Feeds

Police request right to spy on every UK phone call and email

Average Jo will be as closely monitored as a terrorist

  • alert
  • submit to reddit

The Power of One Infographic

A report by the deputy director-general of the National Criminal Intelligence Service - sent to the Home Office and leaked to the Observer newspaper - has shocked many by asking for the legal right to access records of all phone calls, emails and Internet dial-ups made in the UK for a period of up to seven years.

The proposals as they are written present a direct threat to not only the privacy of the UK population but also the data protection laws, human rights legislation and the enshrined legal concept of presumed innocence.

The document has the backing of MI5, MI6, GCHQ, Customs & Excise and the Association of Chief Police Officers, and claims that the Home Office - which would attempt to make the recommendations law - is sympathetic to its cause.

In a nutshell, NCIS' deputy director-general Roger Gaspar is asking for a legislative framework which would oblige all communication service providers or CSPs (that's everyone from BT to mobile phone companies to ISPs) to store logs of all information over their networks for seven years - 12 months in real-time and from then on archived. Currently, the need to research material more than two years old is restricted almost exclusively to murder and terrorism. Gaspar also strongly suggests that the information is stored in a government-run data warehouse.

In the report - sent to US Web site Cryptome, which specialises in such material - Gaspar lays out his case for compulsory surveillance of every UK person. In intelligence terms, it is convincing - the growth of modern communications and hi-tech crime has meant that the traditional eye-witness account can only be replaced by network data. With criminals, terrorists, racists etc etc using the Internet to bypass the police, the police will be increasingly frustrated in its attempts to bring them to justice.

One major aspect of this is that many CSPs delete data over their networks every 24 hours. Some hold the data for longer but most are fearful of the law and delete it as soon as it no longer has any commercial value. The police see this as the destruction of potentially case-breaking information.

Thus, to promote "a safe and free society", maintain "the interests of justice and fairness of our judicial process" and contribute to "saving lives", it is essential for the security services and police to know when and to who anyone in the UK has communicated with anyone else from now and for seven years. The recommendations would also go very neatly hand-in-hand with the much-criticised RIP Act, which allows the police and security services to collect Internet data without a warrant and demand encryption keys from individuals and ISPs.

This is all clearly a nonsense but it doesn't make the report any less disturbing. Since the Home Office - and Jack Straw in particular - has made it clear it is sympathetic to increased surveillance of UK residents, the security services have clearly seen an opportunity to get self-serving recommendations into law. This report - which, incidentally, contains no mention of any safeguards to prevent abuse of the system - is a stark indication of how totalitarian the government has become. ®

Related Link

The report in full on Cryptome

Related Story

Politicians line up against Euro email snooping laws

Mobile application security vulnerability report

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.