Text of The Investigatory Powers Bill and journalism
@PaulBradshaw, Online Journalism Blog Birmingham City University
(and journalism)The #IPBill
Mass collection Thematic warrants Data sharing Hacking powers Poor oversight
How many problems?
“This application produced five telephone numbers, all of which were researched for connections with the MPS [Metropolitan Police Service]. One number was identified as the switchboard number for Hinchingbrooke Hospital in Cambridgeshire. It was established that Officer 15 DPG’s wife Member of Public 3, was employed at that hospital
”Enquiries were made with Siemens in order to identify from the data on the exhibit, which extension within the hospital the call to The Sun was made from.”
“It is inevitable that an investigator will be tempted to use every means at his disposal and to keep his options open when planning covert surveillance; to be, as often quoted in my presence at ACPO conferences, “lawfully audacious”
“When it comes to contracts, suppliers that have routinely messed up are handed more deals. When it comes to policy, approaches that have proved unsuccessful get dusted off and pushed with renewed vigour.”
The health sector has the most data breaches, followed by local government. Furthermore, not all threats to cyber security or data protection are from external actors: over 40% are caused by employees, contractors and third party suppliers, and half of these are accidental.