Feeds

World leaders use terror card to watch all of us. Forever

Not a G8 idea, say privacy advocates

  • alert
  • submit to reddit

High performance access to file storage

Pronouncements from this week's G8 Justice and Interior Ministers meeting about data protection and the retention of Internet traffic data have created concern among privacy activists.

Controversy centres around whether blanket retention of traffic data on the entire population should be permitted (effectively making every Internet user susceptible to continuous surveillance of their online activity), or whether data should only be recorded on specifically designated targets or groups. Although the G8 refers to September 11 and terrorism as justification for data retention, there is no proposal to limit the use of data to terrorist cases.

Influential IT think tank, the Foundation for Information Policy Research (FIPR), notes that statements from the G8 parallel controversy on the new EU Communications Privacy Directive.

A policy document from the G8 states: "To the extent that data protection legislation continues to permit the retention of data only for billing purposes, such a position would overlook crucial legitimate societal interests - particularly when applied to the Internet service provider area, where flat rate pricing and free Internet and E-mail services foreclose the need to retain traffic data for billing purposes - and thereby seriously hamper public safety."

"The G8 also believes that when data protection legislation allows specific derogation to the general regime on specific grounds, this should not be the exclusive means for recognizing these other interests, since the default rule would continue to require destruction."

G8 ministers do recognise economic implications to the collection and retention of data, and note privacy concerns, but are pushing governments to move towards the blanket retention of data, with ISP logs been of particular interest.

Critics of this approach, like the FIPR, argue that putting an entire population under computerised surveillance is incompatible with human rights in a democratic society, and question whether such measures will prove effective in preventing terrorism.

It proposes a new type of data preservation order, judicially authorised case-by-case, which could require ISPs to perform detailed logging and preservation of specific traffic data on specified targets, only for the same purposes as interception. ®

External Links

Background documents on the G8 Ministers of Justice and Interior meeting in Mont-Tremblant, Quebec, Canada this week
G8 calls for widespread data retention (along the lines of the Council of Europe Cybercrime treaty
-Vs-
FIPR's position on data retention

SANS - Survey on application security programs

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.