British Police Want Access to UK's Entire Web Browsing History

Police access to Web browsing histories is likely to drive the increased use of Tor and VPN

British police have demanded to be given access to the whole of the public's web-browsing history as part of the proposed new Investigatory Powers Bill.

The government has been lobbied by senior police officers to include in its new surveillance legislation a requirement for service providers to retain a greater range of data, including weblog data, which police would be able to access for investigative purposes.

The retention of such connection records, or weblogs, was included within the Draft Communications Data Bill in 2012, garnering it the epithet of Snoopers' Charter, before it was torpedoed by the Liberal Democrats in the coalition government.
The Times stated that the police "would not have access to the content of Internet searches and social media messaging without judicial approval." However, records would be collected on which sites Britons had visited – although not beyond the root directory. "We didn't read books over the telephone, but as an entirely accidental by-product of communications technology, our reading habits are now trackable."

An unnamed senior officer told The Times that the capability was "about everyday investigation rather than surveillance", while Richard Berry, spokesperson for the National Police Chiefs' Council on data communications issues, claimed that law enforcement was "not looking for anything beyond what they were traditionally able to access via telephone records."
However, the degree to which traditional copper-wire communications may be compared with those taking place through the Internet is strongly contested by privacy advocates. Jim Killock, executive director of the Open Rights Group (ORG), said: "Our web browsing histories can reveal very personal details about our lives, such as our political views, sexuality and health concerns. It is highly intrusive for this data to be retained just in case we commit a crime in the future. Surveillance should be targeted at those who are under suspicion of committing a crime."

Retention of weblog data has additionally been described as "perhaps the most contentious and confused aspect of communications data retention" by Graham Smith, an expert in IT law and partner at Bird & Bird. Smith told The Register that the powers the police have been reported to be seeking are equivalent to recording "every magazine you've read, but not which articles on which pages" and noted the Home Office's definition of weblog data, as provided to David Anderson QC, the UK's independent reviewer of terrorism legislation:

Weblogs are a record of the interaction that a user of the Internet has with other computers connected to the Internet. This will include websites visited up to the first ‘/’ of its [urls], but not a detailed record of all web pages that a user has accessed. This record will contain times of contacts and the addresses of the other computers or services with which contact occurred. 
Smith noted how Anderson recognised in his review that even limited in this way, weblogs could still "reveal, as critics of the proposal point out, that a user has visited a pornography site, or a site for sufferers of a particular medical condition, though the Home Office tell me that it is in practice very difficult to piece together a browsing history."

The ORG's Killock concurred, noting that "by looking at someone's web browsing history, you can build a much more detailed and intimate picture of someone's life. It can reveal political interests, who you bank with, whether you have children, your sexual interests, where you live, where you travel to and so on."
Berry explained the police's desire to The Times by saying "We want to police by consent, and we want to ensure that privacy safeguards are in place. But we need to balance this with the needs of the vulnerable and the victims."

The Register: https://t.co/60pP77smHx

 

 

« A Threat No One Is Talking About - Attack On the Power Grid
Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Redbud

Redbud

Redbud is a specialist search and recruitment firm for Information Security professionals.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

Windscribe

Windscribe

Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.

Danish Maritime Cybersecurity Unit

Danish Maritime Cybersecurity Unit

The Danish Maritime Cybersecurity Unit is tasked with delivering the initiatives set out in the Cyber and Information Security Strategy for the Maritime Sector.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

Next Horizon

Next Horizon

In the Next Horizon incubator, new disruptive models are being developed in Industry 4.0, Automated Driving and Internet-of-Things.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Everything Blockchain

Everything Blockchain

Everything Blockchain is a development, architecture, and software designer of Blockchain that also provides services specializing in blockchain technologies and decentralized processing.

ConnectSecure

ConnectSecure

ConnectSecure (formerly CyberCNS) is a global cybersecurity company that delivers tools to identify and address vulnerabilities and manage compliance requirements.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

Oivan

Oivan

Oivan harnesses the strengths of the web, mobile, cloud, cybersecurity, and blockchain technologies to help our clients to launch transformative digital services.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.