Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Investigatory Powers Bill and journalism


Published on

Talk at the Open Rights Group Birmingham, September 2016

Published in: Education
  • Be the first to comment

The Investigatory Powers Bill and journalism

  1. 1. @PaulBradshaw, Online Journalism Blog Birmingham City University (and journalism) The #IPBill
  2. 2. Mass collection Thematic warrants Data sharing Hacking powers Poor oversight How many problems?
  3. 3. **
  4. 4. “This application produced five telephone numbers, all of which were researched for connections with the MPS [Metropolitan Police Service]. One number was identified as the switchboard number for Hinchingbrooke Hospital in Cambridgeshire. It was established that Officer 15 DPG’s wife Member of Public 3, was employed at that hospital ”Enquiries were made with Siemens in order to identify from the data on the exhibit, which extension within the hospital the call to The Sun was made from.” Operation Alice Report, Metropolitan Police
  5. 5.
  6. 6. The person calling the crisis line is not ordering pizza. The profiler’s assumption that the device is equal to, or identical with, or identifiable with its user is an obvious pragmatic reduction Oliver Leistert: “Data doubles” Leistert, Oliver. Data Retention in the European Union: When a Call Returns, International Journal of Communication 2 (2008)
  7. 7. *
  8. 8. ** Your devices may betray you.
  9. 9. *
  10. 10. *
  11. 11. “We kill people based on metadata” General Michael Hayden, former director of CIA and NSA
  12. 12. ** Why might you be targeted? Because you used the wrong words
  13. 13. *
  14. 14.
  15. 15. “It is inevitable that an investigator will be tempted to use every means at his disposal and to keep his options open when planning covert surveillance; to be, as often quoted in my presence at ACPO conferences, “lawfully audacious” Sam Lincoln, Office of Surveillance Commissioners
  16. 16. * What might be used against you?
  17. 17. *
  18. 18. *
  19. 19. Data sharing
  20. 20. *
  21. 21. *
  22. 22. *
  23. 23.
  24. 24. 517,236 searches 795 public bodies 1 year
  25. 25. “When it comes to contracts, suppliers that have routinely messed up are handed more deals. When it comes to policy, approaches that have proved unsuccessful get dusted off and pushed with renewed vigour.” Kat Hall, The Register
  26. 26. The health sector has the most data breaches, followed by local government. Furthermore, not all threats to cyber security or data protection are from external actors: over 40% are caused by employees, contractors and third party suppliers, and half of these are accidental. Information Commissioner’s Office published-16-17/
  27. 27.
  28. 28. * access-email-and-phone-records.html
  29. 29. * h ht
  30. 30. *