Feeds

Web snooping bill an 'odious shopping list of new gov powers'

Spooks 'looking for a pin, creating field of haystacks' says David Davis

The Essential Guide to IT Transformation

Tory backbencher David Davis has described the government's draft communications surveillance law as an "odious shopping list" of new powers demanded by the Home Office.

He told MPs and peers at a joint select committee hearing on Wednesday afternoon that UK spooks were "looking for a pin" but instead "creating a field of haystacks" by pushing through the proposals.

His comments came a day after senior officials told the committee that the Communications Data Bill, if approved by Parliament, will require the recording and storing of citizens' web activities in black boxes funded by taxpayers.

Tuesday's hearing focussed on the security services and other authorities arguing that companies which provide communications services should be able to legally retain more information on Brits to help, for example, the police crack murder cases.

Davis, however, expressed concerns about the evidence put forward by Charles Farr, who heads up the Office for Security and Counter-Terrorism, and others during that confab.

The MP also questioned the Home Office's extensive "shopping list" of "odious" reasons for needing access to retained data; the security arrangements for protecting the black boxes and their sensitive contents; how the technology will work; and who will access the records.

Davis was joined on the panel by privacy activists Nick Pickles of Big Brother Watch, Gus Hosein of Privacy International and Jim Killock of Open Rights Group, all of whom broadly agreed that a court-issued warrant-backed system would be more appropriate than the proposed warrantless web snooping.

Hosein raised a key point about Home Secretary Theresa May's proposals* by saying that up to now communications surveillance in the UK had always been about regulating access to telephone and web logs.

"Now it is about collection of information," he warned.

Hosein noted that the collection of data by ISPs through Deep Packet Inspection (DPI) probes - colloquially dubbed black boxes - had only been implemented on a national scale in China, Iran and Kazakhstan.

"The idea of a black box organised at a central level has not actually yet been done in a democratic country," he added.

Hosein also pointed out that if, by way of example, an order is placed against Google, then presumably the government is expecting that overseas company to retain communications data and subsequently disclose it on request.

He said that many communication service providers - which includes the likes of Google and Facebook - considered it a challenge to pinpoint which of its customers were based in the UK: many people can sign up to social networks, webmail and similar services without giving away their location and other personal information.

The notion of British taxpayers paying private companies to hoard communications data on behalf of the UK government was unpalatable, he added.

Further, Hosein questioned what might happen if an ISP is ordered by British spooks, police or indeed the taxman to install a DPI box containing technology of a certain specification that is kept secret from the telco.

The Privacy International man doubted that once such a probe was active on an ISP's network that those companies would then have any control over that gear.

Pickles also warned that, under the proposed law, protesters outside Parliament might, for example, be more easily rounded up and identified by police who could access the comms data sent between individuals in that area. ®

* A copy of the draft bill can be found here [PDF].

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.