Over 90% of UK Police Requests to Access Calls & Emails Are Granted

f56da69c-3e3a-43b0-9523-c7a9a6e02368-1020x612.jpeg?w=700&q=85&auto=format&sharp=10&s=6a6bad4037fa5b64638c92f82090cd6c

The investigatory powers bill aims to strengthen police powers to intercept calls, messages and communications data.

Ministers are facing calls to curb the scale of police access to private phone and email records, after a report by privacy campaigners found officers were making a request every two minutes and getting access in 93% of cases.

The figures, released to Big Brother Watch under freedom of information laws, found there were more than 730,000 requests for communications data between 2012 and 2014 from forces across the UK. There were annual increases in applications in each of those years, peaking at just under 250,000 last year, according to the report.
It also uncovered a huge disparity in how many requests were being allowed by each force, with some, such as Essex, rejecting 28% of requests but others, such as Cheshire, turning down only 0.1%.
The report comes at a sensitive time for the government, which is sitting on an official report about surveillance powers by David Anderson QC, who has warned that it “won’t please everybody”.
At the same time, Theresa May, the Home Secretary, is seeking to revive legislation that would give the security services and police extra surveillance powers, including strengthening the warranted powers of police and spies to intercept the content of calls and messages as well as communications data.
Critics of proposals for the new investigatory powers bill – unveiled in the Queen’s speech – say there is already too much information gathered on the activities of citizens and insufficient transparency about whose information is accessed, what kinds of cases the data relates to and how each request is approved.
In light of the Big Brother Watch report, David Davis, a Conservative former shadow home secretary, said the scale of police access to communications data was “out of control” and called for officers to get approval from a judge before accessing the information.
“Before we make any further changes to the law, we need to understand it and we need to get it back under control, which means a better warrant system or judicial approval system,” he said.
Davis also said the “astonishing range” of rejection rates – from 0.1% to 28% – suggests there is something wrong with the way requests are being handled. He said it was already a “disgrace” that there was not more information on how the police are using private data, saying there was “overwhelmingly a case for massively more transparency in this area”.
“The government’s primary argument for extending the ability to collect communications data is that somehow there is a shortfall,” he said. “But they refuse to provide the information that would prove or disprove their case.”

Tom Watson, Deputy Leader of the Labour Party, said: “Our intelligence and police services remain in danger of losing public legitimacy for the surveillance they conduct.
“It’s absolutely vital that people understand for what reason this information is requested so frequently. Of course, there has to be secrecy about the nature of the intelligence but it is not unreasonable for public policymakers to know the terms on which these investigations are undertaken,” he said.

The government is bracing itself for a battle over civil liberties in the next few years, as May makes the case for more powers for the security services and police to access private communications data and intercept the contents of messages.
The legislation, formerly known as the communications data bill, was previously blocked by the Liberal Democrats in 2013 at a time of renewed scrutiny of the intelligence services over the revelations of US whistleblower Edward Snowden.

May has sought to justify the revival of the surveillance bill by saying police forces and the security agencies have a gap in their capabilities because their current powers do not allow them to access certain new technologies.
However, Renate Samson, chief executive of Big Brother Watch, said the tiny rate of rejections raised questions about the claim that police forces are being frustrated in their quest for information.
“Modern policing and the use of technology in investigating crime should be more transparent,” Samson said. “We are repeatedly told that communications data plays a significant role in modern policing, yet the report’s findings pose serious questions about the internal approval process, which differs from force to force.
“With police forces making over 730,000 requests for communications data in the past three years, political mutterings of diminishing access to our communications are clearly overstated. If greater access to our communications is to be granted, increased transparency and independent judicial approval should be introduced as standard.
“Until these safeguards exist, the public will have little confidence that the powers to access their communications are being used only when it is truly necessary and proportionate.”

The group’s report made five policy suggestions, including the introduction of judicial approval for all requests, a revised definition of what constitutes “communications data”, standardised procedures for making requests for all forces and telecoms companies, and making police forces produce “transparency reports” about how they make requests.
Communications data is defined by Big Brother Watch as “the who, where and when of any text, email, phone call or web search”.
A “designated person” – who must not be involved in the investigation and who must have a working knowledge of human rights legislation – is approved to access those details.
Currently, the police and security services generally require approval from a secretary of state when they want to intercept the contents of communications.

Sir Anthony May, the interception of communications commissioner, reported this year that the intelligence agencies and all other authorities collectively had permission to look at communications data more than half a million times in 2014, but he dismissed claims that there was any “significant institutional overuse of communications data powers”.
However, he did say: “A proportion of the applications did not adequately deal with the question of necessity or proportionality. There were some examples where the powers had been used improperly or unnecessarily.”
This included “breaches” in the way legally privileged material – private conversations between lawyers and their clients – had been handled by the various agencies.

Responding to the report, a Home Office spokesman said: “It is absolutely vital that our police and security services are able to obtain communications data in certain, limited circumstances, to protect the public and ensure national security.
“This information helps to disrupt terrorist plots, smash criminal networks and keep us safe, and it is a government priority to ensure our legislation is updated to deal with changing threats and evolving technologies.”
Chief Supt. Stephen Graham, head of the West Midlands Police intelligence department, said: “Mobile phones now play a vital role in the investigation of crimes and help to locate missing people or in cases where we have threats to life.
“The application to obtain these details is subject to guidance and strict codes of practice. All police forces are regularly and rigorously inspected by an independent body on the way in which we use this tactic.
“The information gives details of when a call was made and which phone number was called. It may also give details of the location of the people making and receiving the call but would not include what they say or what data they pass on within a communication – including text, audio and video.
“People may think that it is an extension of police powers when all it is doing is giving us the ability to do what we already do.”
Guardian: http://bit.ly/1FJY4yl

 

« Cyber Threat: First Data Theft - Next Data Manipulation
Tor Gets Help to Anonymise Users of 'dark web' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

Kirkland & Ellis

Kirkland & Ellis

Kirkland & Ellis LLP is an international law firm with offices in the USA, Europe and Asia. Practice areas include Data Security & Privacy.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

Global Station for Big Data & Cybersecurity (GSB)

Global Station for Big Data & Cybersecurity (GSB)

GSB is an interdisciplinary research hub to cover big data, information networks, and cybersecurity.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Cybero

Cybero

Cybero offers professional corporate cybersecurity training tailored to your business requirements.

Knowledge Transfer Network (KTN)

Knowledge Transfer Network (KTN)

KTN links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

Resillion

Resillion

Resillion (formerly Eurofins Digital Testing) is a global leader in quality engineering and cyber security services with operations in Europe, US, UK, India and China.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.