British Police Lose Phone & Web Search Powers

Senior British police officers are to lose the power that allows them to self-authorise access to personal phones, and web browsing records under a series of late changes to the Investigatory Powers Act, or so called  'snooper’s charter' law, proposed by UK ministers in an attempt to comply with a European court ruling on Britain’s mass surveillance powers.
 
A Home Office consultation paper published on 30th November, also makes clear that the 250,000 requests each year for access to personal communications data by the police and other public bodies will in future be restricted to investigations into crimes that carry a prison sentence of at least six months.
 
But the government says the 2016 European court of justice (ECJ) ruling in a case brought by Labour’s deputy leader, Tom Watson, initially with David Davis, now the Brexit secretary, does not apply to the “retention or acquisition” of personal phone, email, web history or other communications data by national security organisations such as GCHQ, MI6 or MI5, “as national security is outside the scope of EU law”.
 
The new safeguards involve fresh amendments to the Investigatory Powers Act, described as the snooper’s charter, and follow the ECJ ruling, which said the “general and indiscriminate retention” of personal communications data “cannot be considered justified within a democratic society”. 
 
The European judges ruled that such mass harvesting of personal communications data could only be considered lawful if accompanied by strong safeguards including judicial or independent authorisation and only with the objective of fighting serious crime including terrorism. 
 
Davis, before withdrawing from the case when he became a minister, argued that the government’s approach to collecting communications and other personal digital data amounted to “treating the entire nation as suspects”.  However, Watson said the Home Office concessions were flawed and did not go far enough. “The current legislation fails to protect people’s fundamental rights or respect the rule of law. That’s what my legal challenge proved and I’m glad Amber Rudd is making significant concessions today. But I will be asking the court to go further, because today’s proposals from the Home Office are still flawed. “Ministers aren’t above the law – they don’t get to pick and choose which rights violations they address and they can’t haggle with the courts to avoid properly protecting people’s freedom. All of the fundamental safeguards demanded by the court must now be implemented.”
 
Communications data covers the who, where, when, how and with whom of a phone call, text, email or web page visit but does not cover the content of those exchanges, which is covered separately by interception laws that require ministerial authorisation.
 
The proposed safeguards, which are the subject of a seven-week consultation, include:
 
• Communications data requests to be authorised by a new body, the Office for Communications Data Authorisation, under the investigatory powers commissioner, Lord Justice Fulford. They are currently authorised by police officers, at the level of superintendent or inspector, and by senior officers in Border Force, the Department for Work and Pensions and HM Revenue & Customs.
• Restricting the use of communications data to investigations of serious crime but using an offence carrying a six-month prison sentence rather than the usual three-year threshold so that offences such as stalking and grooming are not excluded. In the case of internet connection records – tracking personal web browsing histories – the threshold remains at 12 months.
• Additional safeguards that must be taken into account before a “data retention order” can be issued to a phone or postal operator.
• The retention or acquisition of communications data will no longer be allowed for public health, tax collection or to regulate the financial markets.
• Mandatory guidance on the protection of retained data in line with European data protection standards.
 
The security minister, Ben Wallace, said communications data was used in the vast majority of serious and organised crime prosecutions and had been used in every major security services counter-terrorism investigation over the past decade and its importance could not be overstated. “For example, it is often the only way to identify paedophiles involved in online child abuse and can be used to identify where and when these horrendous crimes have taken place,” he said.
 
But Liberty, the UK human rights organisation, called the concessions “half-baked”. “This is window dressing for indiscriminate surveillance of the public, when ministers should be getting on with changing the law,” said Silkie Carlo, Liberty’s senior advocacy officer.“We warned the government from the start that the authoritarian surveillance powers in the Investigatory Powers Act were unlawful. It should be a source of deep embarrassment that, less than a year after it passed, ministers have had to launch a public consultation asking for help to make it comply with people’s basic rights.”
 
Guardian:
 
You Might Also Read:
 
Big Data And Policing:
 
UK Deal With EU On Post-Brexit Data Sharing:
 
UK Proposes Online Surveillance In Real-Time:
 
 
 
« NSA Employee Pleads Guilty To Stealing Classified Information
UK Drone ‘pilots’ Must Pass Safety Tests »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NextPlane

NextPlane

NextPlane provide secure real-time B2B unified communication and collaboration solutions within and across business systems.

National Crime Agency (NCA)

National Crime Agency (NCA)

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

Ekran System

Ekran System

Ekran System is an advanced insider threat detection solution for companies of any size.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

VikingCloud

VikingCloud

VikingCloud (formerly Sysnet Global Solutions) offers organizations an integrated cybersecurity and compliance solution to make informed, predictive, and cost-effective risk mitigation and prevention

Fortiedge

Fortiedge

Fortiedge is an IT Security solution provider specializing in Cyber Security practices and solutions for our clients.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.

PointWire

PointWire

PointWire offers a range of cybersecurity solutions and services including Penetration Testing on various levels, as well as Intrusion Detection and Prevention Systems.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.

Network Coverage

Network Coverage

Network Coverage align, maintain, and integrate technology and cloud solutions with business operations to improve productivity and security with as few issues and disruptions as possible.