Have already had a skim read of the published Draft IPB, but need to have a more thorough review of the published IPB. Creating this issue to record notes whilst reading the bill and other resources.
LAN-64 is concerned with the measures required to ensure our data isn't caught up in the proposed dragnet, so may require updating depending on what is noted within this issue.
Keeping surveillance evidence out of courts, and the defenseÂ's hands
S.42(1-4) of the Draft IP Bill prevents anyone involved in interception from ever mentioning it took place as part of any legal proceedings. Note that this section is absolute: it does not have exceptions, for example in relation to the public interest: such as the ability to discuss the benefit or downsides of part interception activities; no exception for talking about this to MPs, or other democratic representatives; or even to exculpate anyone who otherwise would be wrongfully found guilty. Similar provisions (S.120(a)) keep the fruits of bulk interception out of courts.
For the definition of Content, the bill's a little flimsy, but as far as Web browsing goes they've specifically limited themselves:
Content of a communication
(6) The content of a communication is the elements of the communication, and any
data attached to or logically associated with the communication, which reveal
anything of what might reasonably be expected to be the meaning of the
communication but—
(a) anything in the context of web browsing which identifies the
telecommunications service concerned is not content, and
(b) any meaning arising from the fact of the communication or from any
data relating to the transmission of the communication is to be
disregarded.
and
190 Subsection (9)(f) provides for the retention of internet connection records. Internet connection
records are a record of the internet services that a specific device connects to – such as a website
or instant messaging application – captured by the company providing access to the internet.
They could be used, for example, to demonstrate a certain device had accessed an online
communications service but they would not be able to be used to identify what the individual
did on that service. Clause 47 provides certain restrictions on the acquisition of internet
connection records. Clause 193 provides that in the particular context of web browsing
anything beyond data which identifies the telecommunication service (e.g. bbc.co.uk) is
content.
and
451 Subsection (6)(a) provides that in the particular context of web browsing anything beyond data
which identifies the telecommunication service (e.g. bbc.co.uk) is content. Accordingly
bbc.co.uk, google.co.uk or facebook.com would be communications data but data showing
what searches have been made on Google or whose profiles have been viewed on Facebook
would be content.
Which ignores just how identifying/embarassing a list of visited domains could be.
The "Request Filter" from the Draft Communications Data Bill (http://www.publications.parliament.uk/pa/jt201213/jtselect/jtdraftcomuni/79/79.pdf) is still ever-present, and as before it basically translates to "We're going to build a fuck-off big database of everything we can, but don't worry there's going to be an interface in front off so requests can be limited down to the 'relevant' stuff".
As others are way ahead of me at reading the bill, and doing a fantastic job of identifying the issues, I'm not going to bother doing a writeup of the bill.
Instead, I've moved onto running a practical demonstration of what can actually (and incredibly easily) be pulled out at a network level, including effectively bypassing the protection that a lot of people assume HTTPS will give them.
Activity
2015-11-04 19:57:34
2015-11-04 20:04:00
2015-11-07 23:38:03
- http://arstechnica.co.uk/tech-policy/2015/11/snoopers-charter-uk-govt-can-demand-backdoors-give-prison-sentences-for-disclosing-them/
- https://conspicuouschatter.wordpress.com/2015/11/07/uk-draft-ip-bill-who-is-a-telecommunications-operator/
- https://conspicuouschatter.wordpress.com/2015/11/05/uk-draft-ip-bill-the-last-policy-discussion-about-surveillance-before-the-mass-gagging/
- https://theintercept.com/2015/11/05/seven-major-takeaways-from-the-u-k-s-proposed-surveillance-rules/
- https://conspicuouschatter.wordpress.com/2015/11/04/investigatory-powers-bill-the-juicy-bits/
With there being a thread on reddit about opposing it
- https://www.reddit.com/r/unitedkingdom/comments/35g7tc/oppose_the_snoopers_charter/
2015-11-07 23:55:59
Keeping surveillance evidence out of courts, and the defenseÂ's hands
The gagging applies to (as a minimum)
- Equipment Interference (Cracking)
- Bulk Communications Data Collection
- Implementing Interceptions Capability
- Retention Notices
- Targeted Warrants
- "Technical Capability Notices" (Implementing backdoors)
Essentially, any power the IPB bill grants is protected by permanent, absolute secrecy. What a fine democratic nation we live in.....
2015-11-08 00:08:11
Judicial sign off will be required for
- trying to identify a Journalist's confidential source (excludes the Intelligence agencies)
Government minister followed by "Judicial Commissioner" sign-off required for
- Interception of content of communications
In "urgent" cases, the minister can bypass the commissioner.
2015-11-08 00:09:25
and
and
Which ignores just how identifying/embarassing a list of visited domains could be.
2015-11-08 00:11:51
2015-11-08 00:11:51
2015-11-08 00:12:05
2015-11-08 00:12:09
2015-11-08 00:12:12
2015-11-08 01:58:44
Mind you, seems the Home Office don't like it when it's portrayed like that - https://twitter.com/TheRegister/status/662335345921363968
2015-11-12 15:05:45
Instead, I've moved onto running a practical demonstration of what can actually (and incredibly easily) be pulled out at a network level, including effectively bypassing the protection that a lot of people assume HTTPS will give them.
Will start writing it up shortly so I can publish
2015-11-13 13:47:20
2017-07-06 15:49:14
2017-07-06 15:49:14
2017-07-06 15:49:21