SlideShare una empresa de Scribd logo
1 de 19
David Anderson Q.C.
@bricksilk
QMUL Lincoln’s Inn Fields
25 October 2018
 Powers enabling the collection and retention
of data (by government or by others)
 Much of which is not associated with current
targets
 Accessible by public authorities for specified
purposes
 CSPs required to retain their subscribers’
traffic and location data for up to 2 years
 Police obtain 300,000+ such data items p.a.
 c. 15% of requests are for data more than 6
months old (but 37% in sexual offence cases,
27% in terrorism cases)
“Historic communications data is frequently
useful, and sometimes of crucial importance, in
any case when a suspect is identified only after
the event; in tracing the previous communications
or travel patterns of a suspect, for example to
piece together a conspiracy; to identify a device
from its IP address; and in relation to cyber-
enabled and cyber-dependent crime. Data
relating to a victim’s communications history may
also be useful in solving a crime.”
D. Anderson, 2018
 Strong selector process
 Copy of all comms on chosen bearers held briefly
 Strong selectors relating to individual targets
applied to those comms in near real-time
 Complex query process
 Fewer bearers, but comms retained longer
 Sequence of searches, variety of criteria
 Bulk powers used by SIAs for:
 counter-terrorism
 counter-proliferation
 organised crime
 child sexual exploitation
 support of military operations
 cyber-defence
 Target discovery, target development, triaging of leads,
basis for disruptive action
 Almost always, bulk powers are used not alone but in
conjunction with other powers
“While the principal value of the power lies in the
collection of secondary data, the collection and
analysis of content have also been of very great
utility, particularly in assessing the intentions and
plans of targets, sometimes in crucial situations.
The various suggested alternatives, alone or in
combination, may be useful in individual cases but
fall short of matching the results of bulk
interception. They may also be slower, more
expensive, more intrusive or riskier to life.”
 Application personally by SIA Chief
 Signed and issued personally by SoS
 Approved by Judicial Commissioner
 Necessary in interests of national security
 Nec/prop for specified operational purposes
 Must consider less intrusive measures,
integrity/security of systems, privacy protection
 Rules on retention, disclosure, destruction
 Audited by technically skilled IPCO inspectors
 Full individual warrant required before the
content of comms of a person known to be in
the UK may be selected for examination
 No such requirement for content of comms
of a person outside UK, or metadata
(cp AQOT Rec 80: “appropriately rigorous and
rights-compliant procedures” should apply)
ECtHR - STRASBOURG CJEU - LUXEMBOURG
SCHREMS 1 (2014)
EU law prohibits legislation
permitting the public
authorities to have access on
a generalised basis to the
content of electronic
communications
TELE2/WATSON (2016)
EU law prohibits legislation
which provides for the
general and indiscriminate
retention of traffic and
location data
…except in areas where there
is a high crime risk: and
restrict to serious crime, prior
independent authorisn, store
data in EU, notify targets
 “In view of the scourge of global terrorism
and other serious crime, such as drug
trafficking, human trafficking, the sexual
exploitation of children and cybercrime … the
decision to operate a bulk interception
regime in order to identify hitherto unknown
threats to national security is one which
continues to fall within States’ margin of
appreciation.”
 – Judgment, para 314
“In view of the independent oversight … and
extensive independent investigations which
followed the Edward Snowden revelations, [the
Court] is satisfied that the intelligence services
of the UK take their Convention obligations
seriously and are not abusing their powers.”
- Judgment, para 387
“Nevertheless, examination of those powers has
identified two principal areas of concern:
First, the lack of oversight of the entire selection
process, including selection of bearers, selectors
and search criteria for filtering intercepted
communications, selection of material for
examination
Secondly, the absence of any real safeguards
applicable to the selection of related
communications data for examination.”
 “Given its history in the protection of civil
liberties and the significant recent improvement
to privacy laws and mechanisms, the UK can
now justifiably reclaim its leadership role in
Europe as well as globally.
 The UK is now co-leading with that tiny minority
of EU states which have made a successful effort
to update their legislative and oversight
framework dealing with surveillance.”
Prof Joseph Cannataci, June 2018
“Thanks largely to pressure from civil society
and many concerned officials and members of
the UK Parliament, the UK’s oversight regime
has been significantly improved.”
David Anderson Q.C.
@bricksilk
QMUL Lincoln’s Inn Fields
25 October 2018

Más contenido relacionado

La actualidad más candente

33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
 
I4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge ChungI4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge ChungPaul van Heel
 
Chinese taipei 1366688667
Chinese taipei  1366688667Chinese taipei  1366688667
Chinese taipei 1366688667Nurul Yakin
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese InternetAnders Pedersen
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 
International principles on the application of human rights to communications...
International principles on the application of human rights to communications...International principles on the application of human rights to communications...
International principles on the application of human rights to communications...Rupinder K Gill
 
IAOS 2018 - New era for NSOs - Leader in data governance, M. Mägi
IAOS 2018 - New era for NSOs - Leader in data governance, M. MägiIAOS 2018 - New era for NSOs - Leader in data governance, M. Mägi
IAOS 2018 - New era for NSOs - Leader in data governance, M. MägiStatsCommunications
 
Digital Public Records
Digital Public RecordsDigital Public Records
Digital Public RecordsRyan Thornburg
 
0309JUSTICEITSTANEK
0309JUSTICEITSTANEK0309JUSTICEITSTANEK
0309JUSTICEITSTANEKguest66dc5f
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraVictor van R
 
The Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News SagaThe Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News SagaSharala Axryd
 
The leveson inquiry
The leveson inquiryThe leveson inquiry
The leveson inquiryHamzaB94
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Privacy politics in the UK
Privacy politics in the UKPrivacy politics in the UK
Privacy politics in the UKblogzilla
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessmentblogzilla
 
Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailandgcanavati
 
Access to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaAccess to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaOECD Governance
 

La actualidad más candente (20)

33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
I4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge ChungI4ADA 2019 - Presentation Judge Chung
I4ADA 2019 - Presentation Judge Chung
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
Chinese taipei 1366688667
Chinese taipei  1366688667Chinese taipei  1366688667
Chinese taipei 1366688667
 
Censorship Regimes On The Chinese Internet
Censorship Regimes On The  Chinese InternetCensorship Regimes On The  Chinese Internet
Censorship Regimes On The Chinese Internet
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 
International principles on the application of human rights to communications...
International principles on the application of human rights to communications...International principles on the application of human rights to communications...
International principles on the application of human rights to communications...
 
IAOS 2018 - New era for NSOs - Leader in data governance, M. Mägi
IAOS 2018 - New era for NSOs - Leader in data governance, M. MägiIAOS 2018 - New era for NSOs - Leader in data governance, M. Mägi
IAOS 2018 - New era for NSOs - Leader in data governance, M. Mägi
 
Foi presentation
Foi presentationFoi presentation
Foi presentation
 
Digital Public Records
Digital Public RecordsDigital Public Records
Digital Public Records
 
0309JUSTICEITSTANEK
0309JUSTICEITSTANEK0309JUSTICEITSTANEK
0309JUSTICEITSTANEK
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
 
The Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News SagaThe Future Agenda: Digitising Democracy and the Fake News Saga
The Future Agenda: Digitising Democracy and the Fake News Saga
 
The leveson inquiry
The leveson inquiryThe leveson inquiry
The leveson inquiry
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Privacy politics in the UK
Privacy politics in the UKPrivacy politics in the UK
Privacy politics in the UK
 
Internet freedom: a comparative assessment
Internet freedom: a comparative assessmentInternet freedom: a comparative assessment
Internet freedom: a comparative assessment
 
Freedom of expression & censorship in thailand
Freedom of expression & censorship in thailandFreedom of expression & censorship in thailand
Freedom of expression & censorship in thailand
 
After 9 11
After 9 11After 9 11
After 9 11
 
Access to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela PianaAccess to justice through virtual doors - Daniela Piana
Access to justice through virtual doors - Daniela Piana
 

Similar a Human rights and the future of surveillance - Lord Anderson QC

The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the StateGraham Smith
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01lbadeniji
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nationsblogzilla
 
Trust, Privacy and Biometrics
Trust, Privacy and BiometricsTrust, Privacy and Biometrics
Trust, Privacy and Biometricsblogzilla
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issuesblogzilla
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxadnis1
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Cameron Brown
 
1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados PessoaisIBE_USP
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018Nilima Tariq
 

Similar a Human rights and the future of surveillance - Lord Anderson QC (20)

The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
4482LawEthics.ppt
4482LawEthics.ppt4482LawEthics.ppt
4482LawEthics.ppt
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the State
 
2627 8105-1-pb
2627 8105-1-pb2627 8105-1-pb
2627 8105-1-pb
 
Volonino ppt 01
Volonino ppt 01Volonino ppt 01
Volonino ppt 01
 
Investigating cybercrime at the United Nations
Investigating cybercrime at the United NationsInvestigating cybercrime at the United Nations
Investigating cybercrime at the United Nations
 
An Encyclopedia of Wiretaps
An Encyclopedia of WiretapsAn Encyclopedia of Wiretaps
An Encyclopedia of Wiretaps
 
Trust, Privacy and Biometrics
Trust, Privacy and BiometricsTrust, Privacy and Biometrics
Trust, Privacy and Biometrics
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptx
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
Investigating and Prosecuting Cyber Crime - Forensic Dependencies and Barrier...
 
1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais1º Palestra sobre Proteção de Dados Pessoais
1º Palestra sobre Proteção de Dados Pessoais
 
Research on Digital Security Act 2018
Research on Digital Security Act 2018Research on Digital Security Act 2018
Research on Digital Security Act 2018
 

Más de blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloudblogzilla
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?blogzilla
 
Regulating code
Regulating codeRegulating code
Regulating codeblogzilla
 
Data protection redress in the UK
Data protection redress in the UKData protection redress in the UK
Data protection redress in the UKblogzilla
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international lawblogzilla
 
Exceptions & Limitations in Copyright or Systemic Overhaul?
Exceptions & Limitations in Copyright or Systemic Overhaul?Exceptions & Limitations in Copyright or Systemic Overhaul?
Exceptions & Limitations in Copyright or Systemic Overhaul?blogzilla
 

Más de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 
Can the law control Digital Leviathan?
Can the law control Digital Leviathan?Can the law control Digital Leviathan?
Can the law control Digital Leviathan?
 
Regulating code
Regulating codeRegulating code
Regulating code
 
Data protection redress in the UK
Data protection redress in the UKData protection redress in the UK
Data protection redress in the UK
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international law
 
Exceptions & Limitations in Copyright or Systemic Overhaul?
Exceptions & Limitations in Copyright or Systemic Overhaul?Exceptions & Limitations in Copyright or Systemic Overhaul?
Exceptions & Limitations in Copyright or Systemic Overhaul?
 

Último

Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
 
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hourCall Girls in Nagpur High Profile
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCNAP Global Network
 
Call Girls in Sarita Vihar Delhi Just Call 👉👉9873777170 Independent Female ...
Call Girls in  Sarita Vihar Delhi Just Call 👉👉9873777170  Independent Female ...Call Girls in  Sarita Vihar Delhi Just Call 👉👉9873777170  Independent Female ...
Call Girls in Sarita Vihar Delhi Just Call 👉👉9873777170 Independent Female ...adilkhan87451
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'NAP Global Network
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31JSchaus & Associates
 
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...Call Girls in Nagpur High Profile
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCNAP Global Network
 
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakurbest call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha ThakurSUHANI PANDEY
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...SUHANI PANDEY
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...tanu pandey
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Dipal Arora
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisChristina Parmionova
 

Último (20)

Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
Call Girls in Chandni Chowk (delhi) call me [9953056974] escort service 24X7
 
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
 
Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Call Girls in Sarita Vihar Delhi Just Call 👉👉9873777170 Independent Female ...
Call Girls in  Sarita Vihar Delhi Just Call 👉👉9873777170  Independent Female ...Call Girls in  Sarita Vihar Delhi Just Call 👉👉9873777170  Independent Female ...
Call Girls in Sarita Vihar Delhi Just Call 👉👉9873777170 Independent Female ...
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
(NEHA) Call Girls Nagpur Call Now 8250077686 Nagpur Escorts 24x7
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
 
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
 
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Bhavnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Sangamwadi Call Me 7737669865 Budget Friendly No Advance Booking
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakurbest call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
best call girls in Pune - 450+ Call Girl Cash Payment 8005736733 Neha Thakur
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
 
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...Call On 6297143586  Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
Call On 6297143586 Viman Nagar Call Girls In All Pune 24/7 Provide Call With...
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
 

Human rights and the future of surveillance - Lord Anderson QC

  • 1. David Anderson Q.C. @bricksilk QMUL Lincoln’s Inn Fields 25 October 2018
  • 2.  Powers enabling the collection and retention of data (by government or by others)  Much of which is not associated with current targets  Accessible by public authorities for specified purposes
  • 3.  CSPs required to retain their subscribers’ traffic and location data for up to 2 years  Police obtain 300,000+ such data items p.a.  c. 15% of requests are for data more than 6 months old (but 37% in sexual offence cases, 27% in terrorism cases)
  • 4. “Historic communications data is frequently useful, and sometimes of crucial importance, in any case when a suspect is identified only after the event; in tracing the previous communications or travel patterns of a suspect, for example to piece together a conspiracy; to identify a device from its IP address; and in relation to cyber- enabled and cyber-dependent crime. Data relating to a victim’s communications history may also be useful in solving a crime.” D. Anderson, 2018
  • 5.
  • 6.  Strong selector process  Copy of all comms on chosen bearers held briefly  Strong selectors relating to individual targets applied to those comms in near real-time  Complex query process  Fewer bearers, but comms retained longer  Sequence of searches, variety of criteria
  • 7.  Bulk powers used by SIAs for:  counter-terrorism  counter-proliferation  organised crime  child sexual exploitation  support of military operations  cyber-defence  Target discovery, target development, triaging of leads, basis for disruptive action  Almost always, bulk powers are used not alone but in conjunction with other powers
  • 8. “While the principal value of the power lies in the collection of secondary data, the collection and analysis of content have also been of very great utility, particularly in assessing the intentions and plans of targets, sometimes in crucial situations. The various suggested alternatives, alone or in combination, may be useful in individual cases but fall short of matching the results of bulk interception. They may also be slower, more expensive, more intrusive or riskier to life.”
  • 9.  Application personally by SIA Chief  Signed and issued personally by SoS  Approved by Judicial Commissioner  Necessary in interests of national security  Nec/prop for specified operational purposes  Must consider less intrusive measures, integrity/security of systems, privacy protection  Rules on retention, disclosure, destruction  Audited by technically skilled IPCO inspectors
  • 10.  Full individual warrant required before the content of comms of a person known to be in the UK may be selected for examination  No such requirement for content of comms of a person outside UK, or metadata (cp AQOT Rec 80: “appropriately rigorous and rights-compliant procedures” should apply)
  • 11. ECtHR - STRASBOURG CJEU - LUXEMBOURG
  • 12. SCHREMS 1 (2014) EU law prohibits legislation permitting the public authorities to have access on a generalised basis to the content of electronic communications TELE2/WATSON (2016) EU law prohibits legislation which provides for the general and indiscriminate retention of traffic and location data …except in areas where there is a high crime risk: and restrict to serious crime, prior independent authorisn, store data in EU, notify targets
  • 13.  “In view of the scourge of global terrorism and other serious crime, such as drug trafficking, human trafficking, the sexual exploitation of children and cybercrime … the decision to operate a bulk interception regime in order to identify hitherto unknown threats to national security is one which continues to fall within States’ margin of appreciation.”  – Judgment, para 314
  • 14. “In view of the independent oversight … and extensive independent investigations which followed the Edward Snowden revelations, [the Court] is satisfied that the intelligence services of the UK take their Convention obligations seriously and are not abusing their powers.” - Judgment, para 387
  • 15. “Nevertheless, examination of those powers has identified two principal areas of concern: First, the lack of oversight of the entire selection process, including selection of bearers, selectors and search criteria for filtering intercepted communications, selection of material for examination Secondly, the absence of any real safeguards applicable to the selection of related communications data for examination.”
  • 16.
  • 17.  “Given its history in the protection of civil liberties and the significant recent improvement to privacy laws and mechanisms, the UK can now justifiably reclaim its leadership role in Europe as well as globally.  The UK is now co-leading with that tiny minority of EU states which have made a successful effort to update their legislative and oversight framework dealing with surveillance.” Prof Joseph Cannataci, June 2018
  • 18. “Thanks largely to pressure from civil society and many concerned officials and members of the UK Parliament, the UK’s oversight regime has been significantly improved.”
  • 19. David Anderson Q.C. @bricksilk QMUL Lincoln’s Inn Fields 25 October 2018