Feeds

Govt ministers distance themselves from email spy plan

David Shayler, Lord Cope tell The Reg what they think

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Government ministers are distancing themselves from the Draconian surveillance measures proposed by NCIS deputy Roger Gaspar in a report to the Home Office.

The report, asking for all communications data in the UK to be stored for seven years in government-run data warehouses, was leaked to the Observer at the weekend and met with a furious reception.

Today in the FT, top ministers have made it clear in that special way they do without actually telling anyone, that the proposals are not something they will be considering at the moment. Why? Because civil rights folk will go mental and opposition MPs will use it to win political capital. And, oh yes, isn't there a general election coming up soon?

Not that the oppressive, undemocratic, abusive and illegal proposals are to be binned. If we're lucky enough to get Jack Straw as Home Secretary again, we may well see a watered-down version pop up in the Commons.

Last night, we were fortunate enough to be in the company of a good many experts and activists in this field and discussed the matter with them. There was general concern over the report. The fact that the proposals fit very neatly with the RIP Act - detailed logs of suspicious calls, obtained legally, could then be used as justification for invoking RIP legislation, thereby bypassing the safeguards - is enough for Caspar Bowden (Director, Foundation for Information Policy Research) to conclude that the security services had pre-planned this approach.

Roland Perry, CEO of the London Internet Exchange, Linx, surprised us by saying he had had a copy of the report for several months. He saw the report as a speculative effort by the National Criminal Intelligence Service and not to be taken too seriously, although he did admit that the leaked version appeared final in its make-up.

Some debate concerned the suggested cost of the programme. Storage is becoming cheaper and smaller, the report said. It then gave a figure of £20,000 to £25,000 for the annual cost to a Communications Service Provider of storing the data. Quite rightly, the report pointed out that the real cost of the system comes in retrieving the information. Then, basing its calculations on the DNA Database, it suddenly came up with the figure of £9 million a year to run the whole show, with a £3 million initial infrastructure investment. This was broadly seen as conservative.

Which brings us to Conservative peer Lord Cope of Berkeley, who was responsible for getting many of the amendments for the RIP Bill through. Naturally, the dapper gent would not be drawn, suffice to say he was "concerned" and would look at the issue very closely.

Ex MI5 spook David Shayler told us that everyone in the security services would have been "aware" of what the report contained months before publication, before telling us that Brian Clough would have been a great England manager but was held back by being too northern.

Some time was given to the fact that what the report requests already happens informally with BT. BT, for some reason, keeps billing records and logs for five years, whereas nearly all other telecoms companies delete them several months or so down the line, as the data costs more than its intrinsic value to store. The long storage period was seen as a classic example of BT's lack of business sense. BT is happy however - so we were reliably informed - to allow the security services full access to this data when requested.

All that aside, the report does give a valuable insight into NCIS' mind. It sees the issue as bringing the power for it to secure evidence for prosecution up to the level of its power to make a prosecution. Thanks to RIP though, it has managed to get a large, disparate group of people together to fight such proposals, all of which will be watching the progress of the report very carefully. ®

Related Link

The report in full on Cryptome

Related Stories

Police request right to spy on every UK phone call and email
Big Brother awards rock the LSE

Top three mobile application threats

More from The Register

next story
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.