Feeds

Bizarre Tolkien-inspired GCHQ Xmas card CAN'T BE READ by us PLEBS

So El Reg brings the spooks' weird poetry to you in full, natch

Securing Web Applications Made Simple and Scalable

I have just received from the Dark Web, a samizdat copy of GCHQ’s Xmas card complete with cartoon from Chris Slane. The references (see below) provide a download of the complete Xmas card, which presumably can be printed out on cardboard in hard copy.

I think we can assume that the card is genuine as it contains the exemption notice from the FOIA regime which I came across when I sought access to an unrestricted document (“HMG IA Standard No.6: Protecting Personal Data and Managing Information Risk”).

The exemption under FOIA means that although the Xmas Card is information originated from GCHQ, posted insecurely in the ordinary post, and is clearly marked "unrestricted", the tax payer who pays for the Card cannot get a copy under FOIA (just like the HMG No 6 standard).

The card also contains a poem which is a parody of the poem which describes all 20 Rings of Power, as found in Tolkien’s book (the Lord of the Rings). The Poem goes as follows:

                    The Terror Bytes of Power

Two terabytes per day to retain all Google searches

Five keeps the content from surveillance perches

Seven for Skype when one speaks to mates

Twelve stores the traffic which flows to the States

And in the darkness where the watchers are

Few laws to obey; nor rules that bar

And for privacy let the protection die

In a secret state where the shadows lie.

In the meantime, the Advocate General (the leading legal advisor to the European Court of Justice) has asked for the European legislature to re-draft the Data Retention Directive, which calls for the retention of metadata of all electronic communications to be retained for two years, as being in breach of Article 8 of the ECHR (right to a private and family life). This, of course, has been known to most of us for ages.

However, I want you to think about the Snowden revelations and then look at what the Advocate General points out, in this regard. He says that the use of telecoms data in accordance with the Data Protection Retention Directive:

  • “may make it possible to create a both faithful and exhaustive map of a large portion of a person’s conduct strictly forming part of his private life, or even a complete and accurate picture of his private identity.”
  • “There is, moreover, an increased risk that the retained data might be used for unlawful purposes which are potentially detrimental to privacy or, more broadly, fraudulent or even malicious”.
  • “Indeed, the data are not retained by the public authorities, or even under their direct control, but by the providers of electronic communications services themselves. Nor does the Directive provide that the data must be retained in the territory of a Member State. They can therefore be accumulated at indeterminate locations in cyberspace”.

The European Union legislature:

  • “should, in particular, have provided a more precise description than ‘serious crime’ as an indication of the criminal activities which are capable of justifying access of the competent national authorities to the data collected and retained”.
  • “should have guided the Member States’ regulation of authorisation to access the data collected and retained, by limiting access, if not solely to judicial authorities, at least to independent authorities, or, failing that, by making any request for access subject to review by the judicial authorities or independent authorities and it should have required a case-by-case examination of requests for access in order to limit the data provided to what is strictly necessary”.
  • “could have been expected to lay down the principle that Member States may provide for exceptions preventing access to retained data in certain exceptional circumstances or may prescribe more stringent requirements for access in situations in which access may infringe fundamental rights guaranteed by the Charter, as in the context of the right to medical confidentiality”.
  • “should have established the principle that the authorities authorised to access the data are required, first, to erase them once their usefulness has been exhausted and, second, to notify the persons concerned of that access, at least retrospectively, after the elimination of any risk that such notification might undermine the effectiveness of the measures justifying the use of those data”.

The Advocate General has not found, “in the various views submitted to the Court of Justice defending the proportionality of the data retention period, any sufficient justification for not limiting the data retention period to be established by the Member States to less than one year” (AG emphasis).

So it looks as if the year is ending on a powerful note for those who think that privacy needs an uplift in data protection; one hopes the powers that be are listening and effective changes to the protection afforded when we use the Internet will appear in the New Year.

On that optimistic note, I say have a happy holiday and recharge your batteries for what should be an eventful year. We do live in “interesting times”.

References

My run-in on S.23 for FOIA (information originating from GCHQ)

The GCHQ Xmas Card can be downloaded from the Amberhawk Training website here (PDF).

Advocate General Press Statement here

This story originally appeared at HAWKTALK, the blog of Amberhawk Training Ltd.

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.