UK Forced To Backtrack on Internet ‘snooping’

 

Highly controversial plans to allow the police and security services full access to everyone’s internet browsing history have been abandoned by ministers in what is being presented as a dramatic climb-down over online surveillance.

Amid fears in government that it would be unable to force new laws through parliament because of concerns over civil liberties, the Home Office said it had dropped several contentious proposals from the investigatory powers bill, which will be published in draft form on Wednesday.

Ministers announced in the Queen’s speech in May that the bill would aim “to maintain the ability of intelligence agencies and law enforcement to target online communications of terrorists, paedophiles and other serious criminals”. Downing Street said at the time that it would provide the authorities “with the tools to keep you and your family safe”.

But in an unexpected move that will be seen as a blow to home secretary Theresa May, government sources said they had “dropped completely” key elements of their original 2012 proposals, dubbed the “snooper’s charter” and blocked during the coalition by Nick Clegg.

In a statement, senior sources said that rather than increasing intrusive surveillance, the bill would bar police and security services from accessing people’s browsing histories – a power demanded by the security services – and that “any access to internet connection records will be strictly limited and targeted”.

They also revealed that ministers had ruled out plans to restrict or ban companies from encrypting material on the Internet that had alarmed privacy and technology campaigners. In what they said was a further change, ministers would not, as they had previously suggested, demand that UK communication service providers (CSPs) should capture and store internet traffic from companies based in the United States.

A government source said: “We’re absolutely clear that key parts of the original plans from 2012 will be dropped from the new bill. We have consulted widely … we are coming forward with a new approach.
“We know these powers are needed as technology changes and terrorists and criminals use ever more sophisticated ways to communicate. But we need to give people the reassurance that not only are they needed, but that they are only ever used in a necessary, proportionate and accountable way. That is what this bill is all about.”

The move, which Downing Street insisted had been agreed between the prime minister and home secretary following extensive consultation, was welcomed as a significant change by former Tory leadership contender and leading campaigner for civil liberties David Davis.
“This is a welcome recognition that some of the previous proposals were both spectacularly impractical and to a large extent ignored the rights of individual citizens,” he said.
“Taken at face value, this new approach by the government suggests it has learned from the important and balanced reports by David Anderson and to a lesser extent the intelligence and security committee.”

However Shami Chakrabarti, director of civil rights group Liberty, claimed that the self-proclaimed climb-down was mere spin. She suggested the government had ignored the most important safeguard, for any interception to take place only after judicial authorisation had been given.
 “It’s a traditional Home Office dance first to ask for the most outrageous, even impractical, powers, so that the smallest so-called ‘concessions’ seem more reasonable,” she said. “The frantic spinning distracts from the sleight of hand. Where is the judicial sign-off before our private communications can be collected, hacked and tapped? Where is the move back to targeted surveillance and away from the blanket collection of our private data?”
Senior Tories said ministers – bruised by last week’s defeat in the House of Lords over tax credits – feared the plans would face fierce and prolonged opposition in the Lords if the powers were seen to be too draconian. Some Tory MPs would also have rebelled, putting the government’s slim majority in danger in the Commons.

Dr Simon Moores, an IT consultant who was a critic of the previous government’s attempts to increase interception powers, gave a cautious welcome. “There was a fear that the government, in its pursuit of terrorism, might remove those freedoms and principles that people associate with the internet,” Moores explained.
 “We all thought they were going to clamp down and introduce the most restrictive environment. But the government has said ‘we’re not going to do this; we’re not going to store your web browsing history. In fact we’re going to offer a level of oversight.’

After what we’ve heard recently from the government surrounding encryption, web history, browsing and storing of data, this smacks of common sense. In this case, the threatened regulatory powers around encryption and monitoring of traffic across international networks – the forte of GCHQ – have evaporated. It’s a very positive step.
“I’m very, very encouraged to see the mention of judicial oversight in terms of being able to restrict the powers given to the intelligence agencies. This smacks of a post-Snowden era. But the final judgment has to be about what that level of oversight this will be. It is somewhat woolly.”

Guardian:http://http://bit.ly/1MbXpw1

U.S. CISA Cybersecurity Bill Passes Senate: http://ow.ly/U85r3

 

 

« EU Will Fund Car, Hospital & Airport IT Security
Stolen Credit Card Details Cost £1 Online »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

Inspirria Cloudtech

Inspirria Cloudtech

Inspirria Cloudtech is a specialized Cloud Technologies Services provider and Cloud Aggregator focused on executing cloud models for clients.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Topsec Cloud Solutions

Topsec Cloud Solutions

The Topsec Managed Email Security Platform eliminates Spam, Viruses, Malware, and Phishing.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.