Skip to content or view screen version

EUROPEAN POLICE PLOT TO KILL THE INTERNET

Kamal Ahmed, The Observer | 09.06.2002 18:04

Police to spy on all emails: Fury over Europe's secret plan to access computer and phone data. Companies that run internet sites will be required to retain passwords used by individuals, record which website addresses are visited, and keep details of webpages looked at and any credit card or bank details used for subscriptions. The information retained about emails will include who sent the message, where the email went, its contents and the time and date it was sent.

EUROPEAN POLICE PLOT TO KILL THE INTERNET
EUROPEAN POLICE PLOT TO KILL THE INTERNET


ABOVE: the new symbol of fear and hatred in Europe

---

Police to spy on all emails

Fury over Europe's secret plan to access computer and phone data

Kamal Ahmed, political editor
Sunday June 9, 2002
The Observer

Millions of personal emails, other internet information and telephone records are to be made accessible to the police and intelligence services in a move that has been denounced by critics as one of the most wide-ranging extensions of state power over private information.

Plans being drawn up by Europol, the police and intelligence arm of the European Union, propose that telephone and internet firms retain millions of pieces of data - including details of visits to internet chat rooms, and of calls made on mobile phones and text messages.

In a move that has been condemned by privacy campaigners, a draft document passed to The Observer reveals that the EU is now drawing up a 'common code' on data retention which will be applicable in all member states.

Security and police sources said new powers on accessing personal data will come into force in Britain towards the end of the year.

'It is typical that such a significant change in the control over private information is being worked out in secret,' said Dr Ian Brown, a leading expert on data privacy and director of the Foundation for Information Policy Research.

'It does seem to have been Britain that has put pressure on other member states to put in place this type of legislation. In 99 per cent of cases it will be used properly, but what about the other one per cent? There is not enough scrutiny of what is going on.'

The Europol document was drawn up at a private meeting of police, intelligence services and customs and excise officials from across Europe in The Hague last April. It lists 10 areas where companies will be required to keep information to help in the fight against international terrorism, domestic crime and drug running.

Companies that run internet sites will be required to retain passwords used by individuals, record which website addresses are visited, and keep details of webpages looked at and any credit card or bank details used for subscriptions.

The information retained about emails will include who sent the message, where the email went, its contents and the time and date it was sent.

It is believed that Britain will push for the data to be kept for up to five years. At the moment much of it is only kept for one or two months, for billing purposes, by the companies that run internet and email services.

Sources at the National High-tech Crime Unit, which is overseeing implementation of plans for data retention in Britain, point out that the growth of so-called 'cyber crime' means that they need new powers to keep ahead of the criminals.

One official also said that investigations into crimes such as the murders carried out by the GP Harold Shipman relied on the retention of old telephone records.

'We need to codify how this happens, so all countries in Europe are dealing with the same set of rules,' the source said.

'The internet does not recognise national boundaries and international companies don't need the confusion of dealing with separate codes in different countries.' The Europol document says the use of telephones - land lines and mobiles - will be monitored. Numbers dialled, when and where they were dialled from and personal details such as the address, date of birth and bank details of the subscriber who paid for the call will also be kept.

The document, headed 'Expert Meeting on Cyber Crime: Data Retention', suggests mobile phones records could be used by police and the intelligence services to track the geographical location of people making calls.

Mobiles use a network of masts to convey the calls, placing the user in a geographically distinct 'cell' at the time of the call. Records using such geographical locations were used to acquit the teenagers accused of murdering Damilola Taylor.

The Association of Chief Police Officers is also drawing up a manual of standards so that police forces across the country use similar methods when accessing the data.

 http://www.observer.co.uk/politics/story/0,6903,730091,00.html

Kamal Ahmed, The Observer
- Homepage: http://www.observer.co.uk/politics/story/0,6903,730091,00.html

Comments

Hide the following 8 comments

So what?

09.06.2002 18:55

If you've got nothing to hide you've got nothing to fear.

If you're the kind of activist who feels that breaking the law is necessary then regardless the of rightness or wrongness of it you can expect the state to be spying on you anyway.

So what difference does it make?

Ozymandias


Ozymandias=== special branch??

09.06.2002 19:38

Hey Ozyamidias you thickhead--
for the largest part of British history, the majority of the population of these islands was deprived of any real control over politics, and lived as serfs and hierlings. The period of human history in which democratic rights have been widely enjoyed is a brief one (in this country only since 1918 and 1928). Prior to this most peoples politics was extra-parliamentary, and was judged to be subversive by the state, and punished by imprisonment, transportation, torture, executions. Only a very naive person could believe that things can only go forward and not back. I think it is well-possible that a new age of serfdom may re-emerge, or that some rogue element in the security forces might not use their powers to create some new kind of despotism. What happens to lawful politics when the laws get changed?

The expansion of surveillance is an attempt to limit the right to privacy. It must be resisted ---- unless of course Ozy, that you work for the special branch or MI5 already, and you'd prefer us just to roll over?

unknown (for the moment


stuff

09.06.2002 19:52

Er... why do we need privacy?

If someone's invading your privacy then just ignore them. Better than worrying about it.

That's the privacy issue dealt with. The other issue was that maybe the state is going to get carried away with its excessive powers and enslave us again.

That's a seperate issue from the privacy one.

Um.. I don't think it will happen. How exactly do you think they'd make us "serfs"?

It's not like they're going to take away the right to vote is it?

Ozymandias


ozymandia's bs isn't from university

09.06.2002 19:56

ozymandia's bs isn't from university
ozymandia's bs isn't from university

"If you've got nothing to hide, you've got nothing to fear"

- some retard named ozymandias

For proof to the contrary:

How the FBI manipulated Reagan into the White House while wrecking the career of the president of the UC Board of Regents
 http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2002/06/09/MNCFLEADIN.DTL

"Before" and "After" copies of actual documents
 http://www.sfgate.com/campus/

need to know basis - and you don't need


calm down

09.06.2002 19:58

did the guardian writer really post their own stuff here?
anyway - Ozy might just have meant that this new law just means the state can admit in court (and use in court) methods it uses anyway and people have to just carry on in the face of adversity.
Fight Law, Not Laws - as it were.

bobby
- Homepage: http://politics.guardian.co.uk/eu/story/0,9061,730135,00.html


And now for something completely different...

09.06.2002 21:19

New Scientist: Anti-snooping operating system close to launch

NewScientists - May 28, 2002
 http://www.newscientist.com/news/news.jsp?id=ns99992335

Anti-snooping operating system close to launch

Computer activists in Britain are close to completing an operating system that could undermine government efforts to the wiretap the internet. The UK Home Office has condemned the project as potentially providing a new tool for criminals.

Electronic communications can be kept private using encryption. But new UK legislation will soon give law enforcers the right to demand encryption keys from anyone suspected of illegal activity.

The Regulation of Investigatory Powers Act (RIPA) was introduced to update UK surveillance laws to include electronic communications. But privacy campaigners say it gives too much power to law enforcers and permits intrusive eavesdropping.

Peter Fairbrother, a mathematician and computer enthusiast, is programming the new operating system, called M-o-o-t. "It is aimed at anybody who's concerned about the government being nosey," he says.

Remote storage

M-o-o-t aims to beat RIPA powers by storing encryption keys and other data overseas, beyond the reach of investigators. No data will be stored on the computer's hardware.

Documents and email messages will be kept on servers outside the UK government's jurisdiction. Communication with these servers will be secured by encryption.

It will be possible to store files on any server that allows
encrypted File Transfer Protocol (secure FTP) access. It will even be possible to share files between different servers, meaning that if one server were compromised, this would still not provide a complete file.

M-o-o-t will be almost entirely contained on a CD that will run on most PCs and Macintosh computers. The CD must be placed in a computer at start up and will then load up a graphical user interface, as well as a number of applications including an email client and a word
processor. Fairbrother says the system aims to make it easy for anyone to use the suite of tried and tested cryptographic protocols that M-o-o-t combines.

Criminal tool

A spokeswoman for the Home Office dismissed privacy concerns over
RIPA and warned that the system could provide criminals with a new
tool: "This particular technology could provide the criminally
inclined with a tool to further their criminal intent."

She told New Scientist: "Such a device in the wrong hands will do far
more to infringe the human rights of innumerable potential victims
than a regulated and inspected process such as RIPA could ever
allow."

Fairbrother admits that the M-o-o-t might be used by criminals but
says there are already more complicated tools available for
determined lawbreakers. "The benefits far outweigh the problems," he
says.

Master keys

Communication will only be possible with other M-o-o-t users using
keys that expire after a single use. "Master" encryption keys will be
kept on the remote servers in a format that makes it impossible to
distinguish them from random data without the correct password.

This is possible using the Steganographic File System developed by
researchers at the University of Cambridge. It stores all data as
apparently random information.

"M-o-o-t sounds like a great idea," says Bruce Schneier, security
expert and head of US company Counterpane Security. But he adds that
extensive testing will be needed to ensure there are no software
bugs: "Like any security technology, if you rely on it and it has
flaws then you don't have the security you rely on."

RIPA, introduced in July 2000, allows UK police to intercept
electronic communications using equipment installed at ISPs. When
part three of RIPA is brought into power later in 2002, police will
also be able to demand access to message encryption keys. Those who
fail to hand over their keys could face a prison sentence.

Fairbrother says a version of M-o-o-t should be ready for testing in the next two weeks. The final product ought to be ready for the introduction of part three of RIPA, he adds.

Will Knight

bushwacked


fuckwit

11.06.2002 11:50

It's a well known fact that there are plenty of backdoors within PGP that the government forced the makers to put in. It's difficult to crack only if you aren't the government with the master key that opens everything. don't anyoen believe otherwise. independant little-known encryption will always be more secure. research the field and make yourself safe.

NTG