Feeds

Govt Net Snoopers Charter slammed

Quite right, too

  • alert
  • submit to reddit

Bridging the IT gap between rising business demands and ageing tools

The IT industry has responded to Government proposals for increased Internet surveillance with a mixture of worry and irritation. The plans would mean a considerable extension of police powers in the UK, and as many as five times the current number of tapping warrants being issued. The plans, outlined in the government document 'Interception of Communications In the UK', would require ISPs to be able to intercept one telephone line in every 500 that they operate, in essence providing a back door for the government to monitor private transmissions. Malcolm Hutty, director of civil liberty group Liberty describes the proposals as 'Hideously expensive, technically unworkable, and a threat to civil liberties." Jack Straw, the Home Secretary, says in the introduction to the document that interception "..plays a crucial role in helping law enforcement agencies to combat criminal activity.." Most intercepted messages will be encrypted - at least it will be if the criminal has any sense. Decryption takes time, maybe weeks, rendering most intercepted information past its use by date. Demon Internet estimates that the infrastructure needed to fulfil the governments wishes would cost them more than one million pounds initially, and upgrades every year could be as much as 15 per cent of that again. Richard Clayton, an adviser at Demon, said: "If the government wants this information, it should pay for it." ®

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.