Feeds

ISPs frosty on Jacqui's comms surveillance plan

Home Office has a lot of persuading to do

Maximizing your infrastructure through virtualization

Jacqui Smith's plan to have ISPs create an enormous federated database of all online communications is receiving a frosty reception from the industry, multiple sources have revealed.

Many internet providers are unhappy that Smith plans to order them to retain complete details of who contacts whom, when, where and how. She opened a consultation on the £2bn scheme at the end of April, replacing earlier plans to warehouse all communications data centrally.

Many in the industry are currently working on their written objections to the proposals, which are known in Whitehall as the Interception Modernisation Programme. Their cooperation will be essential if Smith is to get the project - ostensibly aimed at "maintaining capability" of authorities to access communications data - off the ground.

ISPs are worried that the Home Office does not understand the scale of the technical challenge involved in monitoring and storing data on every communication via the internet. They fear the spiralling costs associated with government IT projects and resent being forced to devote resources to the plans.

"They say that most ISPs already have the equipment in place to do this but this is just not the case," said Trefor Davies, chief technology officer of business ISP Timico.

It's understood that under the current government plans, communications data would be copied to ISP-operated databases in transit by deep packet inspection (DPI) equipment.

The devices would be installed as part of GCHQ's ongoing "Mastering the Internet" programme, a secret project revealed by The Register last month. The system could be configured remotely by eavesdroppers at the Cheltenham electronic surveillance agency, allowing them to adapt to collect data on communications via new internet applications that might emerge.

The networked databases - which officials want ISPs to process, so that an individual customer's email activity is linked to their web browsing history - would then be available to law enforcement and intelligence officers as required, without a warrant under part 1 of the Regulation of Investigatory Powers Act (RIPA).

It is not planned that the DPI "black boxes" would routinely intercept the content of communications, though theoretically the technology would be capable of such activity, if warranted by the Home Secretary under RIPA provisions that govern interception.

Industry sources - who asked not to be named because some contact with government on the project is classified - said that officials gave a poorly-received presentation on the federated storage plans, at a regular industry conference held by peering cooperative LINX last month. About 40 per cent of ISPs at the event said they did not currently have the capability to store the data.

Malcom Hutty, LINX's head of public affairs said: "The presentation raised rather more questions than it answered. We look forward to further detailed discussion with the Home Office."

Davies was more forthcoming. He said: "The industry doesn't think the Government understands the likely costs associated with this activity and the continually moving goalpost that is the internet – so the costs of maintaining this capability are likely to be large and ongoing for as long as the government wants to monitor people's activity."

According to Smith's consultation document, officials have estimated internet providers will need £2bn in taxpayer funding to store details of all communications over 10 years.

Spokespeople for large providers, which have close relations with law enforcement and intelligence because they serve the majority of requests for communications data, declined to comment on the government proposals. BT and Virgin Media, the two largest ISPs, both said they were still examining the proposals.

Orange said: "Orange wishes to ensure that any future proposals in maintaining the use of communications data in this arena are proportionate and with a legal basis and has appropriate safeguards to ensure the protection and security of our customers' data."

The communications data consultation closes on July 20, just before the summer Parliamentary recess. ®

Reducing security risks from open source software

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.