Connect with us

Tech

Police ordered to give reasons in closed court for seizing phone of UK Hamas lawyer | Computer Weekly

Published

on

Police ordered to give reasons in closed court for seizing phone of UK Hamas lawyer | Computer Weekly


North Wales Police has been ordered to disclose the reasons for stopping a UK lawyer who represented Hamas and seizing the contents of mobile phone to closed-door court hearing.

Justice Martin Chamberlain said that he did not accept that North Wales Police could simply assert there was a lawful basis for stopping and copying the contents of solicitor Fahad Ansari’s phone, without saying what the reason was.

But the judge refused to issue an order preventing a police-appointed independent legal counsel from rstarting a review of the contents of Fahad Ansari’s phone until Ansari could appeal to a judicial review.

The decision came after North Wales police gave an undertaking that the material would not be shared with police investigators until a decision in a further court hearing.

Solicitor Fahad Ansari, who represented Hamas in a legal challenge to overturn its status in the UK as a proscribed terrorist organisation, is seeking a judicial review after being stopped by police and his mobile phone seized.

Ansari, an Irish citizen, argues that he was unlawfully stopped, detained and questioned under Schedule 7 of the Terrorism Act after he drove off a ferry with his family at Holyhead after visiting relatives in Ireland in August.

The case is understood to be the first time police have used Schedule 7 of the Terrorism Act – which allows police to stop people without grounds for suspicion – to seize and copy the contents of a phone belonging to a solicitor in the UK.

Ansari said that his phone contained material used for work, and that accessing it would breach the legal privilege of clients dating back 15 years.

Jude Bunting KC, told a court hearing today that North Wales Police, which leads counter-terrorism policing in Wales, had failed to provide any reason for stopping Ansari and seizing his mobile phone.

He told the court that Ansari’s phone contains communications with past and current clients, witnesses and legal counsel, stored on multiple applications and cloud-based services that were protected by legal privilege.

The phone contains details of at least 3,000 contacts, voice notes, memos, case papers, search terms, and meta data, the overwhelming proportion of which is likely to be legally protected.

Bunting said that Ansari had been targeted by police to obtain and access the contents of his mobile phone. A Schedule 7 stop cannot be justified on the grounds that Ansari’s clients were of interest to the police and the security service, he said.

The barrister said that it was not reasonably practicable for an independent counsel to ‘sift’ the legally privileged material on the phone, which made up 95% to 98% of the content, from non-privileged material that police were allowed to access.

North Wales Police has refused to explain how material can be sifted, apart from simply asserting “there are adequate safeguards in place,” he said.

He said it was not practicable to identify key words to carry out searches that would identify legally privileged material.

The police had given no explanation why it was necessary to search Ansari’s mobile phone, let alone why it was necessary to search it now, Bunting told the court.

“There is a real risk that legally privileged material will be provided to the examining team. If this happens, the damage to the claimant will be irreparable,” Bunting wrote in legal submissions.

Georgina Wolfe, representing North Wales Police, said that there was no evidence to support the assertion that Ansari had been stopped and his mobile phone seized can copied, because of the clients he represented.

She argued that there was an effective long-established procedure to sift legally privileged material from seized devices, under the Schedule 7 code of practice.

The court heard that the chief constable of North Wales Police had appointed an independent KC to review material on Ansari’s phone. “The chief constable has no intention of reviewing or sharing any legally privileged material,” said Wolfe.

In written submissions, Wolfe said that if any material was found that appeared to suggest Ansari was a terrorist, or requires further action by law enforcement, that material may be lawfully shared with other law enforcement agencies.

Wolfe told the court that North Wales police accepted that Ansari acting as legal representative of Hamas would not be a proper basis for stopping him under Schedule 7.

She told the court that there was a proper reason for stopping him but she was not in  a position to share it in open court.

The judge, Justice Martin Chamberlain, said that he did not accept that the chief constable of North Wales Police “could simply assert there was a proper basis of that search without saying what the reason was”.

He rejected arguments from Bunting to allow an interim injunction to prevent the contents of the phone being examined until a judicial review could consider the lawfulness of the police decision to stop Ansari under Schedule 7.

“There was a strong public interest in allowing the chief constable to pursue an investigation into whether or not the claimant was involved in terrorism,” he said.

Wolfe had offered an undertaking that the independent counsel would not inform the chief constable, “or anybody else” of the contents of the phone.

The judge said he accepted that this would involve some loss of confidentiality for Ansari, but said there was no material risk of material from his phone being communicated to the police.

The court will make a ruling to hear an explanation from North Wales Police for the reasons for stopping Ansari in a closed hearing before a special advocate, later this month.

The judge suggested that the special advocate could make an argument for a ‘gist’ of the reasons for the stop to be made public if that was appropriate.

Speaking before the hearing, Ansari said: “Even the police agree that my phone contains sensitive, privileged information. All I am asking the court on Monday is to make sure this material stays protected until a judge rules on whether the police acted lawfully in detaining me and seizing it.”

The campaigning group, Cage, said Schedule 7 was an “exploitative power”. Head of public advocacy Anas Mustapha, said:Courts have repeatedly failed to claw back citizens’ rights undermined by Schedule 7. In this case, with the stakes so high, the judges ought to do more to defend civil liberties and the right to practice law without state harassment.”



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

We Found the Best Travel Cameras You’ll Actually Use on Vacation

Published

on

We Found the Best Travel Cameras You’ll Actually Use on Vacation


If I were buying a camera today, this is the body I would get, travel or otherwise. The A7C R is one of the smallest full-frame, interchangeable-lens cameras on the market. This is why it’s our top pick for travelers in our guide to the Best Mirrorless Cameras. The 61-MP sensor offers amazing detail and very good dynamic range (14.7 EV). The super fast autofocus system is among the best you’ll find in mirrorless camera, and there’s great subject tracking as well, making it perfect for shooting fast-moving scenes on the go.

While Sony’s R series cameras are mainly for high resolution still images, the video specs here are solid enough for the casual video user, with support for 4K/60 fps video in full-frame mode (1.2X crop) or oversampled 4K/30 fps video. Both support 10-bit 4:2 color depth, various Log formats, and even 16-bit RAW output to an external recorder.

My main gripe about the A7C R is the same as it was in my initial review. The viewfinder is cramped and low-resolution (2.36 million dots). It’s not a deal breaker for me, but it’s something to keep in mind and good reason to rent a camera before you invest.

The big question with this camera is, which lens do you pair it with for travel? There’s a compelling argument to be made for the Sony FE 24-105-mm f/4 G ($1,398), which gives you everything from wide to portrait with a little bit of extra reach as well. Another great option if you like primes is the Sony 40-mm f2.5 G ($798), which makes for a compact kit, and 40-mm is a surprisingly great focal length for travel in my experience.

★ Alternative: At $2,198, Sony’s A7C II (note, no R) is a bit cheaper. It uses Sony’s smaller 33-MP sensor but is otherwise very close in size and capabilities, with considerably more video chops than the A7C R. If you want to make videos as well as stills, the A7C II is a better choice.



Source link

Continue Reading

Tech

Auditing, classifying and building a data sovereignty strategy | Computer Weekly

Published

on

Auditing, classifying and building a data sovereignty strategy | Computer Weekly


Data sovereignty is a hot topic. For commercial and public sector organisations, compliance to ensure personal data is secure is a primary objective. And that means it cannot be subject to foreign laws or interference.

Data sovereignty is also a matter for international relations, where states strive to ensure citizen and organisation data is secure from foreign interference. And, for states, achieving data sovereignty is also a way of protecting and developing national economies.

In this article, we look at data sovereignty, and the key steps CIOs need to take to build their data sovereignty strategy. This centres on auditing, classification and building controls over data location and movement.

What is data sovereignty, and why is it an issue?

At the most general level, data sovereignty is the retention of data within the jurisdiction – usually state boundaries – whose laws govern its use.

Interest in data sovereignty has been building for some time. In one sense, it looks a lot like law catching up with the “wild west” early years of cloud use and popularity. Here, organisations rushed to this new, highly flexible location to process and store data, then later discovered the risks to which they – and their customer data – had become exposed.

More recently, the drive to digital sovereignty stepped up to the level of states. That trend got a big boost during US president Donald Trump’s first term. That saw the country’s introduction of the Clarifying Lawful Overseas Use of Data (Cloud) Act, for example, which potentially allows US law enforcement to access data stored by US companies anywhere. Alarm bells started ringing, especially in Europe.

Organisations achieve digital sovereignty in their operations by making data subject to the laws and control of the state they operate in, or from. But we are far from achieving that, when, for example, Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) have around 70% of the European cloud market, and many European state organisations are completely or overwhelmingly dependent on US hyperscalers for cloud services.

What are the concerns about data sovereignty, and what do CIOs plan to do?

Surveys regularly find IT decision-makers are concerned about data sovereignty. A Gartner survey conducted among 241 IT decision-makers globally found the majority (75%) of those outside the US plan to have a digital sovereignty strategy in place by 2030. Meanwhile, 53% said concerns over geopolitics would restrict future use of global cloud providers, and 61% said such worries would increase their use of regional or local cloud providers.

Complexity – and the potential for contradictory regulations and increased costs – is also a major concern, says Simon Robinson, principal analyst for storage and data infrastructure at Omdia.

“Our research found 74% of organisations say sovereign clouds have become more important over the last two years,” he says.

“However, it is a complex and fast-moving area. The regulatory and compliance environment is evolving rapidly. But the challenge for global organisations is that some regulations may actually conflict, potentially forcing them to contemplate whether they might break one law or regulation to satisfy another.”

Robinson adds: “At the very least it pushes up costs, may lead to inconsistent data policies around retention, and could slow down the adoption of advanced technologies, such as AI [artificial intelligence].”

So, while risks around stored data being in datacentres in a foreign country, on foreign infrastructure and subject to that country’s laws are a major worry, resolving that situation can bring its own issues too.

What is a data sovereignty audit, and why is it so important?

Core to an organisation’s responses to an unknown or uncontrolled data sovereignty situation is an audit of its data. This is the first step towards ensuring data is kept and processed within the appropriate state boundaries.

That will likely take the form of identification of the risks around different classes of data, according to Jon Collins, vice-president of engagement and field chief technology officer at GigaOm.

“Not all data is created equal, and not all parts of the architecture are created equal,” he says. “The first step is to classify what you’ve got. Identify whether it needs to fall within the scope of sovereignty, understand what kind of data it is, and consider how it might be impacted in terms of privacy, localisation and compliance.”

Key parts of a digital sovereignty strategy include mapping digital assets and data flows throughout their lifecycle and the laws to which they are subject at all stages. Then classify the data to assess risk levels for each class.

This can include geo-tagging, and should be part of an ongoing process, says Bettina Tratz-Ryan, vice-president and analyst at Gartner. “Automated discovery tools help identify and tag sensitive data, whether in physical storage or incidental locations like shared drives and folders,” she adds.

“Regular audits and compliance checks are non-negotiable and require strong governance policies and periodic manual reviews.”

How to minimise exposure to data storage risks

A data storage strategy that addresses data sovereignty builds on the classification of data in the data audit to limit what data can go where.

As part of the classification process, data will be subject to a policy that manifests in metadata tagging that indicates its sensitivity and tolerance for movement.

“Organisations should adopt a data governance as code approach, automating compliance through infrastructure as code techniques for consistent enforcement and rapid remediation,” says Tratz-Ryan.

That means sensitive data should be stored locally or in regional datacentres to meet residency requirements, with the cloud used for scalability under strict, region-specific compliance requirements.

“Continuous monitoring, encryption and geo-fencing are essential, and governance must be built in, not bolted on,” adds Tratz-Ryan.

Such approaches address the difficulties that potentially arise with data in transit. With the ability to monitor compliance and auditability built in via classification and tagging, critical workloads can be more easily segregated from less sensitive data at rest and in transit. 

“Strict governance over location and movement is the cornerstone of risk mitigation,” says Tratz-Ryan.

Challenges in maintaining knowledge and control

There are many challenges to data sovereignty auditing. Data moves, and it moves across borders. We might believe we have nailed down data in our infrastructure, while data finds other backdoor routes across frontiers. Meanwhile, proprietary systems present huge challenges to audits and tagging, and staff create shadow IT, use emails, attach files, and so on.

In short, data movement in an organisation can be very complex indeed. It is potentially simple to audit and control the vast bulk of our data, but the problems come with incidental cases of data movement, says Tratz-Ryan.

“In globally connected organisations, sovereignty risks will occur even if data is stored in local servers. Remote access, backups, and software-as-a-service integrations can create cross-border exposure, triggering compliance challenges under laws like the US Cloud Act. Also, governance can be bypassed by incidental data movement via virtual private networks, personal devices, or email,” she says.

“And, for example, an automotive manufacturer may store design files on-premise in one location, but metadata and backups can flow through global product lifecycle management systems, creating sovereignty exposure.

“Incidental data movement, such as emails, shared drives and collaboration tools, often push data into unsanctioned cloud folders, outside sovereign governance. Shadow IT compounds the problem when employees use external apps without IT oversight, creating blind spots.”

GigaOm’s Collins believes that for most, the key elements needed to incorporate data sovereignty compliance are already present in their organisation.

“It’s practical to consider it within your broader governance, risk and compliance framework,” he says. “The advantage is, as a larger organisation, you already have practices, processes and people in place for audit, reporting and oversight. Sovereignty requirements can be incorporated into those mechanisms.”

Collins says we should not assume all data needs to meet sovereignty rules, and that in many cases, it’s not possible to do so.

“For example, it’s not realistic to make email a fully sovereign, locally contained application because it’s inherently distributed,” says Collins. “But you can prevent sovereign data from being transmitted by email. That’s where data loss prevention and data protection policies come in, to make sure data from certain repositories, or of certain classifications, is not emailed out.”

Similarly with cloud. Rather than try to make all cloud folders sovereign, we should instead decide what data can and cannot be stored there. And if data needs to be stored locally, then it goes to a local on-premise or domestic cloud service or availability zone.

“The core debate is deciding whether a particular dataset is sovereign,” says Collins. “If you operate in a given country and you hold customer data about people in that country, then that data stays in that country. That gives you a clear list of what cannot go into cloud folders, be sent by email, or managed by a system that can’t guarantee localisation. Once you frame it that way, the whole thing becomes much more straightforward.”



Source link

Continue Reading

Tech

Want to Stop Doomscrolling? You Might Need a Sleep Coach

Published

on

Want to Stop Doomscrolling? You Might Need a Sleep Coach


Margaret Thatcher, who was known for sleeping only four hours a night, is often credited with saying “Sleep is for wimps!” But sleep is actually work. Putting down the phone, setting aside personal or political worries—these require discipline. True relaxation calls for training.

Sleep coaches used to treat mainly newborns (and their exhausted parents). But recently, as anxieties about sleep have spiked, grown-ups have found they need help with their habits too. A Gallup poll from 2023 found that 57 percent of Americans think they would feel better with more sleep, up from just 43 percent in 2013. Only about a fourth of those surveyed reported getting the commonly recommended eight or more hours per night—down from 34 percent 10 years prior.

Sleep professionals are seizing the opportunity to help adults realize their dream of waking up rested. WIRED spoke to a sleep consultant who, after years of working with kids, tapped into that underserved population. She says it’s entirely possible to transform daytime and nighttime habits to optimize for good sleep. Why not start tonight?

Usually, an adult comes to me with one of two things: First, a major life event—work stress, having a baby, losing a parent, a relationship ending—that destabilizes their system. Sleep is always the first thing to go. The second is that they have a chronic pattern. There are people who’ve really struggled with sleep since childhood, and then it becomes a part of how they see themselves. They’ve tried everything, and then they say, “I’m an insomniac.”

In both cases, they’re exhausted. I always laugh, because when I’m cornered at a dinner party it’s like, “Oh, I just have a quick question. I haven’t slept through the night in 19 years.”

I’ve been a sleep consultant for over 20 years. I started my child sleep practice after getting my master’s in clinical psychology. I was working with a lot of parents, and I really started to notice a common issue: Their children’s sleep issues were literally pushing them to the brink of divorce.

Even once I got their kids to be fabulous sleepers, the parents were still struggling due to long-standing habits from way before their kids arrived. That’s when I realized I needed to help the adults too.

There are camps: trouble falling asleep or trouble waking up at night—or both. So that’s my job: to unravel that mystery of what’s keeping someone up at night. Some of the toughest cases are people who come in only focusing on their nighttime habits and don’t disclose things happening during the day.

One of my clients had trouble sleeping through the night for years. We realized that they consumed most of their calories at night, and nothing during the day. So they kept waking up to eat, and that completely dysregulated their system.

Another client, a woman who exercised all the time and drank 200 ounces of water a day, never made the connection that she was getting up to pee literally every hour. We had to diminish the amount of water she drank and have her stop drinking at a certain hour.

Sometimes people actually just stop functioning. I’m thinking about a mom who says, “I just forgot to clip my child’s seatbelt on in my car.” “I put my keys in the refrigerator.”

I start with the basics. Of course, we’re doing sleep hygiene, but that’s anything that you can Google: Get blackout shades, have a sleep sanctuary. Most people think they have a good setup, but their habits or their environment are working against them. That’s where coaching helps, because I can spot what they’re missing.

People have these stories that they’ve told themselves, like, “If I sleep, then I’m not working hard enough” or “I’m young and I don’t need that much sleep.” What’s the new story that you can tell yourself about sleep? From there, I use a lot of journaling, cognitive behavioral therapy techniques, mindset work, breath work.



Source link

Continue Reading

Trending