The Twelve Days of Corbyn

On the first day of Corbyn

The media gave to me

Some preening by Polly Toynbee

————————-

On the second day of Corbyn

The media gave to me

Two caustic Cohens

And some preening by Polly Toynbee

————————-

On the third day of Corbyn

The media gave to me

Three John Manns

Two caustic Cohens

And some preening by Polly Toynbee

————————-

On the fourth day of Corbyn

The media gave to me

Four Hilary Benns

Three John Manns

Two caustic Cohens

And some preening by Polly Toynbee

————————-

On the fifth day of Corbyn

The media gave to me

Five – Tony – Blairs

Five Blairs 2

Four Hilary Benns

Three John Manns

Two caustic Cohens

And some preening by Polly Toynbee

————————-

On the sixth day of Corbyn

The media gave to me

Six Rentouls ranting

Five – Tony – Blairs

Four Hilary Benns

Three John Manns

Two caustic Cohens

And some preening by Polly Toynbee

————————-

On the seventh day of Corbyn

The media gave to me

Seven Hodges’ hating

Six Rentouls ranting

Five – Tony – Blairs

Four Hilary Benns

Three John Manns

Two caustic Cohens

And some preening by Polly Toynbee

————————-

On the eighth day of Corbyn

The media gave to me

Eight Behrs-a-baiting

Seven Hodges’ hating

Six Rentouls ranting

Five – Tony – Blairs

Four Hilary Benns

Three John Manns

Two caustic Cohens

And some preening by Polly Toynbee

————————-

On the ninth day of Corbyn

The media gave to me

Nine Hymans snivelling

Eight Behrs-a-baiting

Seven Hodges’ hating

Six Rentouls ranting

Five – Tony – Blairs

Four Hilary Benns

Three John Manns

Two caustic Cohens

And some preening by Polly Toynbee

————————-

On the tenth day of Corbyn

The media gave to me

Ten Danczuks drivelling

Nine Hymans snivelling

Eight Behrs-a-baiting

Seven Hodges’ hating

Six Rentouls ranting

Five – Tony – Blairs

Four Hilary Benns

Three John Manns

Two caustic Cohens

And some preening by Polly Toynbee

————————-

On the eleventh day of Corbyn

The media gave to me

Eleven John McTernans

Ten Danczuks drivelling

Nine Hymans snivelling

Eight Behrs-a-baiting

Seven Hodges’ hating

Six Rentouls ranting

Five – Tony – Blairs

Four Hilary Benns

Three John Manns

Two caustic Cohens

And some preening by Polly Toynbee

————————-

On the twelfth day of Corbyn

The media gave to me

Twelve Byrnes-a-burning

Eleven John McTernans

Ten Danczuks drivelling

Nine Hymans snivelling

Eight Behrs-a-baiting

Seven Hodges’ hating

Six Rentouls ranting

Five – Tony – Blairs

Four Hilary Benns

Three John Manns

Two caustic Cohens

And some preening by Polly Toynbee

————————-

Finding Proportionality in Surveillance Laws – Guest post by Andrew Murray

The United Kingdom Parliament is currently in the pre-legislative scrutiny phase of a new Investigatory Powers Bill, which aims to “consolidate existing legislation and ensure the powers in the Bill are fit for the digital age”. It is fair to sat this Bill is controversial with strong views being expressed by both critics and supporters of the Bill. Against this backdrop it is important to cut through the rhetoric and get to the heart of the Bill and to examine what it will do and what it will mean in terms of the legal framework for British citizens, and indeed for those overseas.

The Investigatory Powers Bill

Much of the Bill’s activity is to formalise and restate pre-existing surveillance powers. One of the key criticisms of the extant powers of the security and law enforcement services is that the law lacks clarity. Indeed it was this lack of clarity which led the Investigatory Powers Tribunal to rule in the landmark case of Liberty v GCHQ that the regulations which covered GCHQ’s access to emails and phone records intercepted by the US National Security Agency breached Articles 8 and 10 of the European Convention on Human Rights. Following a number of strong critiques of the law including numerous legal challenges the Government received three reports into the current law: the report of the Intelligence and Security Committee of Parliament, “Privacy and Security: A modern and transparent legal framework”; the report of the Independent Reviewer of Terrorism Legislation. “A Question of Trust”; and the report of the Royal United Services Institute: “A Democratic Licence to Operate”. All three reported deficiencies in the law’s transparency.

As a result the Bill restates much of the existing law in a way which should be more transparent and which, in theory, should allow for greater democratic and legal oversight of the powers of the security and law enforcement services. In essence the Bill is split into sections: interception, retention, equipment interference and oversight, with each of the three substantive powers split again into targeted and bulk. What this means in practice is the authorisation of three broad types of activity (each of which have sub-types); the authorisation to intercept data between sender and receiver, the authorisation to retain data such as communications data and internet connection records (more below) for possible processing later and authorisation to interfere with (in colloquial terms “hack”) systems and devices. For each of these there is a split between targeted activity, this is required when dealing with communications which are sent and received by individuals who are inside the British Islands (domestic communications) and bulk activity which is permissible where either the sender or receiver (or both) of the communications are located outside the British Islands.

Two of the more controversial aspects of the Bill are the oversight provisions and the introduction of a new form of retained data, so called “internet connection records.”

Proportionality

The retention of internet connection records are an entirely new power found in the Bill. It is an extension to the extant, but currently legally uncertain data retention powers found in the Data Retention and Investigatory Powers Act 2014 (DRIPA). This new power is thus controversial on two bases: (1) it fails to meet the proportionality principle on the basis it fails to comply with the EU Charter on Fundamental Rights; (2) even if the current law is proportionate an extension of powers is almost certainly disproportionate. With regard to the first of these the current law, as contained in DRIPA, is subject to an ongoing legal challenge brought by MPs David Davis and Tom Watson supported by Liberty. The case, Secretary of State for the Home Department v David Davis MP and others [2015] EWCA Civ 1185, has recently been referred by the Court of Appeal to the Court of Justice of the European Union where the court asks the CJEU to rule on whether the ground-breaking case of Digital Rights Ireland Ltd v Minister for Communications, Marine and Natural Resources & Others, the case which ruled that European data retention laws were incompatible with Articles 7 & 8 of the EU Charter, also binds national legislators in the making of domestic data retention laws. Thus the current status of domestic data retention laws is unclear, yet at the time that this case remains under review the Bill seeks to extend the powers of the state to order the retention of data from simple, yet still very invasive power to retain all traffic data on our communications to also cover internet connections records, described in the guide to the Bill as “a record of the internet services a specific device has connected to, such as a website or instant messaging application.” This would be data such as which banking services we use, which rail company or airline we tend to favour and which may reveal much about us including gender, ethnicity, religious beliefs, medical conditions and much more. University of East Anglia law lecturer Paul Bernal has written upon this issue very eloquently in his blog. As he notes despite the Home Office’s best attempts to paint these as akin to itemised phone records, they are much more invasive of personal privacy and they are also clearly likely to be more invasive than the mere retention of communications records, a practice ruled illegal under EU Law in Digital Rights Ireland, and which at domestic law is currently under review. It is difficult to see how this new provision could be seen to be proportionate.

The second key battleground over the Bill is likely to be the oversight procedure for the issuance of warrants. The three reports were split as to whether Ministers or judges should issue warrants. The Intelligence and Security Committee felt the power should remain with Ministers, as “Ministers are able to take into account the wider context of each warrant application and the risks involved, whereas judges can only decide whether a warrant application is legally compliant”. The Independent Reviewer of Terrorism Legislation recommended that “Specific interception warrants, combined warrants, bulk interception warrants and bulk communications data warrants should be issued and renewed only on the authority of a Judicial Commissioner”, however he recommended that the Secretary of State should be allowed to issue a national security certificate where the application related to “the interests of the defence and/or foreign policy of the UK” and in such cases the “Judicial Commissioner in determining whether to issue the warrant should be able to depart from that certificate only on the basis of the principles applicable in judicial review”, this is sometimes called a “double lock” provision. Finally the RUSI report recommended something very similar to the Independent Reviewer with warrants for a purpose relating to the detection or prevention of serious and organised crime “always being authorised by a judicial commissioner” while warrants for purposes relating to national security (including counter-terrorism, support to military operations, diplomacy and foreign policy) and economic well-being, the warrant should be authorised by the secretary of state subject to judicial review by a judicial commissioner. The provisions of the Bill though are quite different. Despite the recommendations of both the Independent Reviewer of Terrorism Legislation and RUSI that warrants in relation to serious crime be issued by a Judicial Commissioner they will continue to be issued by the Secretary of State or by Scottish Ministers. All forms of warrant, including national security warrants, will however be subject to review by Judicial Commissioners under cl.19 of the Bill. There remains however a further complication. While the RUSI and Independent Reviewer of Terrorism Legislation reports suggested that only in relation to national security warrants the Judicial Commissioner should apply “principles applicable in judicial review”, by cl.19 all warrants will be restricted to this narrow set of principles, essentially illegality, fairness, and irrationality and proportionality.

There have been a number of critiques of the way the double lock system has been set up with among others David Davis MP (one of the DRIPA challengers) and the Shadow Home Secretary being highly critical. Again the question of proportionality of the legislation is questionable. In terms of domestic intercept warrants, which Davis in his comment notes “should not be a political decision”, it is questionable whether the role of the Secretary of State is complaint with the spirit, if not the law of Article 8 ECHR, as well as Article 6’s “independent and impartial” requirement. One must ask is it proportionate, or even relevant, to involve a minster of cabinet rank, a political decision-maker, in a decision as to whether a warrant should be issued to intercept communications in an organised crime case. One of the many benefits of our legal systems in the United Kingdom is that judges are appointed and not elected, allowing them to remain apart from the political process. To retain a role for a political office holder in warrants such as these, and against the recommendations of the RUSI and Independent Reviewer of Terrorism Legislation reports appears disproportionate.

 

Andrew Murray is Professor of Law at London School of Economics. He is the author of Information Technology Law: The Law and Society. He is a leading expert in Information Technology Law and Regulation and has written many articles on aspects of the interface between information technology and the legal framework including surveillance and data protection laws.

Notes from the IP Bill Committee session

I was one of the panel of academic witnesses before the specially convened Draft Investigatory Powers Bill Select Committee on Monday 7th December. It was my first time before a Parliamentary Committee and I have to admit I was a little intimidated: from queueing up beneath the statue of Oliver Cromwell to walking through what CP Snow referred to as the ‘corridors of power’. It’s a cliché, but there really is a corridor off from which the Committee Rooms are reached – it has a little of the Alice in Wonderland about it, but the thing that I noticed the most whilst waiting to be called was that almost everyone seemed to be a bit lost. In relation to the Investigatory Powers Bill that might be more than a little appropriate.

The panel I was on was pretty intimidating too, from Professor Ross Anderson, one of the best computer science brains on the planet, Professor Sir David Omand, former head of GCHQ, Permanent Secretary at the Home Office and then Permanent Secretary and Security and Intelligence Co-ordinator in the Cabinet Office under Blair, and Professor Mark Ryan of Birmingham University, another highly distinguished computer scientist. It really was intimidating at first – feeling the weight of the place, the seriousness of the subject and the crucial part that a Parliamentary Committee is supposed to play in the process of scrutinising and passing laws. And as the chair of the Committee, Lord Murphy of Torfaen said in his opening remarks, this bill was crucial – perhaps the most important bill in this parliamentary session.

Screen Shot 2015-12-09 at 10.02.12

Once the session started, though, I found the level of intimidation diminished rapidly – because, in part at least, it was impossible for me not to become immersed in the discussion. It is easy (and often appropriate) to be cynical about our parliamentary process, but seeing it first hand, in this committee at least, it was clear that enough of the members of the committee really wanted to learn, and really wanted to understand the issues, that there was at least a chance that their scrutiny would have some kind of effect. The initial questions, which had been set out before the session, were reasonably good, but the follow ups and the discussions that arose were much better.

The choice of witnesses was interesting: having Ross Anderson at one end of the panel and Sir David Omand at the other end created an interesting dynamic from the start. Sir David seemed to have a particular role in mind from the start – a ‘reasonable’ voice, confirming that everything was OK, that the Bill, as it was written, was clear, balanced, fair and ‘world-leading’. As a number of people pointed out to me after the event, you could tell whether you’d made a good point by the speed and vehemence with which Sir David responded. There were a few key moments on that score, and I hope there is proper follow up on them.

The first is the Danish ‘session-logging’ experience – the nearest equivalent to the proposed ‘Internet Connection Record’ idea in the new Bill – which resulted in around 7 years of wasted money, time and effort, providing almost no help to the police at all, before it was abandoned. When I mentioned it, Sir David interjected immediately that the Home Office was planning to do it very differently. It would be interesting to know how they are doing it differently. I suspect that further investigation could convince the Committee that the problem wasn’t (and isn’t) the technical implementation but the fundamental approach. Session logging didn’t work in Denmark not because the Danes don’t have our technological expertise, but because it’s a fundamentally flawed approach.

The second was the idea that communications data is less intrusive than content – as all the other three member of the panel know, that might have been true once, but it’s no longer true. The intrusion is different, but it isn’t less. Indeed, because of the possibilities for analysis, the greater difficulty in disguising and the increasing ability to use for profiling, it is likely that the balance will shift very much the other way, with communications data being much more important and more intrusive than content.

There were many other things covered – but we had far less time than we needed to explore them in as much depth as we needed. That’s why I shall also be taking up the invitation of the Committee to submit written evidence as well as oral – and why I would seriously advise others to do the same. I was lucky enough to be on a panel – but the written evidence will be even more critical. This Committee, it seemed to me, wanted to learn and should be given the opportunity. Do take it up! Written submissions will be accepted until 21st December. To submit, follow the link here:

http://www.parliament.uk/business/committees/committees-a-z/joint-select/draft-investigatory-powers-bill/publications/written-evidence-form/

The video of the session can be found here:

http://videoplayback.parliamentlive.tv/Player/Index/80ee52fd-8719-4a57-85a3-f64ad9567559?audioOnly=False&autoStart=False&statsEnabled=True