
Police face ban from marching in Pride parades after High Court ruling
The case was brought by Linzi Smith, who describes herself in court documents as a 'lesbian who is 'gender critical',' who 'believes that a person's sex is an immutable characteristic'.
She argued that police breached their impartiality obligations for taking part in the event and appearing under a banner supporting transgender people's rights.
The judge, Mr Justice Linden, agreed with her and ruled the Chief Constable of Northumbria Police acted unlawfully when she allowed uniformed officers to take part in the event last year.
The ruling is likely to have wide-reaching implications for how police are able to participate in community events across the country.
Chief Constable Gavin Stephens, chair of the National Police Chiefs' Council, said the organisation as 'working through the detail' of the judgement and is working to create broader guidance to help local forces 'make decisions around participation in events to maintain their impartiality.'
'Having police officers and staff who know their communities, are visible in those communities and play an active part in their local area has been shown time and time again to build trust and confidence in our service,' he said.
'Every week police officers and staff will as part of their duties take part in thousands of events up and down the country, from community events at village halls through to large scale events like carnivals, parades and festivals.
'However, we recognise that policing must also maintain its impartiality, including in the types of events it supports and plays an active part in.'
In a witness statement, Harry Miller, a former officer and founder of group Fair Cop, said the chief constable marched next to participants 'carrying the flags and emblems clearly associated with the gender ideologists' cause' such as banners saying 'Trans women are women' and 'Trans rights are human rights'.
He argued this signalled a political association.
Reaching his decision, the judge said the chief constable's participation was likely to be seen as 'expressing the support of the head of the force for the views and the cause which the march sought to promote' and 'therefore as indicating the position or perspective of the force as an organisation'.
Jo Maugham KC, executive director of the Good Law Project said the 'incredibly important' judgement could have practical implications for all people subject to impartiality obligations participating in such events.
'The impartiality duties that police have are substantially no different from the impartiality duties that all sorts of other public servants have,' he said. 'It doesn't mean police can't police these parades - they can. But it does mean they can't march in them.
'But it also could mean civil servants can't march in them or BBC journalists.'
He warned this could extend to parades or protests relating to other causes such as anti-racism or anti-misogyny as Trans people are also a legally protected group under the Equality Act.
Mr Maugham added there was a 'lack of clarity at the heart of the judgement' which he said does not define the phrase 'gender ideology' itself.
'[The judge's ruling] seems to think the reality or legitimacy of trans existence is up for debate,' he told The Independent. 'The difficulty of that is Parliament has said it is not up for debate.
'The Equality Act recognises that trans people - like women and disabled people - are a group whose existence is not up for debate, it is to be protected.'
He said: 'This is yet another decision made by our courts which has a very profound affect on LGBT rights where a court has not thought it appropriate to hear from anyone from that community.'
Responding to the ruling, Northumbria Police said it has an 'important role to play in a variety of events, including parades and festivals' throughout the year.
It said while their primary aim is to keep people safe, these events also provide police with 'an opportunity to engage with people including those who may have less confidence in policing.'
these events provides the force 'with an opportunity to engage with people including those who may have less confidence in policing'
'It is vitally important they feel supported and we continue to build their trust in us,' a spokesperson said. 'That is why we felt it important to challenge the case which was brought against us and which has implications for wider policing.
'We will work through the ruling to understand the implications, while staying true to our values of fairness, visibility, and support for all.'
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Telegraph
a minute ago
- Telegraph
Chinese hackers have seized control. How did we let this happen?
A civilisation that cannot defend itself really should not expect to survive, and after the latest cybersecurity news, I wonder how it can. An official advisory was recently sent out to the US military, warning that all forces must now assume their networks have been breached. The enemy is inside the house. What it means is that no system connected to the internet can be defended. Our own national cybersecurity agency asked UK businesses to make this presumption in 2020. The reason this hasn't been bigger news is that we've become fatalistic and weary, as one cybersecurity attack follows another. So when we discovered in early July that Chinese hackers had gained control of Microsoft servers at hundreds of US government agencies – including the US nuclear weapons agency – it was just another hacking story. What made this one noteworthy was that there wasn't immediately a fix or a patch, Microsoft admitted last Tuesday. Incredibly, confirmation of the US military's 'assume breach' alert had to be dragged out of the Department of Defense via Freedom of Information Act requests by a campaigning non-profit called Property of the People. These developments are the latest stage in an ongoing state-sponsored Chinese campaign, in which hacking has evolved from widespread commercial espionage a decade ago into something far more threatening. The latest phases, Salt Typhoon and now Volt Typhoon, are meticulous and sophisticated. They target not just government agencies like the National Guard, and China-critical MPs like Sir Iain Duncan Smith, but also private sector companies in the energy, telecoms, transport and water sectors. Ciaran Martin, former head of NCSC, the cybersecurity centre based at GCHQ, says that China's capabilities have been transformed. 'Now think of dozens or even hundreds of [individual] hacks at the same time – 'everything, everywhere, all at once' in the words of Jen Easterly, recently departed head of the US Cybersecurity and Infrastructure Security Agency.' Software attacks on our computer systems can create unique damage in ways that conventional warfare cannot. Let's consider two. While aerial bombing can produce spectacular instant results, targets can be disassembled prior to attack, and can be quickly rebuilt after the attack. Both happened with the recent attack on Iraq's nuclear facilities. But recovering from cyber attacks is much harder. Ask the British Library, which has still not restored all of its services. 'Printed catalogues and handlists are available in our Reading Rooms', it still advises visitors to its website. The attack took place in October 2023. A second way in which cyber attacks now present a unique challenge is the ability of Chinese hackers to 'live off the land' after they break through. Rather like special forces embedded behind enemy lines, hackers conceal themselves undetected for months or years. To the guardians of the network, they are just another innocent user. 'Both Salt and Volt Typhoon were in play for years before being detected,' writes Martin. 'And they are strategic compromises of the West on a scale hitherto unseen by any other cyber power.' Not only do we not know when the attack is over, we don't even know when it has begun. How did this happen? If I haven't depressed you enough, this is where it gets particularly troubling. Cybersecurity is a gnarly failure of accountability and regulation that spans decades of indifference, and implicates business complacency and government apathy. The internet protocols (IP) we use today are completely rotten. The great and the good of the IT and telecommunications industries spent the entire 1980s in international committees devising complex secure networking protocols, only to be met with mistrust and specifications no one really wanted. Fed up with waiting, we adopted today's protocols, which were cheap and simple to implement, but not secure. Now, the international standards bodies that might devise a successor to IP are dominated by China. When they fail, suppliers can hide behind licensing agreements and expensive lawyers. No one goes to prison for bad security design. Their customers – us – are guilty of negligence too. Salt Typhoon took advantage of a bug in Cisco routers that users had not bothered to fix for seven years. As a society, we rush to implement technologies without thinking too hard about externalities. Generative artificial intelligence (AI) opens up lots of new holes, and also lowers the bar so that even the technically unskilled can plant hacks. All in all, then, this may not seem a good time to force Britons to use a new government identity service. Especially when you know that 'red team' penetration testing proved in March that this could be penetrated by hostile foreign agents without them being detected. This is what Baroness Neville Jones calls 'a piece of critical infrastructure'. Chinese agents may already be 'living off the land' inside the One Login system, on which your government wallet has been built, and soon perhaps, your digital ID. But don't expect Peter Kyle, the Science and Technology Minister, to put the brakes on the One Login project when he's its biggest fan. To survive and prosper, we need serious and technically aware people in his position, who listen to the security professionals. Kyle appeared on Newsnight last week wearing jeans and a T-shirt and trainers, all of which were intended to signal to viewers his youthful love of digital technology. He is 54.


BBC News
a minute ago
- BBC News
Pershore missing mother and daughter found
A mother and daughter who were missing from their home for nine days have been Mercia Police had appealed for help in finding Hannah Sheehan, 45, and Lydia Sheehan, 14, who were last seen in Pershore, Worcestershire, before disappearing on 18 search spread further afield as the pair had links to Redditch, Stratford, Leamington Spa and Wellesbourne in Warwickshire, with people urged to call they were "found safe and well" on Monday, the force confirmed. Officers thanked everyone who shared information about the police appeal. Follow BBC Hereford & Worcester on BBC Sounds, Facebook, X and Instagram.


BBC News
a minute ago
- BBC News
Danis Voldoka jailed for 'abhorrent' sex offences on woman
A man who repeatedly sexually assaulted a woman has been Voldoka, 55, of Boston, pleaded guilty to four counts of sexual assault in the town between May and June last Lincoln Crown Court on Friday, he was jailed for 16 months, added to the sex offenders register for 10 years and he was also handed a five-year restraining Sgt Katherine Brennan, from Lincolnshire Police, described Voldoka's actions as "abhorrent" and said she was "glad to see him given a jail term" for the offences. Det Sgt Brennan added: "I'd like to thank the victim in this case for their bravery and commitment to justice, which played a key role in securing a sentence." Listen to highlights from Lincolnshire on BBC Sounds, watch the latest episode of Look North or tell us about a story you think we should be covering here. Download the BBC News app from the App Store for iPhone and iPad or Google Play for Android devices