SlideShare uma empresa Scribd logo
1 de 15
Can the law control Digital
Leviathan?
Ian Brown (Oxford University)
@IanBrownOII
―Since you can’t connect dots you don’t have…we fundamentally try
to collect everything and hang on to it forever‖ – Greg Hunt, CIA
CTO
TEMPORA
NSA/CIA/FBI/DoD Trusted
Partners
 Bloomberg 14/6/13: ―Thousands of
technology, finance and manufacturing
companies are working closely with U.S.
national security agencies, providing
sensitive information and in return
receiving benefits that include access to
classified intelligence‖
 ―Some U.S. telecommunications
companies willingly provide intelligence
agencies with access to facilities and
data offshore that would require a
judge’s order if it were done in the U.S.‖
The domestic rule of law?
UK has ―one of the strongest
systems of checks and balances
and democratic accountability
for secret intelligence anywhere
in the world‖
―Although we have concluded that
GCHQ has not circumvented or
attempted to circumvent UK law, it is
proper to consider further whether the
current statutory framework governing
access to private communications
Regulation of Investigatory
Powers Act 2000
8 Contents of warrants.
(4) Subsections (1) and (2) shall not apply to an interception warrant if—
(a) the description of communications to which the warrant relates confines the
conduct authorised or required by the warrant to conduct falling within subsection (5);
and
(b) at the time of the issue of the warrant, a certificate applicable to the warrant has
been issued by the Secretary of State certifying—
(i) the descriptions of intercepted material the examination of which he considers necessary;
and
(ii) that he considers the examination of material of those descriptions necessary as mentioned
in section 5(3)(a), (b) or (c).…
12 Maintenance of interception capability.
(1) The Secretary of State may by order provide for the imposition by him on persons
who—
(a) are providing public postal services or public telecommunications services, or
(b) are proposing to do so,
of such obligations as it appears to him reasonable to impose for the purpose of
securing that it is and remains practicable for requirements to provide assistance in
relation to interception warrants to be imposed and complied with.
(2) The Secretary of State’s power to impose the obligations provided for by an order
under this section shall be exercisable by the giving, in accordance with the order, of
a notice requiring the person who is to be subject to the obligations to take all such
steps as may be specified or described in the notice…
Telecommunications Act 1984
94 Directions in the interests of national security etc.
(1) The Secretary of State may, after consultation with a
person to whom this section applies, give to that person
such directions of a general character as appear to the
Secretary of State to be necessary in the interests of
national security or relations with the government of a
country or territory outside the United Kingdom…
(5) A person shall not disclose, or be required by virtue of
any enactment or otherwise to disclose, anything done by
virtue of this section if the Secretary of State has notified
him that the Secretary of State is of the opinion that
disclosure of that thing is against the interests of national
security or relations with the government of a country or
territory outside the United Kingdom, or the commercial
interests of some other person…
(8) This section applies to OFCOM and to providers of
public electronic communications networks.
Intelligence Services Act 1994
7 Authorisation of acts outside the British Islands.
(1) If, apart from this section, a person would be liable in
the United Kingdom for any act done outside the British
Islands, he shall not be so liable if the act is one which is
authorised to be done by virtue of an authorisation given
by the Secretary of State…
(9) For the purposes of this section the reference in
subsection (1) to an act done outside the British Islands
includes a reference to any act which—
(a) is done in the British Islands; but
(b) is or is intended to be done in relation to apparatus that is
believed to be outside the British Islands, or in relation to
anything appearing to originate from such apparatus…
• “As a former Article III judge, I
can tell you that your faith in the
FISA Court is dramatically
misplaced...
• The Fourth Amendment frameworks
have been substantially diluted in
the ordinary police case. One can
only imagine what the dilution is in a
national security setting…
• It’s an anointment process. It’s
not a selection process. But you
know, it’s not boat rockers. So you
have a [federal] bench which is way
more conservative than before. This
is a subset of that. And it’s a subset
of that who are operating under
privacy, confidentiality, and national
U.S. District Judge
Nancy Gertner (Ret.)
Judicial review?
Congressional oversight?
 ―When the American people find out how their
government has secretly interpreted the Patriot
Act, they will be stunned and they will be angry‖
–Senator Ron Wyden, 26/5/11
 ―the technology and technical policy is far
outpacing the background and expertise of most
elected members of Congress or their staffs‖ –
Jacob Olcott, former cybersecurity assistant to
Senator JD Rockefeller IV
 ―one thing that won't have changed in the 50-odd
years since I left the secret world, and never
will, is the gullibility of the uninitiated when faced
with real-life spies. In a flash, all rational
standards of human judgment fall away.‖ –John
Le Carré
―(They said) don’t worry, we’re not
spying on any Americans.
Wonderful, that’s really helpful for
companies trying to work with people
around the world.‖
Preserving the rule of law
 Hobbesian state of
intelligence international
law?
 How to implement
meaningful checks and
balances?
Minimisation, warrants, over
sight, transparency
 Technical options?
◦ German interior minister:
―whoever fears their
communication is being
intercepted in any way should
use services that don't go
through American servers.‖
◦ Snowden: ―you should never
CJEU on Data Retention Dir.
 ―Those data, taken as a whole, may allow very precise conclusions to be drawn
concerning the private lives of the persons whose data has been retained, such as
the habits of everyday life, permanent or temporary places of residence, daily or
other movements, the activities carried out, the social relationships of those
persons and the social environments frequented by them.‖
 Retention ―constitutes in itself an interference with the rights guaranteed by Article
7 of the Charter… the access of the competent national authorities to the data
constitutes a further interference with that fundamental right‖
 ―the fact that data are retained and subsequently used without the subscriber or
registered user being informed is likely to generate in the minds of the persons
concerned the feeling that their private lives are the subject of constant
surveillance.‖
 Directive does not ―adversely affect the essence of those rights‖, but ―the fight
against serious crime…does not, in itself, justify a retention measure‖
 Broad scope ―entails an interference with the fundamental rights of practically the
entire European population… it is not restricted to a retention in relation (i) to data
pertaining to a particular time period and/or a particular geographical zone and/or
to a circle of particular persons likely to be involved, in one way or another, in a
serious crime, or (ii) to persons who could, for other reasons, contribute, by the
retention of their data, to the prevention, detection or prosecution of serious
offences.‖
Joined cases: Digital Rights Ireland Ltd v Minister for
Communications, Marine and Natural Resources & Ors C-
293/12 and Kärntner Landesregierung, Michael
Seitlinger, Christof Tschohl and others, C 594/12
Data Retention judgment
 ―the access by the competent national authorities to
the data retained is not made dependent on a prior
review carried out by a court or by an independent
administrative body whose decision seeks to limit
access to the data‖
 ―does not require the data in question to be retained
within the European Union, with the result that it
cannot be held that the control, explicitly required by
Article 8(3) of the Charter, by
an independent authority of compliance with
the requirements of protection and security, as
referred to in the two previous paragraphs, is fully
ensured.‖
 ―Having regard to all the foregoing considerations, it
must be held that, by adopting Directive 2006/24, the
EU legislature has exceeded the limits imposed
by compliance with the principle of proportionality in
the light of Articles 7, 8 and 52(1) of the Charter.‖

Mais conteúdo relacionado

Mais procurados

The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsGabriella Razzano
 
Rti beginners 5 nov '12 by shailesh gandhi
Rti  beginners 5 nov '12 by shailesh gandhiRti  beginners 5 nov '12 by shailesh gandhi
Rti beginners 5 nov '12 by shailesh gandhiDr Rita
 
Bmc pio by shailesh gandhi
Bmc pio by shailesh gandhiBmc pio by shailesh gandhi
Bmc pio by shailesh gandhiDr Rita
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summarysevans-idaho
 
The patriot act
The patriot actThe patriot act
The patriot actpalita Px
 
Comprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes OffComprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes OffPatton Boggs LLP
 
Acordo Comercial EUA e China
Acordo Comercial EUA e ChinaAcordo Comercial EUA e China
Acordo Comercial EUA e ChinaFábio Santos
 
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...Lorson Resources Limited
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectiveJason Nathu
 
Präsentation, M. Nowak - Serbia
Präsentation, M. Nowak - SerbiaPräsentation, M. Nowak - Serbia
Präsentation, M. Nowak - SerbiaBranimir Mitrovic
 
2019 02-12 overarching-fact_sheet_ra
2019 02-12 overarching-fact_sheet_ra2019 02-12 overarching-fact_sheet_ra
2019 02-12 overarching-fact_sheet_raJohan Westerholm
 
The Philippine Bill of Rights: Civil Rights
The Philippine Bill of Rights: Civil RightsThe Philippine Bill of Rights: Civil Rights
The Philippine Bill of Rights: Civil Rightsbrianbelen
 
Child Online Protection
Child Online ProtectionChild Online Protection
Child Online ProtectionSalieCatungal
 
Bill of rights (lecture)
Bill of rights (lecture)Bill of rights (lecture)
Bill of rights (lecture)John Torres
 

Mais procurados (19)

The Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African JournalistsThe Promotion of Access to Information Act for South African Journalists
The Promotion of Access to Information Act for South African Journalists
 
Usa Patriot Act
Usa Patriot ActUsa Patriot Act
Usa Patriot Act
 
Rti beginners 5 nov '12 by shailesh gandhi
Rti  beginners 5 nov '12 by shailesh gandhiRti  beginners 5 nov '12 by shailesh gandhi
Rti beginners 5 nov '12 by shailesh gandhi
 
Bmc pio by shailesh gandhi
Bmc pio by shailesh gandhiBmc pio by shailesh gandhi
Bmc pio by shailesh gandhi
 
Official secrets act
Official secrets actOfficial secrets act
Official secrets act
 
Patriot act summary
Patriot act summaryPatriot act summary
Patriot act summary
 
The patriot act
The patriot actThe patriot act
The patriot act
 
Comprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes OffComprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes Off
 
Acordo Comercial EUA e China
Acordo Comercial EUA e ChinaAcordo Comercial EUA e China
Acordo Comercial EUA e China
 
The patriot act
The patriot act The patriot act
The patriot act
 
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...Lorson Resources Limited - Records & Information Presentation: Data Protectio...
Lorson Resources Limited - Records & Information Presentation: Data Protectio...
 
Privacy versus Security: A Legal Perspective
Privacy versus Security: A Legal PerspectivePrivacy versus Security: A Legal Perspective
Privacy versus Security: A Legal Perspective
 
Article iii mfa
Article iii mfaArticle iii mfa
Article iii mfa
 
Präsentation, M. Nowak - Serbia
Präsentation, M. Nowak - SerbiaPräsentation, M. Nowak - Serbia
Präsentation, M. Nowak - Serbia
 
Bill of rights. MIDTERM
Bill of rights. MIDTERMBill of rights. MIDTERM
Bill of rights. MIDTERM
 
2019 02-12 overarching-fact_sheet_ra
2019 02-12 overarching-fact_sheet_ra2019 02-12 overarching-fact_sheet_ra
2019 02-12 overarching-fact_sheet_ra
 
The Philippine Bill of Rights: Civil Rights
The Philippine Bill of Rights: Civil RightsThe Philippine Bill of Rights: Civil Rights
The Philippine Bill of Rights: Civil Rights
 
Child Online Protection
Child Online ProtectionChild Online Protection
Child Online Protection
 
Bill of rights (lecture)
Bill of rights (lecture)Bill of rights (lecture)
Bill of rights (lecture)
 

Semelhante a Can the law control Digital Leviathan?

Lindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_ArticleLindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_ArticleLindsay Boyd
 
Ethics in public governance and public administration
Ethics in public governance and public administrationEthics in public governance and public administration
Ethics in public governance and public administrationrandomhuman089
 
India right to information act
India right to information actIndia right to information act
India right to information acticgfmconference
 
Polsc2 13 bill of rights (sec2-7)
Polsc2   13 bill of rights (sec2-7)Polsc2   13 bill of rights (sec2-7)
Polsc2 13 bill of rights (sec2-7)Yvan Gumbao
 
Mandatory Key Disclosure and Self Incrimination in Canada
Mandatory Key Disclosure and Self Incrimination in CanadaMandatory Key Disclosure and Self Incrimination in Canada
Mandatory Key Disclosure and Self Incrimination in CanadaAnna Manley
 
Right to Information Act - Features
Right to Information Act - FeaturesRight to Information Act - Features
Right to Information Act - Featuresramrag2001
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodblogzilla
 
Right to Information (RTI) Act (2005)
Right to Information (RTI) Act (2005)Right to Information (RTI) Act (2005)
Right to Information (RTI) Act (2005)Pawan Kumar Sahu
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the StateGraham Smith
 
Right to Information Legislation in India
Right to Information Legislation in IndiaRight to Information Legislation in India
Right to Information Legislation in Indiaicgfmconference
 
NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationAltheimPrivacy
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalGraham Smith
 
Privacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory PowersPrivacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory Powersrcorrigan
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastMichael Owen
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsblogzilla
 

Semelhante a Can the law control Digital Leviathan? (20)

Lindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_ArticleLindsay_Boyd_Journal_Article
Lindsay_Boyd_Journal_Article
 
Ethics in public governance and public administration
Ethics in public governance and public administrationEthics in public governance and public administration
Ethics in public governance and public administration
 
File000116
File000116File000116
File000116
 
India right to information act
India right to information actIndia right to information act
India right to information act
 
RTI Act, 2005.pptx
RTI Act, 2005.pptxRTI Act, 2005.pptx
RTI Act, 2005.pptx
 
Polsc2 13 bill of rights (sec2-7)
Polsc2   13 bill of rights (sec2-7)Polsc2   13 bill of rights (sec2-7)
Polsc2 13 bill of rights (sec2-7)
 
Mandatory Key Disclosure and Self Incrimination in Canada
Mandatory Key Disclosure and Self Incrimination in CanadaMandatory Key Disclosure and Self Incrimination in Canada
Mandatory Key Disclosure and Self Incrimination in Canada
 
Right to Information Act - Features
Right to Information Act - FeaturesRight to Information Act - Features
Right to Information Act - Features
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
Right to Information (RTI) Act (2005)
Right to Information (RTI) Act (2005)Right to Information (RTI) Act (2005)
Right to Information (RTI) Act (2005)
 
Communications Privacy and the State
Communications Privacy and the StateCommunications Privacy and the State
Communications Privacy and the State
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
Right to Information Legislation in India
Right to Information Legislation in IndiaRight to Information Legislation in India
Right to Information Legislation in India
 
NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentation
 
Right to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-finalRight to Privacy in the Digital Age-final
Right to Privacy in the Digital Age-final
 
Freedoms forsaken
Freedoms forsakenFreedoms forsaken
Freedoms forsaken
 
Privacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory PowersPrivacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory Powers
 
CIAR_8_1_3.pdf
CIAR_8_1_3.pdfCIAR_8_1_3.pdf
CIAR_8_1_3.pdf
 
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the pastDRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
DRAFT 2 - The Internet has effectively rendered privacy as a thing of the past
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Mais de blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competitionblogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentblogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Bankingblogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Walesblogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policyblogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector datablogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Actblogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertiseblogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Electionsblogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managersblogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africablogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCblogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Thingsblogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centreblogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowdenblogzilla
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloudblogzilla
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?blogzilla
 

Mais de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Trust in the Cloud
Trust in the CloudTrust in the Cloud
Trust in the Cloud
 
Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?Copyright and privacy by design - what lessons have we learned?
Copyright and privacy by design - what lessons have we learned?
 

Último

Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Developmentnarsireddynannuri1
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...AlexisTorres963861
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Delhi Call girls
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...Andy (Avraham) Blumenthal
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Group_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the tradeGroup_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the tradeRahatulAshafeen
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhbhavenpr
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Delhi Call girls
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)Delhi Call girls
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptxYasinAhmad20
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 

Último (20)

Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's DevelopmentNara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
 
Group_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the tradeGroup_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the trade
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 

Can the law control Digital Leviathan?

  • 1. Can the law control Digital Leviathan? Ian Brown (Oxford University) @IanBrownOII ―Since you can’t connect dots you don’t have…we fundamentally try to collect everything and hang on to it forever‖ – Greg Hunt, CIA CTO
  • 2.
  • 3.
  • 5. NSA/CIA/FBI/DoD Trusted Partners  Bloomberg 14/6/13: ―Thousands of technology, finance and manufacturing companies are working closely with U.S. national security agencies, providing sensitive information and in return receiving benefits that include access to classified intelligence‖  ―Some U.S. telecommunications companies willingly provide intelligence agencies with access to facilities and data offshore that would require a judge’s order if it were done in the U.S.‖
  • 6. The domestic rule of law? UK has ―one of the strongest systems of checks and balances and democratic accountability for secret intelligence anywhere in the world‖ ―Although we have concluded that GCHQ has not circumvented or attempted to circumvent UK law, it is proper to consider further whether the current statutory framework governing access to private communications
  • 7. Regulation of Investigatory Powers Act 2000 8 Contents of warrants. (4) Subsections (1) and (2) shall not apply to an interception warrant if— (a) the description of communications to which the warrant relates confines the conduct authorised or required by the warrant to conduct falling within subsection (5); and (b) at the time of the issue of the warrant, a certificate applicable to the warrant has been issued by the Secretary of State certifying— (i) the descriptions of intercepted material the examination of which he considers necessary; and (ii) that he considers the examination of material of those descriptions necessary as mentioned in section 5(3)(a), (b) or (c).… 12 Maintenance of interception capability. (1) The Secretary of State may by order provide for the imposition by him on persons who— (a) are providing public postal services or public telecommunications services, or (b) are proposing to do so, of such obligations as it appears to him reasonable to impose for the purpose of securing that it is and remains practicable for requirements to provide assistance in relation to interception warrants to be imposed and complied with. (2) The Secretary of State’s power to impose the obligations provided for by an order under this section shall be exercisable by the giving, in accordance with the order, of a notice requiring the person who is to be subject to the obligations to take all such steps as may be specified or described in the notice…
  • 8. Telecommunications Act 1984 94 Directions in the interests of national security etc. (1) The Secretary of State may, after consultation with a person to whom this section applies, give to that person such directions of a general character as appear to the Secretary of State to be necessary in the interests of national security or relations with the government of a country or territory outside the United Kingdom… (5) A person shall not disclose, or be required by virtue of any enactment or otherwise to disclose, anything done by virtue of this section if the Secretary of State has notified him that the Secretary of State is of the opinion that disclosure of that thing is against the interests of national security or relations with the government of a country or territory outside the United Kingdom, or the commercial interests of some other person… (8) This section applies to OFCOM and to providers of public electronic communications networks.
  • 9. Intelligence Services Act 1994 7 Authorisation of acts outside the British Islands. (1) If, apart from this section, a person would be liable in the United Kingdom for any act done outside the British Islands, he shall not be so liable if the act is one which is authorised to be done by virtue of an authorisation given by the Secretary of State… (9) For the purposes of this section the reference in subsection (1) to an act done outside the British Islands includes a reference to any act which— (a) is done in the British Islands; but (b) is or is intended to be done in relation to apparatus that is believed to be outside the British Islands, or in relation to anything appearing to originate from such apparatus…
  • 10. • “As a former Article III judge, I can tell you that your faith in the FISA Court is dramatically misplaced... • The Fourth Amendment frameworks have been substantially diluted in the ordinary police case. One can only imagine what the dilution is in a national security setting… • It’s an anointment process. It’s not a selection process. But you know, it’s not boat rockers. So you have a [federal] bench which is way more conservative than before. This is a subset of that. And it’s a subset of that who are operating under privacy, confidentiality, and national U.S. District Judge Nancy Gertner (Ret.) Judicial review?
  • 11. Congressional oversight?  ―When the American people find out how their government has secretly interpreted the Patriot Act, they will be stunned and they will be angry‖ –Senator Ron Wyden, 26/5/11  ―the technology and technical policy is far outpacing the background and expertise of most elected members of Congress or their staffs‖ – Jacob Olcott, former cybersecurity assistant to Senator JD Rockefeller IV  ―one thing that won't have changed in the 50-odd years since I left the secret world, and never will, is the gullibility of the uninitiated when faced with real-life spies. In a flash, all rational standards of human judgment fall away.‖ –John Le Carré
  • 12. ―(They said) don’t worry, we’re not spying on any Americans. Wonderful, that’s really helpful for companies trying to work with people around the world.‖
  • 13. Preserving the rule of law  Hobbesian state of intelligence international law?  How to implement meaningful checks and balances? Minimisation, warrants, over sight, transparency  Technical options? ◦ German interior minister: ―whoever fears their communication is being intercepted in any way should use services that don't go through American servers.‖ ◦ Snowden: ―you should never
  • 14. CJEU on Data Retention Dir.  ―Those data, taken as a whole, may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained, such as the habits of everyday life, permanent or temporary places of residence, daily or other movements, the activities carried out, the social relationships of those persons and the social environments frequented by them.‖  Retention ―constitutes in itself an interference with the rights guaranteed by Article 7 of the Charter… the access of the competent national authorities to the data constitutes a further interference with that fundamental right‖  ―the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the minds of the persons concerned the feeling that their private lives are the subject of constant surveillance.‖  Directive does not ―adversely affect the essence of those rights‖, but ―the fight against serious crime…does not, in itself, justify a retention measure‖  Broad scope ―entails an interference with the fundamental rights of practically the entire European population… it is not restricted to a retention in relation (i) to data pertaining to a particular time period and/or a particular geographical zone and/or to a circle of particular persons likely to be involved, in one way or another, in a serious crime, or (ii) to persons who could, for other reasons, contribute, by the retention of their data, to the prevention, detection or prosecution of serious offences.‖ Joined cases: Digital Rights Ireland Ltd v Minister for Communications, Marine and Natural Resources & Ors C- 293/12 and Kärntner Landesregierung, Michael Seitlinger, Christof Tschohl and others, C 594/12
  • 15. Data Retention judgment  ―the access by the competent national authorities to the data retained is not made dependent on a prior review carried out by a court or by an independent administrative body whose decision seeks to limit access to the data‖  ―does not require the data in question to be retained within the European Union, with the result that it cannot be held that the control, explicitly required by Article 8(3) of the Charter, by an independent authority of compliance with the requirements of protection and security, as referred to in the two previous paragraphs, is fully ensured.‖  ―Having regard to all the foregoing considerations, it must be held that, by adopting Directive 2006/24, the EU legislature has exceeded the limits imposed by compliance with the principle of proportionality in the light of Articles 7, 8 and 52(1) of the Charter.‖

Notas do Editor

  1. www.huffingtonpost.com/us/entry/2917842
  2. http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html
  3. Comment at American Constitution Society’s national convention, 14 June 2013http://thinkprogress.org/justice/2013/06/14/2163441/retired-federal-judge-your-faith-in-secret-surveillance-court-is-dramatically-misplaced/?mobile=nc
  4. http://www.nytimes.com/2011/05/27/us/27patriot.htmlhttp://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html http://www.guardian.co.uk/world/2013/jun/14/spies-influence-john-le-carre
  5. http://www.forbes.com/sites/tomiogeron/2013/09/11/live-mark-zuckerberg-speaks-at-techcrunch-disrupt/
  6. Intelligence protocol to CoE Convention 108, or interpretations of ICCPR/regional human rights treaties? MLATs? UKUSA amendment?