Over 90% of UK Police Requests to Access Calls & Emails Are Granted

f56da69c-3e3a-43b0-9523-c7a9a6e02368-1020x612.jpeg?w=700&q=85&auto=format&sharp=10&s=6a6bad4037fa5b64638c92f82090cd6c

The investigatory powers bill aims to strengthen police powers to intercept calls, messages and communications data.

Ministers are facing calls to curb the scale of police access to private phone and email records, after a report by privacy campaigners found officers were making a request every two minutes and getting access in 93% of cases.

The figures, released to Big Brother Watch under freedom of information laws, found there were more than 730,000 requests for communications data between 2012 and 2014 from forces across the UK. There were annual increases in applications in each of those years, peaking at just under 250,000 last year, according to the report.
It also uncovered a huge disparity in how many requests were being allowed by each force, with some, such as Essex, rejecting 28% of requests but others, such as Cheshire, turning down only 0.1%.
The report comes at a sensitive time for the government, which is sitting on an official report about surveillance powers by David Anderson QC, who has warned that it “won’t please everybody”.
At the same time, Theresa May, the Home Secretary, is seeking to revive legislation that would give the security services and police extra surveillance powers, including strengthening the warranted powers of police and spies to intercept the content of calls and messages as well as communications data.
Critics of proposals for the new investigatory powers bill – unveiled in the Queen’s speech – say there is already too much information gathered on the activities of citizens and insufficient transparency about whose information is accessed, what kinds of cases the data relates to and how each request is approved.
In light of the Big Brother Watch report, David Davis, a Conservative former shadow home secretary, said the scale of police access to communications data was “out of control” and called for officers to get approval from a judge before accessing the information.
“Before we make any further changes to the law, we need to understand it and we need to get it back under control, which means a better warrant system or judicial approval system,” he said.
Davis also said the “astonishing range” of rejection rates – from 0.1% to 28% – suggests there is something wrong with the way requests are being handled. He said it was already a “disgrace” that there was not more information on how the police are using private data, saying there was “overwhelmingly a case for massively more transparency in this area”.
“The government’s primary argument for extending the ability to collect communications data is that somehow there is a shortfall,” he said. “But they refuse to provide the information that would prove or disprove their case.”

Tom Watson, Deputy Leader of the Labour Party, said: “Our intelligence and police services remain in danger of losing public legitimacy for the surveillance they conduct.
“It’s absolutely vital that people understand for what reason this information is requested so frequently. Of course, there has to be secrecy about the nature of the intelligence but it is not unreasonable for public policymakers to know the terms on which these investigations are undertaken,” he said.

The government is bracing itself for a battle over civil liberties in the next few years, as May makes the case for more powers for the security services and police to access private communications data and intercept the contents of messages.
The legislation, formerly known as the communications data bill, was previously blocked by the Liberal Democrats in 2013 at a time of renewed scrutiny of the intelligence services over the revelations of US whistleblower Edward Snowden.

May has sought to justify the revival of the surveillance bill by saying police forces and the security agencies have a gap in their capabilities because their current powers do not allow them to access certain new technologies.
However, Renate Samson, chief executive of Big Brother Watch, said the tiny rate of rejections raised questions about the claim that police forces are being frustrated in their quest for information.
“Modern policing and the use of technology in investigating crime should be more transparent,” Samson said. “We are repeatedly told that communications data plays a significant role in modern policing, yet the report’s findings pose serious questions about the internal approval process, which differs from force to force.
“With police forces making over 730,000 requests for communications data in the past three years, political mutterings of diminishing access to our communications are clearly overstated. If greater access to our communications is to be granted, increased transparency and independent judicial approval should be introduced as standard.
“Until these safeguards exist, the public will have little confidence that the powers to access their communications are being used only when it is truly necessary and proportionate.”

The group’s report made five policy suggestions, including the introduction of judicial approval for all requests, a revised definition of what constitutes “communications data”, standardised procedures for making requests for all forces and telecoms companies, and making police forces produce “transparency reports” about how they make requests.
Communications data is defined by Big Brother Watch as “the who, where and when of any text, email, phone call or web search”.
A “designated person” – who must not be involved in the investigation and who must have a working knowledge of human rights legislation – is approved to access those details.
Currently, the police and security services generally require approval from a secretary of state when they want to intercept the contents of communications.

Sir Anthony May, the interception of communications commissioner, reported this year that the intelligence agencies and all other authorities collectively had permission to look at communications data more than half a million times in 2014, but he dismissed claims that there was any “significant institutional overuse of communications data powers”.
However, he did say: “A proportion of the applications did not adequately deal with the question of necessity or proportionality. There were some examples where the powers had been used improperly or unnecessarily.”
This included “breaches” in the way legally privileged material – private conversations between lawyers and their clients – had been handled by the various agencies.

Responding to the report, a Home Office spokesman said: “It is absolutely vital that our police and security services are able to obtain communications data in certain, limited circumstances, to protect the public and ensure national security.
“This information helps to disrupt terrorist plots, smash criminal networks and keep us safe, and it is a government priority to ensure our legislation is updated to deal with changing threats and evolving technologies.”
Chief Supt. Stephen Graham, head of the West Midlands Police intelligence department, said: “Mobile phones now play a vital role in the investigation of crimes and help to locate missing people or in cases where we have threats to life.
“The application to obtain these details is subject to guidance and strict codes of practice. All police forces are regularly and rigorously inspected by an independent body on the way in which we use this tactic.
“The information gives details of when a call was made and which phone number was called. It may also give details of the location of the people making and receiving the call but would not include what they say or what data they pass on within a communication – including text, audio and video.
“People may think that it is an extension of police powers when all it is doing is giving us the ability to do what we already do.”
Guardian: http://bit.ly/1FJY4yl

 

« Cyber Threat: First Data Theft - Next Data Manipulation
Tor Gets Help to Anonymise Users of 'dark web' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

Argus Cyber Security

Argus Cyber Security

Argus is the world’s largest automotive cyber security company, protecting connected cars and commercial vehicles from hacking.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

National Cyber Security Agency (NACSA) Malaysia

National Cyber Security Agency (NACSA) Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

Optra Security

Optra Security

Optra Security specializes in information security with a focus on Application Security.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

Atlas Cloud

Atlas Cloud

Atlas Cloud is a UK-wide provider of managed services based in Newcastle. Our ‘research-led’ approach to IT services helps leaders make better decisions about IT for their businesses.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.