{"title":"Conclusion","authors":"E. Mahoney","doi":"10.1093/oso/9780198818625.003.0015","DOIUrl":"https://doi.org/10.1093/oso/9780198818625.003.0015","url":null,"abstract":"This concluding chapter addresses the significance of examining the legal history record to better understand the nature, influences, and values of contemporary institutions. It is important to know, for example, why the modern law on the interception of communications contains the unique and eccentric power of the Home Secretary rather than a judge to issue warrants to authorize the opening of mail and the tapping of phones. The historical record also more clearly casts light on the close relationship between the Security Service and the government, which by virtue of this procedure not only knows about but also authorizes MI5 targets and operations, raising doubts about the operational independence of MI5. Moreover, the experience of the past helps in assessing problems of the present. In particular, it gives credibility and continuity to complaints about the use and abuse of surveillance powers and the corruption of the criminal justice system for political ends.","PeriodicalId":235253,"journal":{"name":"MI5, the Cold War, and the Rule of Law","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128894670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surveillance Targets","authors":"E. Mahoney","doi":"10.1093/oso/9780198818625.003.0004","DOIUrl":"https://doi.org/10.1093/oso/9780198818625.003.0004","url":null,"abstract":"This chapter discusses the targets of surveillance. It examines four groups who were the subject of surveillance during the Cold War: the Communist Party of Great Britain (the CPGB), the peace movement, the trade union movement, and the National Council for Civil Liberties (NCCL), which might be described today as a non-governmental organization (NGO). It is important to stress that the organizations and individuals subject to surveillance were involved in lawful activity and that the Security Service had no statutory authority to engage in the surveillance in question. It is also important to emphasize that these were not the only organizations to be the subject of surveillance, with the Haldane Society of Socialist Lawyers being another notable example, in addition to those already mentioned. Finally, it is important to be reminded that the organizations considered in this chapter were under surveillance by virtue of a mandate that gave MI5 authority to defend the realm, particularly in relation to threats from espionage, sabotage, and subversion.","PeriodicalId":235253,"journal":{"name":"MI5, the Cold War, and the Rule of Law","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130658346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Surveillance Methods","authors":"E. Mahoney","doi":"10.32388/kau9jp","DOIUrl":"https://doi.org/10.32388/kau9jp","url":null,"abstract":"This chapter examines the surveillance methods used by the MI5. It is a curious feature of MI5’s mandate that it included nothing about the methods to be used for the purposes of the defence of the realm, which was its core task. The Security Service would obtain information about individuals and organizations in a number of ways, which might be described as volunteers who spontaneously reported fellow citizens; monitoring by Special Branch, infiltration, and the use of informers; watching and following; interrogation and questioning; and the interception of communications (mail, telegrams, and telephones); as well as the use of secret microphones hidden in various locations; and foreign security and intelligence agencies. The chapter also looks at the different circumstances in which these different forms of surveillance were used: a contrast between routine and intense surveillance; between passive and active surveillance; and between constant and periodic surveillance.","PeriodicalId":235253,"journal":{"name":"MI5, the Cold War, and the Rule of Law","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133403546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}