1\" target=\"_blank\">Image Source<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The twitterverse has been up in arms this past week about what Internet users are calling an undemocratic and \u201cbreathtaking\u201d<\/p>\n","protected":false},"author":63,"featured_media":2959,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[175,349,174],"tags":[351,353,354,352,350],"class_list":["post-2957","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editors-pick","category-europe","category-featured-2","tag-intelligence","tag-internet-security","tag-snowden","tag-surveillance","tag-u-k"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/wp-json\/wp\/v2\/posts\/2957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/wp-json\/wp\/v2\/comments?post=2957"}],"version-history":[{"count":4,"href":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/wp-json\/wp\/v2\/posts\/2957\/revisions"}],"predecessor-version":[{"id":3222,"href":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/wp-json\/wp\/v2\/posts\/2957\/revisions\/3222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/wp-json\/wp\/v2\/media\/2959"}],"wp:attachment":[{"href":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/wp-json\/wp\/v2\/media?parent=2957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/wp-json\/wp\/v2\/categories?post=2957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.shu.edu\/journalofdiplomacy\/wp-json\/wp\/v2\/tags?post=2957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}