British Police Want Access to UK's Entire Web Browsing History

Police access to Web browsing histories is likely to drive the increased use of Tor and VPN

British police have demanded to be given access to the whole of the public's web-browsing history as part of the proposed new Investigatory Powers Bill.

The government has been lobbied by senior police officers to include in its new surveillance legislation a requirement for service providers to retain a greater range of data, including weblog data, which police would be able to access for investigative purposes.

The retention of such connection records, or weblogs, was included within the Draft Communications Data Bill in 2012, garnering it the epithet of Snoopers' Charter, before it was torpedoed by the Liberal Democrats in the coalition government.
The Times stated that the police "would not have access to the content of Internet searches and social media messaging without judicial approval." However, records would be collected on which sites Britons had visited – although not beyond the root directory. "We didn't read books over the telephone, but as an entirely accidental by-product of communications technology, our reading habits are now trackable."

An unnamed senior officer told The Times that the capability was "about everyday investigation rather than surveillance", while Richard Berry, spokesperson for the National Police Chiefs' Council on data communications issues, claimed that law enforcement was "not looking for anything beyond what they were traditionally able to access via telephone records."
However, the degree to which traditional copper-wire communications may be compared with those taking place through the Internet is strongly contested by privacy advocates. Jim Killock, executive director of the Open Rights Group (ORG), said: "Our web browsing histories can reveal very personal details about our lives, such as our political views, sexuality and health concerns. It is highly intrusive for this data to be retained just in case we commit a crime in the future. Surveillance should be targeted at those who are under suspicion of committing a crime."

Retention of weblog data has additionally been described as "perhaps the most contentious and confused aspect of communications data retention" by Graham Smith, an expert in IT law and partner at Bird & Bird. Smith told The Register that the powers the police have been reported to be seeking are equivalent to recording "every magazine you've read, but not which articles on which pages" and noted the Home Office's definition of weblog data, as provided to David Anderson QC, the UK's independent reviewer of terrorism legislation:

Weblogs are a record of the interaction that a user of the Internet has with other computers connected to the Internet. This will include websites visited up to the first ‘/’ of its [urls], but not a detailed record of all web pages that a user has accessed. This record will contain times of contacts and the addresses of the other computers or services with which contact occurred. 
Smith noted how Anderson recognised in his review that even limited in this way, weblogs could still "reveal, as critics of the proposal point out, that a user has visited a pornography site, or a site for sufferers of a particular medical condition, though the Home Office tell me that it is in practice very difficult to piece together a browsing history."

The ORG's Killock concurred, noting that "by looking at someone's web browsing history, you can build a much more detailed and intimate picture of someone's life. It can reveal political interests, who you bank with, whether you have children, your sexual interests, where you live, where you travel to and so on."
Berry explained the police's desire to The Times by saying "We want to police by consent, and we want to ensure that privacy safeguards are in place. But we need to balance this with the needs of the vulnerable and the victims."

The Register: https://t.co/60pP77smHx

 

 

« A Threat No One Is Talking About - Attack On the Power Grid
Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

Hyperwise Ventures

Hyperwise Ventures

Hyperwise Ventures lead seed investments in startups in the cyber security and enterprise software spaces.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

2021.AI

2021.AI

2021.AI serves the growing business need for full oversight and management of applied AI.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.

InterSources

InterSources

InterSources is a trusted partner, leading the way in Cloud Security, Cybersecurity, PLG Consulting, Digital Transformation, and Professional Services.

UKON

UKON

UKON is the free cyber insurance marketplace for MSPs, agencies and partners to turn risk into revenue.