Feeds

UK.gov plans net surveillance by 2015

Snoop schedule

Intelligent flash storage arrays

Government measures to massively increase surveillance of the internet will be in place within five years.

In its departmental business plan, published today, the Home Office said it aims that "key proposals [will be] implemented for the storage and acquisition of internet and e-mail records" by June 2015.

The plan is the latest incarnation of the Interception Modernisation Programme (IMP), a much-delayed initiative, backed by the intelligence agencies, to capture details of who contacts whom, when and where*, online.

The Labour government shelved IMP before the election, but it has been revived by the coalition, despite a promise to "end the storage of internet and email records without good reason".

Confusingly, today's Home Office document says it will "end the storage of internet and email records without good reason" via "proposals for the storage and acquisition of internet and email records".

It also pledges to introduce legislation "if necessary". While in opposition the security minister, Baroness Neville-Jones, sharply criticised any move to gather more communications data without primary legislation.

The government has said it will give details of its proposals before the end of this year. It is currently unclear whether it will retain the IMP label, but the aims of the programme are unchanged.

At Prime Minister's Questions recently, David Cameron said: "We are not considering a central government database to store all communications information, and we shall be working with the Information Commissioner's Office on anything we do in that area."

When Labour held a consultation on IMP it was not proposing a central database, but measures to compel ISPs to intercept and store communications data on behalf of the intelligence services and police. ®

*Communications data does not include the content of communications, which authorities require a warrant from the Home Secretary to access. Senior intelligence and police officers can authorise access to communications data themselves.

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.