Feeds

Home Office classes openness review a secret

Silly Season opens here

Next gen security for virtualised datacentres

It may be a little early for the silly season, but if last week’s antics by the Home Office and the Daily Mail are anything to go by, it is already upon us.

On Tuesday, the Home Office pioneered an interesting new approach to public information, by making a series of review documents available on their website – and leaving them password protected.

All too ironically, the documents catalogued “non-police power of entry” into your home, and were produced in response to a speech by Gordon Brown in October 2007, calling for greater openness in these matters. At the time, the Prime Minister expressed the view that there might be something like 250 provisions granting right of entry to an individual’s home.

However, as the Mail smugly pointed out, “there are now 1,043 laws that give the authorities the power to enter a home or business*. Nearly half have been introduced since Labour came to power 11 years ago.”

As examples of ludicrous new powers, the paper cites how officials may:

  • Invade your home to see if your pot plants have pests or do not have a 'plant passport'
  • Survey your home and garden to see if your hedge is too high
  • Seize fridges without the correct energy rating

Soon, authorities may also be able to enter your home to inspect for non-human genetic material, for looted cultural property from Iraq and for 'undeclared' carbon dioxide.

The Daily Mail’s response to what the Home Office described as an honest mistake was to call in the “computer experts” and open the documents anyway. We suspect that this required no more expertise than stripping the password out of a .pdf file.

A swift Google reveals a fair amount of software that will carry out this task – or at least claims to be able to do so. Reg readers interested in recovering “lost passwords” should check out products such as elcomsoft, PDFKey Pro or GuaPDF.

Whether it is legal to carry out such password removal – even where the document is intended for public use – is less clear.

Over the years, the Home Office website has attracted its share of criticism. On one occasion, individuals seeking to respond to the Home Office consultation on extreme pornography found their contributions bounced, because they included the word “pornography”. That’s good use of blocking software, almost on a par with the direct marketing company that invented its own processes for handling rude words, and rejected all addresses containing the word sex.

Readers in Sussex, Middlesex, etc. will instantly spot the flaw in that algorithm.

However, to be fair to the Home Office, there is no evidence that it is any worse than any other government department in this respect. The end of summer term in Parliament is the time for sneaking out as much embarrassing news as possible, in the sure knowledge that parliamentary scrutiny will be at a minimum.

No doubt, in the enthusiasm for getting the news out, someone left a file password-protected. It was unintentional, and readers wishing to catch up on the original release may now do so, without need for any additional hacking skills. ®

* Not so - the documents actually reveal 295 Acts, plus a hodge-podge of Statutory Instruments. These in turn add up to about 1,000 powers.

The essential guide to IT transformation

More from The Register

next story
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Redmond resists order to hand over overseas email
Court wanted peek as related to US investigation
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?