The party line from MPs who are being told by their parties to vote in mass-scale, warrantless surveillance powers is that the law doesn't change anything -- it's a lie.
DRIP makes sweeping changes to the existing -- illegal -- surveillance powers that the highest EU court struck down. The Open Rights Group has helpfully rounded up a "myth list" of the things you'll hear from your MP when you write to them and tell them that there's no need for these powers to be rushed through without debate.
The Prime Minister said, “we are not introducing new powers or capabilities” but in fact DRIP does not just deal with Regulations that were made illegal by the CJEU ruling. Clauses 3 to 5 of the Bill make amendments to the Regulation of Investigatory Powers Act (RIPA). DRIP extends the government's surveillance powers in two ways:
* It extends the territorial scope of RIPA - this means that the government can issue interception warrants for communications data to companies outside of the UK.
* It extends the definition of “telecommunications service” within RIPA. This will include webmail services such as Gmail. What isn’t clear is what other kinds of internet services are included.
The DRIP myth list [Pam Cowburn/Open Rights Group]
(Image: drip, jim simonson, CC-BY)
The Freedom of the Press Foundation’s lawsuit against the DoJ has resulted in the release of documents showing that a bill with that was nearly unanimously supported in Congress and the Senate was killed by behind-the-scene lobbying by the Department of Justice, which feared that they would lose the ability to arbitrarily reject Freedom of […]
Lee Jae-yong is nominally “vice-chairman” of Samsung, but his father, Samsung chairman Lee Kun-hee, is considered to be a mere figurehead, with Lee Jae-yong as the true boss of the company.
NSO is an Israel cyberarms dealer, which buys or researches vulnerabilities in software and then weaponizes them; claiming that these cyberweapons will only be used by democratic governments and their police forces to attacks serious criminals and terrorists — a claim repeated by its competitors, such as Italy’s Hacking Team and Gamma Group.
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]