27th August | |
| Youngsters need protection from child protection database
| Based on article from telegraph.co.uk
|
A flagship database intended to protect every child in the country will be used by police to hunt for evidence of crime in a "shocking" extension of its original purpose, The Daily Telegraph has learned.
ContactPoint will include the
names, ages and addresses of all 11 million under-18s in England as well as information on their parents, GPs, schools and support services such as social workers.
It has always been portrayed as a way for professionals to find out which other
agencies are working with a particular child, to make their work easier and provide a better service for young people.
However, it has now emerged that police officers, council staff, head teachers, doctors and care workers will use the records
to search for evidence of criminality and wrongdoing to help them launch prosecutions against those on the database - even long after they have reached adulthood.
The records will be updated until children turn 18 then kept in an archive for six
years before being destroyed, meaning they can be accessed until a young person reaches 24. Those who have learning difficulties or who are in care will remain on the live system until they turn 25, so their archived records will be available into their
30s.
Little-noticed guidance published by the Government discloses that ContactPoint users can request administrators to give them archived data for a number of reasons, including for the prevention or detection of crime and for the
prosecution of offenders.
ContactPoint will not include detailed case information on children, but will record if they have contact with a Youth Offending Team or sensitive services such as drug abuse workers, which critics say will
mean it is obvious which young people have criminal records.
Baroness Miller, the Liberal Democrats' home affairs spokesman in the House of Lords, said: This is truly shocking. It's exactly the definition of a police state. The police will
have the details of a whole generation for so-called crime prevention. It raises a lot of issues and we haven't had a debate in Parliament about it.
Phil Booth, national co-ordinator for the civil liberties campaign group No2ID, added: Parents should know that this is not for the protection of their children, it could be used to prosecute them. This is a serious step on from what little has been told to the public.
ContactPoint will be put into use by 17 councils in the North West in October and then rolled out across the country. Update: Delayed 31st August 2008
Now, just weeks before its planned launch and days after the Telegraph disclosed concerns that it will be used to increase the criminalisation and surveillance of England's youth, ministers have announced that ContactPoint will not become
operational until the New Year at the earliest.
The Department for Children, Schools and Families claimed that the new delay was not down to security or privacy fears, however, but simply because of "glitches" that had emerged during
testing of the system, which is being built by the IT firm CapGemini.
|
27th March | |
| Cable TV company experiments with watching who's viewing
| See full article from
New Tee Vee |
At the Digital Living Room conference, Gerard Kunkel, Comcast’s senior VP of user experience, told me the cable company is experimenting with different camera technologies built into devices so it can know who’s in your living room.
The idea
being that if you turn on your cable box, it recognizes you and pulls up shows already in your profile or makes recommendations. If parents are watching TV with their children, for example, parental controls could appear to block certain content from
appearing on the screen. Kunkel also said this type of monitoring is the “holy grail” because it could help serve up specifically tailored ads.
Kunkel said the system wouldn’t be based on facial recognition, so there wouldn’t be a picture of you
on file (we hope). Instead, it would distinguish between different members of your household by recognizing body forms. He stressed that the system is still in the experimental phase, that there hasn’t been consumer testing, and that any rollout “must
add value” to the viewing experience beyond serving ads.
I can’t trust Comcast with BitTorrent, so why should I trust them with my must-be-kept-secrets...
|
21st March | |
| BT confesses to lies over secret Phorm experiments
| See full article from
The Register See also www.badphorm.co.uk
|
BT has admitted that it secretly used customer data to test Phorm's advertising targeting technology last summer, and that it covered it up when customers and The Register raised questions over the suspicious redirects.
The national telecoms
provider now faces legal action from customers who are angry their web traffic was compromised.
Stephen Mainwaring, a BT Business customer said he suffered sleepless nights after detecting the dodgy DNS requests, and said today: It is very
likely that I and others will take legal action against BT for what they did last summer.
In a statement, BT said: We conducted a very small scale technical test of a prototype advertising platform on one exchange in June 2007. The test
was specifically conducted to evaluate the functional and technical performance of the platform. Absolutely no personally identifiable information was processed, stored or disclosed during this trial.
Speaking to El Reg on Friday, Stephen
said: If they wanted to run a trial, they should have asked. I would have told them I did not want to be part of it.
Stephen has already filed a complaint with the Information Commissioner's Office and is consulting on how to proceed
through the courts with other BT subscribers who believe their connection was subject to illegal Phorm tests.
When The Register first asked BT about its relationship with Phorm in July 2007, when it was widely known as 121Media, a firm deeply
involved in spyware. BT denied any testing and said customers whose DNS requests were being redirected must have a malware problem.
It wasn't until 14 February this year, when the deals between BT, Virgin Media and Carphone Warehouse to pimp
customer web browsing were announced, that a cover-up was revealed. BT's belated confession that it secretly used its customers' traffic to test the safety of ad targeting technology can only add to the distrust around Phorm.
As part of
its admission that it lied over the 2007 trials, BT also said it will follow Carphone Warehouse's lead and develop an opt-out that does not involve cookies and means no data will be mirrored to a profiling server, even if it is ignored.
|
21st March | |
| MI5 want to trawl Londoners Oyster Card travel records
| See full article from
Slashdot
|
The Oyster card was introduced to London's public transport users purportedly to make their lives easier. Now, British Intelligence services want some of the benefits by trawling through the travel data amassed by the card to spy on the 17 million
Britons who use it. An article from Boiled Frog from a Nation of Suspects states: Currently the security services can demand the Oyster records of specific individuals under investigation to establish where they have been, but cannot trawl the
whole database. But supporters of calls for more sharing of data argue that apparently trivial snippets — like the journeys an individual makes around the capital — could become important pieces of the jigsaw when fitted into a pattern of other publicly
held information on an individual's movements, habits, education and other personal details. That could lead, they argue, to the unmasking of otherwise undetected suspects.
|
20th March | | |
Rudd government extends staff security vetting
| See full article from News.com.au
|
More than 300 ministerial and electorate staffers have been ordered to fill in a 25-page form and attend an in-depth interview into their personal finances, drug habits and sexual history before gaining high-level security clearance.
Senior staff
say they have been told the security form is designed to protect them from blackmail. But several have told The Sunday Telegraph they were affronted at the personal information they had been forced to divulge. Friends are also interviewed, and
information about drug use and sexual history is cross-checked. Special Minister of State and Cabinet Secretary John Faulkner admitted some ministerial staff had found the form intrusive but said the clearance was necessary for those who handled
sensitive and classified material.
I'm ensuring the Government makes the obtaining of these security clearances a high priority, given the nature of the work and the sensitivity and classification of material that is handled. The higher level
of clearance is more intrusive. There were too many staff who simply didn't have security clearance under the former government. I'm keen to ensure all staff have security clearance and that ministers are aware of that responsibility.
An
Australian Federal Police source confirmed the security-clearance process requested personal details. In the interview process, they ask you about your sexual orientation and whether you've ever had a homosexual experience. They ask you how many
sexual partners you've had, whether you've cheated on your wife and about your sexual habits.
|
19th March | | |
Home Office seem worryingly supportive of phorm
| See full article from
Linx Public Affairs See also www.badphorm.co.uk
|
Laws against unauthorised wiretaps should not be used to prevent ISPs providing targetted advertising services, provided ISPs users consent and the service has the highest respect for the users’ privacy, according to a Home Office memo released to
the ukcrypto mailing list. The memo analyses the legality of Phorm and similar services in detail, and concludes with a policy statement that: The purpose of Chapter 1 of Part 1 of RIPA is not to inhibit
legitimate business practice particularly in the telecommunications sector. Where advertising services meet those high standards, it would not be in the public interest to criminalise such services or for their provision to be interpreted as criminal
conduct. The section 1 offence is not something that should inhibit the development and provision of legitimate business activity to provide targeted online advertising to the users of ISP services.
The memo’s legal analysis
also provides comfort for Phorm in three key areas. It suggests that there are arguments that Phorm’s service might not constitute an interception under RIPA: Where the provision of a targeted online advertising
service involves the content of a communication passing through a filter for analysis and held for a nominal period before being irretrievably deleted - there is an argument that the content of a communication has not been made available to a person.
It suggests that even if Phorm’s services does constitute an interception, it might still be lawful provided the ISP user consents to it, as the required consent from a web site operator might be inferred from the fact that
they’re publishing content on the public Internet A question may also arise as to whether a targeted online advertising provider has reasonable grounds for believing the host or publisher of a web page consents to
the interception for the purposes of section 3(1)(b). It may be argued that section 3(1)(b) is satisfied in such a case because the host or publisher who makes a web page available for download from a server impliedly consents to those pages being
downloaded.
It also suggests that ISPs might be able to redefine their service from being “Internet access” to “Internet access with value-added targeted advertising", and by so doing take advantage of wiretap exemptions
originally intended to protect routers and web proxies.
Regardless of the legal debate, it is highly significant that the government has decided that as a matter of public policy RIPA should not stand in the way of Phorm and similar services,
provided user consent is obtained through the ISP’s Terms and Conditions of Service. This implies that even if the legal arguments remain contested, ISP prosecution is unlikely and the government might contemplate legislative reform to clarify the legal
situation in favour of Phorm and their ISP partners. FIPR Consider Phorm to be Illegal See full article from
The Register See also Open Letter to the Information Commissioner
The Foundation for Information Policy Research (FIPR), a leading government advisory group on internet issues, has written to the Information Commissioner arguing that Phorm's ad targeting system is illegal.
In an open letter posted to the think
tank's website today, the group echoes concerns voiced by London School of Economics professor Peter Sommer that Phorm's planned partnerships with BT, Virgin Media and Carphone Warehouse are illegal under the Regulation of Investigatory Powers Act 2000
(RIPA).
The letter, signed by FIPR's top lawyer Nicholas Bohm, states: The explicit consent of a properly-informed user is necessary but not sufficient to make interception lawful.
The consent of
those who host the web pages visited by a user is also required, since they communicate their pages to the user, as is the consent of those who send email to the user, since those who host web-based email services have no authority to consent to
interception on their users' behalf.
Phorm claims that all sensitve data will not be profiled, but FIPR argues its "restricted sites" blacklist system will be ineffective because of the vast array of webmail and
social networking sites web users now visit.
Bohm uses the letter to urge the Information Commissioner, Richard Thomas, to ignore the conclusions of the Home Office, which advised BT and the other ISPs that Phorm's technology is legal.
Earlier today web inventor Sir Tim Berners-Lee said he would personally not want his traffic to be profiled by Phorm, and called on BT, Virgin Media and Carphone Warehouse to make the "service" opt-in only.
He also raised concerns that what a person looked at online could be used for other purposes. He said: I want to know if I look up a whole lot of books about some form of cancer that that's not going to get to my insurance company and I'm going
to find my insurance premium is going to go up by 5 per cent because they've figured I'm looking at those books.
|
15th March | | |
Night time CCTV blocked by infra-red LEDs on headband?
| Not quite convinced about this idea See full article
from Wired |
A German art project could help the British avoid the oppressive proliferation of surveillance cameras in their country. The IRASC is simple, consisting of a circle of infra-red LEDs mounted on a headband. The infra red is invisible to The Man, but will
cause CCTV cameras to flare out over the face of the wearer, obscuring his identity and making this the digital equivalent of a hooded sweatshirt.
This is not a production unit, but given that you'd only need a hat, a battery and a few LEDs, you
could easily knock one up in the garage.
|
12th March | | |
Petition to stop ISPs breaching customers privacy for advertising
| |
We the undersigned petition the Prime Minister to Stop ISP's from breaching customers privacy via advertising technologies. We petition the Prime Minister to investigate the Phorm technology and if found to breach UK or
European privacy laws then ban all ISP's from adopting it's use. Additionally the privacy laws should be reviewed to cover any future technologies such as Phorm
The UK's three largest ISP's, Virgin Media, BT and TalkTalk are all in talks with a
view to introducing the Phorm technology. This would result in the browsing habits of the majority of the UK population being sold to a third party for advertising purposes. The opt out system for this technology is vague and unproven, even when opting
out your every move on the Internet might be recorded. Surely this must be a breach of privacy laws, if not then the privacy laws need to be changed to cover such invasive technology. Update:
Result 4th March 2009. Closed with 21,403 signatures Government response:
Thank you for the e-petition on internet advertising technologies and customer privacy.
As
your petition states, some Internet Service Providers (ISPs) have been looking at the use of Phorm’s Webwise and Open Internet Exchange (OIX) products. However, the only use of the technology so far has been the trials conducted by BT.
Advertisers and ISPs need to ensure that they comply with all relevant data protection and privacy laws. It is also important that consumers’ privacy is protected and that they are given sufficient information and opportunity to make a clear and informed decision whether to participate in services such as Phorm.
The Government is committed to ensuring that people’s privacy is fully protected. Legislation is in place for this purpose and is enforced by the Information Commissioner’s Office (ICO). ICO looked at this technology, to ensure that any use of
Phorm or similar technology is compatible with the relevant privacy legislation. ICO has published its view on Phorm [pdf] on its website
ICO is an independent body, and it would not be appropriate for the Government to second guess its decisions. However, ICO has been clear that it will be monitoring closely all progress on this issue, and in particular any future use of Phorm’s
technology. They will ensure that any such future use is done in a lawful, appropriate and transparent manner, and that consumers’ rights are fully protected.
|
10th March | | |
|
ISPs to monitor web browsing to serve targeted adverts See article from guardian.co.uk |
10th March | | |
Heathrow to fingerprint domestic travellers for little apparent reason
| See full article from the Telegraph
|
Millions of British airline passengers face mandatory fingerprinting before being allowed to board domestic flights when Heathrow’s Terminal 5 opens later this month. For the first time at any airport, the biometric checks will apply to all domestic
passengers leaving the terminal, which will handle all British Airways flights to and from Heathrow.
The controversial security measure is also set to be introduced at Gatwick, Manchester and Heathrow’s Terminal 1, and many airline industry
insiders believe fingerprinting could become universal at all UK airports within a few years.
All four million domestic passengers who will pass through Terminal 5 annually after it opens on March 27 will have four fingerprints taken, as well as
being photographed, when they check in.
To ensure the passenger boarding the aircraft is the same person, the fingerprinting process will be repeated just before they board the aircraft and the photograph will be compared with their face.
BAA, the company which owns Heathrow, insists the biometric information will be destroyed after 24 hours and will not be passed on to the police. It says the move is necessary to prevent criminals, terrorists and illegal immigrants trying to bypass
border controls. The company said the move had been necessitated by the design of Terminal 5, where international and domestic passengers share the same lounges and public areas after they have checked in.
Without the biometric checks, the
company says, potential criminals and illegal immigrants arriving on international flights or in transit to another country could bypass border controls by swapping boarding passes with a domestic passenger who has already checked in.
They could
then board the domestic flight, where proof of identity is not currently required, fly on to another UK airport and leave without having to go through passport control.
Most other airports avoid the problem by keeping international and domestic
passengers separate at all times, but the mixed lounges exist at Gatwick, Manchester and Heathrow’s Terminal 1.
Civil liberties campaigners have raised concerns about the possibility of security agencies trying to access the treasure trove of
personal data in the future.
There are also fears that fingerprinting will add to the infamous "Heathrow hassle" which has led to some business travellers holding meetings in other countries because they want to avoid the sprawling,
scruffy airport at any cost.
Dr Gus Hosein, of the London School of Economics, an expert on the impact on technology on civil liberties, is one of the scheme’s strongest critics. He said: There is no other country in the world that requires
passengers travelling on internal flights to be fingerprinted. BAA says the fingerprint data will be destroyed, but the records of who has travelled within the country will not be, and it will provide a rich source of data for the police and intelligence
agencies. Simon Davies, of campaign group Privacy International, suggested the photograph alone would be a perfectly adequate - and much cheaper - way of identifying passengers.
|
9th March | | |
|
Why I told Parliament: you've failed us on liberty See article from guardian.co.uk |
6th March | | |
|
The most spied upon people in Europe See article from news.bbc.co.uk |
3rd March | | |
Freedom to Protest at Parliament Square
| See full article from
RINF
|
Disproportionate policing was the name of the game in Westminster on Saturday, where hundreds if not thousands of police were on duty over the area in an obvious attempt to avoid a repeat of the January Freedom to Protest debacle.
Despite
the gravity of the issue, only a small group of demonstrators turned up, and at the start of the event they were outnumbered by the media - and were only a minute fraction of the police presence. A few arrived later, and some went home quickly, but at
the peak numbers were still under 50. A senior officer came over at the start and issued a warning that serious action would be taken if any demonstration in the SOCPA designated area were attempted, handing out copies of the usual notice. A
demonstrator took notes and the Forward Intelligence Team (FIT) photographer photographed and filmed everything that moved.
A small group of demonstrators decided to set off for Parliament Square, walking quietly along the pavement. One young man
who managed to evade the police (but not several press photographers) was stopped and searched by police opposite Downing St, who forced him to remove his balaclava. The most suspicious things found on him were a National Express ticket and a strong
Newcastle accent.
Later in the day a small group of the Freedom to Protest demonstrators walked down Whitehall and through Parliament Square, and a short protest was held. Followed by a police van and the FIT photographer and minder they
then made their way to a pub on the Horseferry Road, causing a little consternation among police around the Home Office as they passed close by. But the demonstrators went into the pub and police and press went home.
|
2nd March | | |
German authorities told to stop sending spy mal-ware in emails
| See full article from the
BBC
|
Germany's highest court has restricted the right of the security services to spy on the computers of suspected criminals and terrorists.
Under the technique, software sent in an email enables the authorities to spy on a suspect's computer hard
drive.
The case - which began last year - was brought after the western state of North Rhine-Westphalia allowed officials to begin using the technique.
The Federal Constitutional Court in Karlsruhe said cyber spying violated individuals'
right to privacy and could be used only in exceptional cases. Court President Hans-Juergen Papier said that using such software contravened rights enshrined in Germany's constitution, adding that the decision would serve as a precedent across the
country. The ruling emphasised that cyber spying by the authorities would have to receive the permission of a judge.
The German government has described cyber spying as a vital tool in fighting terrorism. Interior Minister Wolfgang Schauble
welcomed the possibility of using the strategy and said it would be considered as part of plans to change the law: The court's decision must be carefully analysed and will be accounted for as the legislation is modified .
Judicial approval
is already required in Germany for a suspect's telephone to be tapped, and the interior ministry had been expecting the court to make a similar requirement for spying on computers.
During the case, Germany's independent privacy commissioner Peter
Schaar argued that the measure would be a further alarming step towards ever more sweeping surveillance
|
9th February | |
| Government plot how to make ID Cards mandatory
| See full article from
RINF.com See also leaked government document [PDF]
|
Young drivers are to be FORCED to get ID cards when they apply for their first licences.
The People has seen sensational leaked Home Office documents revealing the secret plan.
It says newdrivers and those applying for fresh passports
will be “coerced” into getting the controversial identity cards.
PM Gordon Brown has always said the scheme will be voluntary unless Parliament decides otherwise.
Shadow Home Secretary David Davis stormed: “This is an outrageous plan. The
Government has seen their ID card proposals stagger from shambles to shambles: Now they plan to use coercion in a desperate attempt to bolster a failed policy.
Civil rights group Liberty said: This memo confirms that compulsion is the
ultimate ambition of this scheme.And it can be achieved by stealth even without the need for further parliamentary debate.
The secret document from the Identity and Passport Service is headed: Options analysis - outcome.
It
says: Various forms of coercion, such as designation of the application process for identity documents issued by UK ministers (eg passports) are an option to stimulate applications in a manageable way.
There are advantages to designation of
documents associated with particular target groups, eg young people who may be applying for their first driving licence. The report says: universal compulsion should not be used unless absolutely necessary because of the ID controversy.
|
5th February | | |
|
Even the Daily Mail is wound up by Britain's out of control surveillance See article from
dailymail.co.uk |
5th February | | |
US bill to ban sex offenders from networking sites
| All very well until they inevitably start expanding the definitions of sex offenders Based on an article from the New York Times
|
Attorney General Andrew M. Cuomo and state lawmakers, with the backing of the social networking sites MySpace and Facebook, are pushing a bill that would ban sex offenders' use of the sites.
The law would require all registered sex offenders to
submit any e-mail addresses and other Internet identifiers, such as screen names used for instant messaging, to the State Division of Criminal Justice Services within 10 days of their creation, as with their home addresses.
Offenders who fail to
do so would be violating their parole or probation, Cuomo said.
Under the bill, Level 3 sex offenders, whom the state considers the most dangerous and most likely to commit another sex crime, and sex offenders who used the Internet to commit sex
crimes or who committed crimes against minors would be barred from social networking sites. Such offenders would also be barred from communicating online with children.
Lower-level sex offenders and sex offenders who did not use the Internet in
their crimes would not be barred from the sites under the bill. MySpace and Facebook said, however, they would bar them anyway.
The bill also would allow the state to share the e-mail addresses with sites like Facebook and MySpace. Officials with
both companies have agreed to check their databases against the lists provided by the state. If the addresses match, the companies said that they would terminate the users' accounts and alert the authorities. When setting up accounts with the sites,
users must submit valid e-mail addresses.
|
4th February | | |
State spying in Britain that would make the Stasi proud
| Regulation of Investigatory Powers Act (2000) See
full article from the Daily Mail
by Edward Heathcoat Amory
|
When it was passed into law, the Regulation of Investigatory Powers Act (2000) sounded a pretty innocuous piece of legislation. But in truth it represented a significant victory for the busybody state over our ancient liberties.
Labour claimed it
was responding to demands from civil liberties campaigners for more control over state snooping. But it soon became clear that the legislation which Jack Straw, then Home Secretary, was introducing would have the opposite effect, massively expanding the
ability of the public sector to pry into our private lives.
The Act, which has been quietly amended several times (each time handing more powers to the public sector), now gives an unprecedented range of state agencies the right to listen to our
phone conversations, tap our emails and open our post. In the last nine months of 2006, 960 new applications for the right to peer into the private lives of Britons were made every day.
It is a level of Government surveillance that would make
even the Stasi, the former East German secret police renowned as the world's most effective intelligence agency, proud.
There are three different types of surveillance:
- Interception of Communications - listening in while people are on the phone, or watching what we do on the internet - is the most difficult to justify.
But the grounds for interception are so wide as to allow most
requests to be approved. As well as the more predictable excuse of national security , they include safeguarding the economic well-being of the UK . The police, the security services and Customs can all use this technique but they need
authorisation from the Home Secretary herself or, in urgent cases, get temporary permission from one of her senior officials. - Surveillance - old-fashioned spying. The list of possible justifications for
this is absurdly long - including to prevent and detect crime or prevent disorder, public safety, public health, to assess or collect any tax, duty, levy or other charge payable to a government department . Just about any of us could be under
surveillance using one of this list.
Most worryingly, a long list of government agencies - including 474 councils - can put us under the spotlight. Senior officials in each one can simply give the go-ahead and apply for a rubber stamp to be given
later by the Interception Commissioner.
This Commissioner, former judge Sir Paul Kennedy, with a team of five inspectors, is supposed to check to make sure that all the bugging and spying waived through by the Home Secretary or others has been
justified. His report this week identifies more than 1,000 cases over nine months where he found that the rules had been broken. - Access to communications data . This type of surveillance is the most common
and includes discovering the identities of who we phone and which internet sites we visit. This information is even easier for public authorities to obtain with relatively junior officials able to authorise it.
Later, as in the case of
surveillance, justification for needing this information is considered by overworked bureaucrats accountable to the Interception Commissioner.
But by the time his staff gets round to looking at the paperwork, the trading standards officers down
at the town hall, for example, may have been peering at your phone and internet records for more than a year.
There is a tribunal to which you can complain, but since virtually no one under surveillance will know they are being watched, the
tribunal isn't busy and has virtually never found in favour of a complainant.
How did the Government get away with this? Well, the Lords did make a fuss at the time. Tory peer Lord Northesk said it sanctioned mass domestic surveillance measures.
The Government appeared to be forced into a climbdown. The
Regulation of Investigatory Powers Act (RIPA) initially only covered the nine most crucial law enforcement agencies (police, the taxman, the intelligence agencies etc).
But this merely delayed the stealthy march of Big Brother. In 2004, the
number of groups with the right to poke in our lives expanded to 792; the laws to allow this had been slipped quietly through the Commons by David Blunkett.
As usual, Whitehall got its way by waiting for the fuss to die down. Incidentally, the
only group with an exemption from being bugged are MPs themselves.
But the Act didn't merely extend the rights of bureaucrats to check on us, it also forced the larger internet service providers to build into their systems the technological
capability to cater for all this snooping.
In practice, the result was that "black boxes" were installed in all main ISPs, copying all the information available to them straight to the security services. Then, when MI5 or the police
obtain an authorisation for surveillance, they merely tap into the black box. In return, the internet companies have been able to recoup some of their costs from the taxpayer.
While writing this article, I made several phone calls and looked at a
number of sources on the internet. If anyone in Whitehall can think of a plausible reason why this article threatens the economic security of Britain, or any of the myriad excuses detailed above, they will be able this morning to see who I spoke to and
where I went on the net, to conduct my research. Surely, that can't be right?
|
2nd February | | |
CCTV cameras with microphones to be outlawed
| See full article from the Telegraph
|
Hidden microphones mounted on CCTV cameras which can eavesdrop on private conversations in the street are set to be outlawed.
Richard Thomas, the Information Commissioner, believes that the cameras are a serious breach of civil liberties. Thomas
will launch a new code of practice and declare that no organisation should be able to monitor or store private conversations, claiming that such activities are "highly intrusive".
Whitehall sources said last night that he has the strong
backing of ministers. The ruling is also likely to be hailed by civil liberties campaigners.
A spokesman for Thomas said that the use of cameras to record voices would be allowed only in "extremely special circumstances" such as the
detection of crime.
Some councils, including Westminster in London, began testing the new cameras last year and more are reported to be keen on using them in the run-up to the 2012 London Olympics. Many are fitted with microphones which can
"bug" conversations up to 100 yards away.
|
20th January | |
| One way to keep people out of red light areas?
| From the Independent
|
Ministers are planning to implant "machine-readable" microchips under the skin of thousands of offenders as part of an expansion of the electronic tagging scheme.
Amid concerns about the security of existing tagging systems and prison
overcrowding, the Ministry of Justice is investigating the use of satellite and radio-wave technology to monitor criminals.
But, instead of being contained in bracelets worn around the ankle, the tiny chips would be surgically inserted under the
skin of offenders in the community, to help enforce home curfews. The radio frequency identification (RFID) tags, as long as two grains of rice, are able to carry scanable personal information about individuals, including their identities, address and
offending record.
The tags, labelled "spychips" by privacy campaigners, are already used around the world to keep track of dogs, cats, cattle and airport luggage, but there is no record of the technology being used to monitor offenders
in the community. The chips are also being considered as a method of helping to keep order within prisons.
A senior Ministry of Justice official last night confirmed that the department hoped to go even further, by extending the geographical
range of the internal chips through a link-up with satellite-tracking similar to the system used to trace stolen vehicles. All the options are on the table, and this is one we would like to pursue, the source added.
The move is in line
with a proposal from Ken Jones, the president of the Association of Chief Police Officers (Acpo), that electronic chips should be surgically implanted into convicted paedophiles and sex offenders in order to track them more easily. Global Positioning
System (GPS) technology is seen as the favoured method of monitoring such offenders to prevent them going near "forbidden" zones such as primary schools.
More than 17,000 individuals, including criminals and suspects released on bail,
are subject to electronic monitoring at any one time, under curfews requiring them to stay at home up to 12 hours a day. But official figures reveal that almost 2,000 offenders a year escape monitoring by tampering with ankle tags or tearing them off.
The tags, injected into the back of the arm with a hypodermic needle, consist of a toughened glass capsule holding a computer chip, a copper antenna and a "capacitor" that transmits data stored on the chip when prompted by an
electromagnetic reader.
But details of the dramatic option for tightening controls over Britain's criminals provoked an angry response from probation officers and civil-rights groups. Shami Chakrabarti, director of Liberty, said: If the Home
Office doesn't understand why implanting a chip in someone is worse than an ankle bracelet, they don't need a human-rights lawyer; they need a common-sense bypass.
Harry Fletcher, assistant general secretary of the National Association of
Probation Officers, said the proposal would not make his members' lives easier and would degrade their clients. He added: This is the sort of daft idea that comes up from the department every now and then, but tagging people in the same way we tag our
pets cannot be the way ahead. Treating people like pieces of meat does not seem to represent an improvement in the system to me.
The US market leader VeriChip Corp, whose parent company has been selling radio tags for animals for more than a
decade, has sold 7,000 RFID microchips worldwide, of which about 2,000 have been implanted in humans.
Consumer privacy expert Liz McIntyre said that one company plans deeper implants that could vibrate, electroshock the implantee, broadcast a
message, or serve as a microphone to transmit conversations : Some folks might foolishly discount all of these downsides and futuristic nightmares since the tagging is proposed for criminals like rapists and murderers. The rest of us could be next.
|
12th January | | |
US and UK are classified as endemic surveillance societies
| From Privacy International see full article See
BBC comparison of England/Wales and Scotland
|
The US-based Electronic Privacy Information Center and the UK-based Privacy International have undertaken what has now become the most comprehensive survey of global privacy ever published. The Privacy & Human Rights Report surveys developments in 70
countries, assessing the state of surveillance and privacy protection.
More than 200 experts from around the world have provided materials and commentary. The participants range from eminent privacy scholars to high-level officials charged with
safeguarding constitutional freedoms in their countries. Academics, human rights advocates, journalists and researchers provided reports, insight, documents and advice.
The intention behind this project is two-fold. First, we hope to recognize
countries in which privacy protection and respect for privacy is nurtured. This is done in the hope that others can learn from their example. Second we intend to identify countries in which governments and privacy regulators have failed to create a
healthy privacy environment. The aim is not to humiliate the worst ranking nations, but to demonstrate that it is possible to maintain a healthy respect for privacy within a secure and fully functional democracy.
Summary of key findings
- The 2007 rankings indicate an overall worsening of privacy protection across the world, reflecting an increase in surveillance and a declining performance of privacy safeguards.
- Concern over immigration and border control
dominated the world agenda in 2007. Countries have moved swiftly to implement database, identity and fingerprinting systems, often without regard to the privacy implications for their own citizens
- The 2007 rankings show an increasing
trend amongst governments to archive data on the geographic, communications and financial records of all their citizens and residents. This trend leads to the conclusion that all citizens, regardless of legal status, are under suspicion.
- The privacy trends have been fuelled by the emergence of a profitable surveillance industry dominated by global IT companies and the creation of numerous international treaties that frequently operate outside judicial or democratic processes.
- Despite political shifts in the US Congress, surveillance initiatives in the US continue to expand , affecting visitors and citizens alike.
- Surveillance initiatives initiated by Brussels have caused a substantial
decline in privacy across Europe , eroding protections even in those countries that have shown a traditionally high regard for privacy.
- The privacy performance of older democracies in Europe is generally failing, while the
performance of newer democracies is becoming generally stronger.
- The lowest ranking countries in the survey continue to be Malaysia, Russia and China. The highest-ranking countries in 2007 are Greece, Romania and Canada.
- The 2006 leader, Germany, slipped significantly in the 2007 rankings, dropping from 1st to 7th place behind Portugal and Slovenia.
- In terms of statutory protections and privacy enforcement, the US is the worst ranking
country in the democratic world. In terms of overall privacy protection the United States has performed very poorly, being out-ranked by both India and the Philippines and falling into the "black" category, denoting endemic surveillance.
- The worst ranking EU country is the United Kingdom , which again fell into the "black" category along with Russia and Singapore. However for the first time Scotland has been given its own ranking score and performed
significantly better than England & Wales.
- Argentina scored higher than 18 of the 27 EU countries.
- Australia ranks higher than Slovakia but lower than South Africa and New Zealand.
|
7th January | | |
Those closest to you may be bugging you in more ways than one
| From Land Air Sea
|
It's like having a personal Private Investigator for a fraction of the price! (About £169 on eBay)
- Concerned if your teenager is driving recklessly or wondering about where they are going?
- Suspect your spouse or boyfriend/girlfriend of infidelity?
- Wondering if your employees are using your vehicles for personal use?
If you answered yes to any of these questions, then you need the LandAirSea Tracking Key.
The Tracking Key is a small, pocket sized device that receives signals from the twenty-four Department of Defense satellites orbiting the earth. The
internal computer accurately determines the location of the device within 2.5 meters and records this data every second.
With this data and the included LandAirSea Tracking software, you can accurately determine where a person traveled, how fast
they drove, where they stopped and for how long. The recorded data from the Tracking Key can be displayed over a street map, satellite images or in a text report.
The Tracking Key is powered by just 2 AAA batteries and can be placed inside,
outside and even underneath the vehicle. The strong magnet mounts allows for instant mounting. The Tracking Key is also waterproof so you do not have to worry about the elements.
Simply put, the Tracking key is an extremely affordable GPS vehicle
tracking system that records driving information. Think of it as a video recorder for vehicle travel activity.
|
5th January | | |
Distribution of hacking tools to be criminalised despite dual use issues
| From The Register see
full article
|
The UK government has published guidelines for the application of a law that makes it illegal to create or distribute so-called "hacking tools".
The controversial measure is among amendments to the Computer Misuse Act included in the
Police and Justice Act 2006. However, the ban along with measures to increase the maximum penalty for hacking offences to ten years and make denial of service offences clearly illegal, are still not in force and probably won't be until May 2008.
Provisions to ban the development, ownership and distribution of so-called "hacker tools" draw sharp criticism from industry. Critics point out that many of these tools are used by system administrators and security consultants quite legitimately to probe for vulnerabilities in corporate systems.
The distinctions between, for example, a password cracker and a password recovery tool, or a utility designed to run denial of service attacks and one designed to stress-test a network, are subtle. The problem is that anything from nmap through
wireshark to perl can be used for both legitimate and illicit purposes, in much the same way that a hammer can be used for putting up shelving or breaking into a car.
Following industry lobbying the government has come through with guidelines
that address some, but not all, of these concerns about "dual-use" tools. The guidelines establish that to successfully prosecute the author of a tool it needs to be shown that they intended it to be used to commit computer crime. But the Home
Office, despite lobbying, refused to withdraw the distribution offence. This leaves the door open to prosecute people who distribute a tool, such as nmap, that's subsequently abused by hackers.
|
4th January | | |
No right to protest, even for the police
| From the Guardian see
full article
|
Police have accused the government of attempting to ban 10,000 officers from marching through Westminster in a mass protest over their pay award. The demonstration would be the force's biggest since 1919.
Relations between the Home Office and the
force have fallen to a new low, with the Police Federation of England and Wales, the body that represents 124,000 rank-and-file officers, claiming the government is 'interfering behind the scenes' over plans for the march to Parliament on 23 January.
The high-profile demonstration, intended to highlight the force's anger over its recent below-inflation, 1.9% pay rise, is threatening to become a major political flashpoint in the new year. The police claim their preferred route for their march is
set to be banned under archaic 'sessional orders', laws drawn up in the early 19th century to combat large-scale radical protests that threatened a disturbance of the peace.
The orders are renewed by Parliament each year and invoked by the
Metropolitan Police if the force believes a protest will prevent MPs from going about their daily business. Critics of the orders claim they are a heavy-handed response designed to stifle peaceful protest.
Last night the federation claimed that
parliamentary officials were in talks with the Met with a view to banning the march outside Parliament and said the government had no intention of lifting the orders so that the protest could go ahead. There appears to be some behind-the-scenes
government interference, said Alan Gordon, vice-chairman of the federation. There is pressure being brought on the Metropolitan Police to either postpone the march altogether or to reroute it in such a way that it will disappear into side streets
where it will be out of the public gaze.
|
|
|