Feeds

Super-snoop bid: UK government hits panic button on EU data retention ruling

'This is not mass surveillance', insists Home Sec Theresa May

Maximizing your infrastructure through virtualization

Home Secretary Theresa May has claimed "there is no surveillance state" in Britain today as she once again called for a change in law to prevent the internet becoming "an ungoverned, ungovernable space".

The Snoopers' Charter champion, speaking to dignitaries at Mansion House in London last night, did not once mention the European Union's highest court's recent ruling to rip up the Data Retention Directive - but she did allude to it.

In April, a measure that required ISPs to retain data for two years was deemed "invalid" by the EU's Court of Justice on the grounds that it interfered not only with data protection rules but also with fundamental rights to respect for private life.

The Tory-led government has expressed concern about losing those powers and is pushing once again for a change in legislation to allow spooks to massively ramp up surveillance online.

May's previous efforts to bring in a new communications data snooping law were eventually flattened by deputy Prime Minister Nick Clegg. The Liberal Democrat leader signalled last year that such a plan wouldn't happen on his watch.

The Home Sec - with less than a year to go until the General Election - is now reduced to building a case for a Snoopers' Charter, as it's colloquially known, without being able to lobby for legislation during this Parliamentary session.

Unsurprisingly then, May has become even more outspoken about surveillance. She said on Tuesday night:

The very idea that we could or would want to monitor everyone and all their communications, trawling at will through their private lives, is absurd.

Signals intelligence relies on automated and remote access to data on the internet and other communications systems. Computers search for only the communications relating to a small number of suspects under investigation. Once the content of these communications has been identified, and only then, is it is examined by a trained analysts. And every step of the way it is governed by strict rules, checked against Human Rights Act requirements.

That is not mass surveillance.

May claimed that the blistering revelations uncovered by one-time NSA sysadmin Edward Snowden - who blew the whistle on the activities of security agencies in the UK and the US - had potential risks to national security and claimed that Brits were in danger of being "misled".

"It is important that people hear the truth about each of these allegations, because we cannot afford a loss of faith in the vital work of the security and intelligence agencies, and because we need public support and public trust if we are to win the argument about capability," the Home Sec said.

Keith Bristow, the head of the National Crime Agency, told the Today programme on BBC Radio 4 this morning that he was concerned about data retention following the ECJ ruling.

"The very real risk that we face is that we won't be able to access data because it won't be retained in the first place and that's a huge concern for us. It's vital for us to keep the public safe," he said.

Bristow, by way of example, said the NCA regularly tackled paedophiles who groom young people online by "collecting the data - not the content of what they do - but with whom they communicated and from which devices. We use that data to bring those people to justice, to prevent them from doing bad things to children."

When quizzed on the discomfort Brits feel about having their material snooped on, Bristow said: "This isn't about the general public. The data is retained by communication service providers, we have to go through a rigorous regime with independent oversight from the Interception Commissioner."

But the NCA boss recognised that the ECJ decision could not be overturned. He told the Today programme that he wanted to explain to the public what the "consequences" of losing the data would be. "Ultimately it's for legislators to consider what we might do," he added.

Arguably, security agencies may not have to wait long for such a legal overhaul. The Labour Party recently indicated that it was likely to resurrect the twice-shelved reworking of existing surveillance powers to supposedly address online threats from paedophiles, extremists and terrorists, if it wins the General Election in 2015. ®

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.