UK Forced To Backtrack on Internet ‘snooping’

 

Highly controversial plans to allow the police and security services full access to everyone’s internet browsing history have been abandoned by ministers in what is being presented as a dramatic climb-down over online surveillance.

Amid fears in government that it would be unable to force new laws through parliament because of concerns over civil liberties, the Home Office said it had dropped several contentious proposals from the investigatory powers bill, which will be published in draft form on Wednesday.

Ministers announced in the Queen’s speech in May that the bill would aim “to maintain the ability of intelligence agencies and law enforcement to target online communications of terrorists, paedophiles and other serious criminals”. Downing Street said at the time that it would provide the authorities “with the tools to keep you and your family safe”.

But in an unexpected move that will be seen as a blow to home secretary Theresa May, government sources said they had “dropped completely” key elements of their original 2012 proposals, dubbed the “snooper’s charter” and blocked during the coalition by Nick Clegg.

In a statement, senior sources said that rather than increasing intrusive surveillance, the bill would bar police and security services from accessing people’s browsing histories – a power demanded by the security services – and that “any access to internet connection records will be strictly limited and targeted”.

They also revealed that ministers had ruled out plans to restrict or ban companies from encrypting material on the Internet that had alarmed privacy and technology campaigners. In what they said was a further change, ministers would not, as they had previously suggested, demand that UK communication service providers (CSPs) should capture and store internet traffic from companies based in the United States.

A government source said: “We’re absolutely clear that key parts of the original plans from 2012 will be dropped from the new bill. We have consulted widely … we are coming forward with a new approach.
“We know these powers are needed as technology changes and terrorists and criminals use ever more sophisticated ways to communicate. But we need to give people the reassurance that not only are they needed, but that they are only ever used in a necessary, proportionate and accountable way. That is what this bill is all about.”

The move, which Downing Street insisted had been agreed between the prime minister and home secretary following extensive consultation, was welcomed as a significant change by former Tory leadership contender and leading campaigner for civil liberties David Davis.
“This is a welcome recognition that some of the previous proposals were both spectacularly impractical and to a large extent ignored the rights of individual citizens,” he said.
“Taken at face value, this new approach by the government suggests it has learned from the important and balanced reports by David Anderson and to a lesser extent the intelligence and security committee.”

However Shami Chakrabarti, director of civil rights group Liberty, claimed that the self-proclaimed climb-down was mere spin. She suggested the government had ignored the most important safeguard, for any interception to take place only after judicial authorisation had been given.
 “It’s a traditional Home Office dance first to ask for the most outrageous, even impractical, powers, so that the smallest so-called ‘concessions’ seem more reasonable,” she said. “The frantic spinning distracts from the sleight of hand. Where is the judicial sign-off before our private communications can be collected, hacked and tapped? Where is the move back to targeted surveillance and away from the blanket collection of our private data?”
Senior Tories said ministers – bruised by last week’s defeat in the House of Lords over tax credits – feared the plans would face fierce and prolonged opposition in the Lords if the powers were seen to be too draconian. Some Tory MPs would also have rebelled, putting the government’s slim majority in danger in the Commons.

Dr Simon Moores, an IT consultant who was a critic of the previous government’s attempts to increase interception powers, gave a cautious welcome. “There was a fear that the government, in its pursuit of terrorism, might remove those freedoms and principles that people associate with the internet,” Moores explained.
 “We all thought they were going to clamp down and introduce the most restrictive environment. But the government has said ‘we’re not going to do this; we’re not going to store your web browsing history. In fact we’re going to offer a level of oversight.’

After what we’ve heard recently from the government surrounding encryption, web history, browsing and storing of data, this smacks of common sense. In this case, the threatened regulatory powers around encryption and monitoring of traffic across international networks – the forte of GCHQ – have evaporated. It’s a very positive step.
“I’m very, very encouraged to see the mention of judicial oversight in terms of being able to restrict the powers given to the intelligence agencies. This smacks of a post-Snowden era. But the final judgment has to be about what that level of oversight this will be. It is somewhat woolly.”

Guardian:http://http://bit.ly/1MbXpw1

U.S. CISA Cybersecurity Bill Passes Senate: http://ow.ly/U85r3

 

 

« EU Will Fund Car, Hospital & Airport IT Security
Stolen Credit Card Details Cost £1 Online »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Howden Broking Group

Howden Broking Group

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

Andreessen Horowitz (a16z)

Andreessen Horowitz (a16z)

Andreessen Horowitz (known as "a16z") is a venture capital firm in Silicon Valley, California that backs bold entrepreneurs building the future through technology.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

Montreal International

Montreal International

You’re an entrepreneur planning to launch a company in an innovative sector such as AI, cybersecurity, 'deeptech' or fintech? You’ve found the right place!

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Hawk AI

Hawk AI

Hawk AI’s mission is to help financial institutions detect financial crime more effectively and efficiently using AI to enhance rules and find anomalies.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.