Feeds

Britain leads world in police state survey

Gold medals for snooping, spying and surveilling

The Power of One Infographic

A recent survey from internet security consultancy, Cryptohippie, suggests that the UK is setting the pace in at least one area - though being classified as the West’s most repressive regime when it comes to electronic surveillance might not be a title that this government is entirely happy to wear.

This result emerges from Cryptohippie’s recently published Electronic Police State 2008 (pdf). This is the first in what are intended to be a series of annual reports that will audit the "State use of electronic technologies to record, organize, search and distribute forensic evidence against its citizens".

The audit focusses on 17 factors, ranging from requirement to produce documents on demand, through to the extent to which states force ISP’s and phone companies to retain data, the blurring of boundaries between police and intelligence work and ultimately the breakdown of the principles of habeas corpus.

A simple five-point scoring system is used for each factor, with results totalled to produce an overall score. Some 52 major states are looked at, with final ranking apparently influenced by two quite different factors. On the one hand, states that are simply repressive are likely to score highly – and they do. The top four places in the survey are occupied by China, North Korea, Belarus and Russia.

However, electronic policing also requires some degree of technological sophistication – so it is not surprising to find the UK dropping in at no. 5 and the US at no. 6. France and Germany arrive a few places below that.

This result echoes warnings issued repeatedly by Lords and the Information Commissioner – most recently in an official report last month – that Britain is slowly sleepwalking toward becoming a surveillance society. Equally predictable was the government response that it takes all such criticisms seriously and needs to strike a balance.

However, as both Cryptohippie and other government critics have argued, the government response is disingenuous, relying on a rejection of straw men, rather than engaging with genuine fears.

The report expands on its subject thus: "The usual image of a "police state" includes secret police dragging people out of their homes at night, with scenes out of Nazi Germany or Stalin’s USSR. The problem with these images is that they are horribly outdated. That’s how things worked during your grandfather’s war – that is not how things work now.

"An electronic police state is quiet, even unseen. All of its legal actions are supported by abundant evidence. It looks pristine." ®

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.