British Police Want Access to UK's Entire Web Browsing History

Police access to Web browsing histories is likely to drive the increased use of Tor and VPN

British police have demanded to be given access to the whole of the public's web-browsing history as part of the proposed new Investigatory Powers Bill.

The government has been lobbied by senior police officers to include in its new surveillance legislation a requirement for service providers to retain a greater range of data, including weblog data, which police would be able to access for investigative purposes.

The retention of such connection records, or weblogs, was included within the Draft Communications Data Bill in 2012, garnering it the epithet of Snoopers' Charter, before it was torpedoed by the Liberal Democrats in the coalition government.
The Times stated that the police "would not have access to the content of Internet searches and social media messaging without judicial approval." However, records would be collected on which sites Britons had visited – although not beyond the root directory. "We didn't read books over the telephone, but as an entirely accidental by-product of communications technology, our reading habits are now trackable."

An unnamed senior officer told The Times that the capability was "about everyday investigation rather than surveillance", while Richard Berry, spokesperson for the National Police Chiefs' Council on data communications issues, claimed that law enforcement was "not looking for anything beyond what they were traditionally able to access via telephone records."
However, the degree to which traditional copper-wire communications may be compared with those taking place through the Internet is strongly contested by privacy advocates. Jim Killock, executive director of the Open Rights Group (ORG), said: "Our web browsing histories can reveal very personal details about our lives, such as our political views, sexuality and health concerns. It is highly intrusive for this data to be retained just in case we commit a crime in the future. Surveillance should be targeted at those who are under suspicion of committing a crime."

Retention of weblog data has additionally been described as "perhaps the most contentious and confused aspect of communications data retention" by Graham Smith, an expert in IT law and partner at Bird & Bird. Smith told The Register that the powers the police have been reported to be seeking are equivalent to recording "every magazine you've read, but not which articles on which pages" and noted the Home Office's definition of weblog data, as provided to David Anderson QC, the UK's independent reviewer of terrorism legislation:

Weblogs are a record of the interaction that a user of the Internet has with other computers connected to the Internet. This will include websites visited up to the first ‘/’ of its [urls], but not a detailed record of all web pages that a user has accessed. This record will contain times of contacts and the addresses of the other computers or services with which contact occurred. 
Smith noted how Anderson recognised in his review that even limited in this way, weblogs could still "reveal, as critics of the proposal point out, that a user has visited a pornography site, or a site for sufferers of a particular medical condition, though the Home Office tell me that it is in practice very difficult to piece together a browsing history."

The ORG's Killock concurred, noting that "by looking at someone's web browsing history, you can build a much more detailed and intimate picture of someone's life. It can reveal political interests, who you bank with, whether you have children, your sexual interests, where you live, where you travel to and so on."
Berry explained the police's desire to The Times by saying "We want to police by consent, and we want to ensure that privacy safeguards are in place. But we need to balance this with the needs of the vulnerable and the victims."

The Register: https://t.co/60pP77smHx

 

 

« A Threat No One Is Talking About - Attack On the Power Grid
Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

AhnLab

AhnLab

AhnLab provides a range of information security solutions including network security, endpoint security, antivirus and consulting services.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

Althammer & Kill

Althammer & Kill

Althammer & Kill offers pragmatic solution concepts for data protection and digitization. We advise in the field of data protection, information security and compliance.

OpsHelm

OpsHelm

OpsHelm provides a Software-as-a-Service solution to help businesses ensure that all of their cloud environments have their security bases covered.

SyberFort

SyberFort

SyberFort offers a suite of SAAS-based platforms designed to fortify your digital defenses including Threat Intelligence and Brand Protection.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.