British Police Want Access to UK's Entire Web Browsing History

Police access to Web browsing histories is likely to drive the increased use of Tor and VPN

British police have demanded to be given access to the whole of the public's web-browsing history as part of the proposed new Investigatory Powers Bill.

The government has been lobbied by senior police officers to include in its new surveillance legislation a requirement for service providers to retain a greater range of data, including weblog data, which police would be able to access for investigative purposes.

The retention of such connection records, or weblogs, was included within the Draft Communications Data Bill in 2012, garnering it the epithet of Snoopers' Charter, before it was torpedoed by the Liberal Democrats in the coalition government.
The Times stated that the police "would not have access to the content of Internet searches and social media messaging without judicial approval." However, records would be collected on which sites Britons had visited – although not beyond the root directory. "We didn't read books over the telephone, but as an entirely accidental by-product of communications technology, our reading habits are now trackable."

An unnamed senior officer told The Times that the capability was "about everyday investigation rather than surveillance", while Richard Berry, spokesperson for the National Police Chiefs' Council on data communications issues, claimed that law enforcement was "not looking for anything beyond what they were traditionally able to access via telephone records."
However, the degree to which traditional copper-wire communications may be compared with those taking place through the Internet is strongly contested by privacy advocates. Jim Killock, executive director of the Open Rights Group (ORG), said: "Our web browsing histories can reveal very personal details about our lives, such as our political views, sexuality and health concerns. It is highly intrusive for this data to be retained just in case we commit a crime in the future. Surveillance should be targeted at those who are under suspicion of committing a crime."

Retention of weblog data has additionally been described as "perhaps the most contentious and confused aspect of communications data retention" by Graham Smith, an expert in IT law and partner at Bird & Bird. Smith told The Register that the powers the police have been reported to be seeking are equivalent to recording "every magazine you've read, but not which articles on which pages" and noted the Home Office's definition of weblog data, as provided to David Anderson QC, the UK's independent reviewer of terrorism legislation:

Weblogs are a record of the interaction that a user of the Internet has with other computers connected to the Internet. This will include websites visited up to the first ‘/’ of its [urls], but not a detailed record of all web pages that a user has accessed. This record will contain times of contacts and the addresses of the other computers or services with which contact occurred. 
Smith noted how Anderson recognised in his review that even limited in this way, weblogs could still "reveal, as critics of the proposal point out, that a user has visited a pornography site, or a site for sufferers of a particular medical condition, though the Home Office tell me that it is in practice very difficult to piece together a browsing history."

The ORG's Killock concurred, noting that "by looking at someone's web browsing history, you can build a much more detailed and intimate picture of someone's life. It can reveal political interests, who you bank with, whether you have children, your sexual interests, where you live, where you travel to and so on."
Berry explained the police's desire to The Times by saying "We want to police by consent, and we want to ensure that privacy safeguards are in place. But we need to balance this with the needs of the vulnerable and the victims."

The Register: https://t.co/60pP77smHx

 

 

« A Threat No One Is Talking About - Attack On the Power Grid
Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

Riverside Research

Riverside Research

Riverside Research is a not-for-profit organization chartered to advance scientific research in areas including Trusted & Resilient Systems.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

Blockchain Reactor

Blockchain Reactor

Blockchain Reactor is a blockchain consultancy and implementation company providing cutting-edge blockchain solutions for start-ups and enterprises.

Jump Capital

Jump Capital

Jump provides series A and B capital to data-driven tech companies within the FinTech, IT & Data Infrastructure, B2B SaaS and Media sectors.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

Gatefy

Gatefy

Getfy is a cybersecurity company specialized in artificial intelligence and machine learning. We work to solve challenging issues, especially those involving email security.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

BBS Technology

BBS Technology

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide.

Invisinet Technologies

Invisinet Technologies

Invisinet is a cybersecurity technology company specializing in innovative solutions that protect network infrastructure and critical assets from advanced threats.