We could ask the question as to whether Snowden’s actions, which place him in exile in Russia facing multiple years in jail should he return to the US, caused a retrenchment of industrial-scale Western surveillance and interception activities. The answer, perhaps ironically, is that the opposite seems to have happened. Taking the UK’s IPA as an example, many Western states continue to have considerable interception capabilities and powers and have arguably deepened and strengthened these powers in many cases. Indeed, it could be argued that the state’s professed need to continue to be able to tackle the security threats of the twenty-first century despite significant changes in technology have won out over any public concerns that may exist about erosions of privacy. As a side issue, continuing questions about whether Western oversight and accountability regimes have sufficient teeth to be able to take on the security agencies seem only to have been exacerbated. This chapter will consider the chronology of events in the UK case study, starting in the late 2000s and moving on to the passing of the IPA in 2016. It interprets this story in terms of whether and how the state interacted with its critics in developing a refreshed surveillance regime; how the oversight bodies fared throughout the period; and where this leaves questions of privacy-versus-security in the final analysis.
{"title":"Intelligence gathering, issues of accountability, and Snowden","authors":"J. Richards","doi":"10.4324/9780429399046-3","DOIUrl":"https://doi.org/10.4324/9780429399046-3","url":null,"abstract":"We could ask the question as to whether Snowden’s actions, which place \u0000him in exile in Russia facing multiple years in jail should he return to the US, \u0000caused a retrenchment of industrial-scale Western surveillance and interception activities. The answer, perhaps ironically, is that the opposite seems to \u0000have happened. Taking the UK’s IPA as an example, many Western states \u0000continue to have considerable interception capabilities and powers and have \u0000arguably deepened and strengthened these powers in many cases. Indeed, it \u0000could be argued that the state’s professed need to continue to be able to tackle \u0000the security threats of the twenty-first century despite significant changes in \u0000technology have won out over any public concerns that may exist about erosions of privacy. As a side issue, continuing questions about whether Western \u0000oversight and accountability regimes have sufficient teeth to be able to take on \u0000the security agencies seem only to have been exacerbated. \u0000This chapter will consider the chronology of events in the UK case study, \u0000starting in the late 2000s and moving on to the passing of the IPA in 2016. \u0000It interprets this story in terms of whether and how the state interacted with \u0000its critics in developing a refreshed surveillance regime; how the oversight \u0000bodies fared throughout the period; and where this leaves questions of \u0000privacy-versus-security in the final analysis.","PeriodicalId":119561,"journal":{"name":"Terrorism and State Surveillance of Communications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126231558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communications and security after Brexit","authors":"L. Carlile","doi":"10.4324/9780429399046-2","DOIUrl":"https://doi.org/10.4324/9780429399046-2","url":null,"abstract":"","PeriodicalId":119561,"journal":{"name":"Terrorism and State Surveillance of Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121375339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An Act to make provision about the interception of communications, equipment interference and the acquisition and retention of communications data, bulk personal datasets and other information; to make provision about the treatment of material held as a result of such interception, equipment interference or acquisition or retention; to establish the Investigatory Powers Commissioner and other Judicial Commissioners and make provision about them and other oversight arrangements; to make further provision about investigatory powers and national security; to amend sections 3 and 5 of the Intelligence Services Act 1994; and for connected purposes. [29th November 2016]
{"title":"The Investigatory Powers Act 2016","authors":"S. Hale-Ross","doi":"10.4324/9780429399046-5","DOIUrl":"https://doi.org/10.4324/9780429399046-5","url":null,"abstract":"An Act to make provision about the interception of communications, equipment interference and the acquisition and retention of communications data, bulk personal datasets and other information; to make provision about the treatment of material held as a result of such interception, equipment interference or acquisition or retention; to establish the Investigatory Powers Commissioner and other Judicial Commissioners and make provision about them and other oversight arrangements; to make further provision about investigatory powers and national security; to amend sections 3 and 5 of the Intelligence Services Act 1994; and for connected purposes. [29th November 2016]","PeriodicalId":119561,"journal":{"name":"Terrorism and State Surveillance of Communications","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115232307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The impact of terrorism on peace processes","authors":"C. Kaunert, Ori Wertman","doi":"10.4324/9780429399046-6","DOIUrl":"https://doi.org/10.4324/9780429399046-6","url":null,"abstract":"","PeriodicalId":119561,"journal":{"name":"Terrorism and State Surveillance of Communications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123425053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EU data protection law","authors":"D. Lowe","doi":"10.4324/9780429399046-4","DOIUrl":"https://doi.org/10.4324/9780429399046-4","url":null,"abstract":"","PeriodicalId":119561,"journal":{"name":"Terrorism and State Surveillance of Communications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124933463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conclusion","authors":"S. Hale-Ross, D. Lowe","doi":"10.4324/9780429399046-7","DOIUrl":"https://doi.org/10.4324/9780429399046-7","url":null,"abstract":"","PeriodicalId":119561,"journal":{"name":"Terrorism and State Surveillance of Communications","volume":"403 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120864487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}