Loading...
Security 2017-04-26T15:59:43+00:00

Security Articles

Who Governs the Internet?

Counsel, the magazine of the Bar of England and Wales, has published my article on the subject of internet content regulation. When I submitted the original version, just before the Cambridge Analytica revelations in March, the [...]

By | April 24th, 2018|Categories: Blog, Featured, Law, Security|Tags: , , , , , |

Watching the watchers – implementation stocktake

The Home Secretary wrote to me today - just in time for my evidence session this afternoon before the Home Affairs Select Committee - setting out the terms for a new assignment.  That will be a "stocktake" of the [...]

Shades of Independent Review

This new working paper, Shades of Independent Review (draft updated April 2018) is the sequel to a 2014 article (reproduced by kind permission of Public Law) on the responsibilities and influence of the Independent Reviewer of Terrorism Legislation (IRTL). The [...]

By | December 6th, 2017|Categories: Blog, Featured, Security|Tags: , , , , |

Report into MI5/Police intelligence-handling reviews

The Home Secretary has today published my report (submitted to her on 2 November) into the nine internal reviews by MI5 and Counter-Terrorism Police of their handling of intelligence prior to this year's terrorist attacks [...]

By | December 5th, 2017|Categories: Blog, Featured, Security|Tags: , , , , , , , , |

Intelligence handling and the recent terrorist attacks

After many years of relative failure, this spring has seen terrorists mount vile and contemptible attacks at Westminster Bridge, Manchester Arena, London Bridge and Finsbury Park.  I have been asked, by letter from the Home Secretary of 28 June, to provide [...]

By | June 28th, 2017|Categories: Blog, Security|Tags: , , , , , , , , |

Not for wimps: the pragmatic case for human rights

Internationally recognised human rights standards are an essential benchmark for anyone who seeks an informed view on the laws governing terrorism, surveillance and extremism. But contrary to the belief propagated by some, those standards do not amount to unrealistic aspirations, dreamed [...]

By | June 7th, 2017|Categories: Blog, Law, Security|Tags: , , |