The UK Conservative party is embroiled in a public internal squabble as its libertarian wing contemplates the "snoopers' charter," a proposed warrantless Internet spying bill that will require ISPs to store fantastic amounts of your online activity and make it accessible to police and government without a warrant, at a cost of billions of pounds that the ISPs can bill the government for. The Tories fought a nearly identical proposal from Labour in the last parliament. Home Secretary Theresa May has dismissed critics of the bill as "conspiracy theorists" who are unaccountably exercised over trivia like accountability, judicial review, and the principle of surveillance being limited to people who have done something suspicious. She says that these freedoms are only of use to "criminals, terrorists and paedophiles."
Alan Travis writes in The Guardian:
May dismissed critics of the new powers, which will allow police and intelligence services to track Facebook, Twitter, email and other web use, as "conspiracy theorists". She defended the 550,000 individual requests for data each year made by security officials as a vital tool to catch serious criminals and terrorists.
She told the Sun: "I just don't understand why some people might criticise these proposals. I have no doubt conspiracy theorists will come up with some ridiculous claims about how these measures are an infringement of freedom. But without changing the law, the only freedom we would protect is that of criminals, terrorists and paedophiles..."
"It's not content, but it's incredibly intrusive," [former Conservative shadow home secretary, David] Davis told BBC Radio 4's Today programme. "If they really want to do things like this – and we all accept they use data to catch criminals – get a warrant. Get a judge to sign a warrant, not the guy at the next desk, not somebody else in the same organisation."
38 Degrees has an online petition to stop the proposal, which stands at over 164,000 right now.
'Snoopers' charter' proposal sparks Tory row
(Image: Home Secretary meets police in South London, a Creative Commons Attribution (2.0) image from 49956354@N04's photostream)
Help wanted: Operations Manager (personable, resourceful, and demonstrates outstanding attention to detail); Civil Liberties Legislative Counsel (advocacy, public speaking, blogging and other social media, media appearances and legislative and regulatory matters related to a variety of high technology public interest legal issues); 2017-19 Frank Stanton Fellowship (recent law school graduates or law students who will […]
M. David Weisman, a magistrate judge in Illinois’s Eastern Division, denied a federal warrant application that would have allowed law enforcement officers to force suspects to unlock their mobile devices with a fingerprint, ruling that the suspects’ Fourth Amendment (undue search and seizure) and Fifth Amendment (self-incrimination) rights protected them from being forced to unlock […]
Texas and Chile have remarkably similar flags (though Chile got theirs first, by a matter of decades) and Texas doesn’t have a Unicode-defined emoji for its flag (just a sprinkling of proprietary ones that do not cross platforms gracefully), so Texans have taken to using the Chilean flag emoji as a shorthand for the longhorn […]
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]