Click here to load reader
View
497
Download
0
Embed Size (px)
@PaulBradshaw, Online Journalism Blog Birmingham City University
(and journalism)The #IPBill
Mass collection Thematic warrants Data sharing Hacking powers Poor oversight
How many problems?
**
This application produced five telephone numbers, all of which were researched for connections with the MPS [Metropolitan Police Service]. One number was identified as the switchboard number for Hinchingbrooke Hospital in Cambridgeshire. It was established that Officer 15 DPGs wife Member of Public 3, was employed at that hospital
Enquiries were made with Siemens in order to identify from the data on the exhibit, which extension within the hospital the call to The Sun was made from.
Operation Alice Report, Metropolitan Police
http://www.iocco-uk.info/docs/Met%20Operation%20Alice%20Closing%20Report.pdf
https://www.bigbrotherwatch.org.uk/wp-content/uploads/2016/03/Data-Retention.pdf
https://www.bigbrotherwatch.org.uk/wp-content/uploads/2016/03/Data-Retention.pdf
The person calling the crisis line is not ordering pizza. The profilers assumption that the device is equal to, or identical with, or identifiable with its user is an obvious pragmatic reduction
Oliver Leistert: Data doubles
Leistert, Oliver. Data Retention in the European Union: When a Call Returns, International Journal of Communication 2 (2008)
*
http://www.telegraph.co.uk/technology/news/9182991/Digital-surveillance-what-my-phone-records-say-about-me.html
http://bigstory.ap.org/article/govt-obtains-wide-ap-phone-records-probe
**
Your devices may betray you.
*http://webkay.robinlinus.com/
*https://www.eff.org/pages/tor-and-https
https://www.eff.org/pages/tor-and-https
We kill people based on metadata
General Michael Hayden, former director of CIA and NSA
https://www.theguardian.com/commentisfree/2016/feb/21/death-from-above-nia-csa-skynet-algorithm-drones-pakistan
https://www.theguardian.com/commentisfree/2016/feb/21/death-from-above-nia-csa-skynet-algorithm-drones-pakistan
**
Why might you be targeted? Because you used the wrong words
*
https://www.theguardian.com/politics/2016/apr/28/police-anti-extremism-unit-monitoring-green-party-caroline-lucas-sian-berry
http://www.iocco-uk.info/docs/2015%20Half-yearly%20report%20(web%20version).pdf
It is inevitable that an investigator will be tempted to use every means at his disposal and to keep his options open when planning covert surveillance; to be, as often quoted in my presence at ACPO conferences, lawfully audacious
Sam Lincoln, Office of Surveillance Commissioners
http://ukhumanrightsblog.com/2015/10/13/surveillance-under-ripa-neither-a-strict-legal-framework-nor-rigorously-overseen-sam-lincoln/
*
http://bigstory.ap.org/article/govt-obtains-wide-ap-phone-records-probe
What might be used against you?
http://bigstory.ap.org/article/govt-obtains-wide-ap-phone-records-probe
*
https://onlinejournalismblog.com/2016/03/18/investigatory-powers-bill-hacking-publishers/
*
http://arstechnica.co.uk/tech-policy/2015/08/associated-press-sues-fbi-over-fake-news-story/
Data sharing
*
*
*
https://haveibeenpwned.com/
http://www.telegraph.co.uk/technology/news/9182991/Digital-surveillance-what-my-phone-records-say-about-me.html http://www.iocco-uk.info/docs/IOCCO%20Report%20March%202015%20(Web).pdf
517,236 searches 795 public bodies 1 year
http://bigstory.ap.org/article/govt-obtains-wide-ap-phone-records-probehttp://www.iocco-uk.info/docs/IOCCO%20Report%20March%202015%20(Web).pdf
When it comes to contracts, suppliers that have routinely messed up are handed more deals. When it comes to policy, approaches that have proved unsuccessful get dusted off and pushed with renewed vigour.
Kat Hall, The Register
http://www.theregister.co.uk/2016/09/19/ukgov_digital_economy_shambles/
The health sector has the most data breaches, followed by local government. Furthermore, not all threats to cyber security or data protection are from external actors: over 40% are caused by employees, contractors and third party suppliers, and half of these are accidental.
Information Commissioners Office
http://www.parliament.uk/business/committees/committees-a-z/commons-select/culture-media-and-sport-committee/news-parliament-2015/cyber-security-report-published-16-17/
https://haveibeenpwned.com/
*http://www.telegraph.co.uk/news/uknews/law-and-order/9372965/Foreign-powers-will-be-allowed-to-access-email-and-phone-records.html http://www.bbc.co.uk/news/uk-politics-18434112
http://bigstory.ap.org/article/govt-obtains-wide-ap-phone-records-probe
*http://www.independent.co.uk/news/uk/home-news/gchq-spying-programme-spy-watchdog-is-understaffed-and-totally-ineffective-8708231.html hhttp://www.markpack.org.uk/31123/six-reasons-the-interception-of-communications-commissioner-has-failed/ hthttp://www.telegraph.co.uk/news/uknews/law-and-order/9621493/Use-stronger-snooping-powers-against-fly-tipping-watchdog-urges.html
http://www.bbc.co.uk/news/uk-politics-18434112http://www.bbc.co.uk/news/uk-politics-18434112http://www.bbc.co.uk/news/uk-politics-18434112http://www.bbc.co.uk/news/uk-politics-18434112
*