JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE Archives

CYBER-SOCIETY-LIVE Archives


CYBER-SOCIETY-LIVE@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE Home

CYBER-SOCIETY-LIVE  2000

CYBER-SOCIETY-LIVE 2000

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

[CSL] STATEWATCH: UK: Legitimising Surveillance

From:

John Armitage <[log in to unmask]>

Reply-To:

[log in to unmask]

Date:

Wed, 28 Jun 2000 08:49:59 +0100

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (525 lines)

http://www.statewatch.org/news/

UK: Legitimising surveillance

     The Regulation of Investigatory Powers Bill [R.I.P.
     Bill]

     In June 1999 the Home Secretary put out a consultation paper on the
interception of
     telecommunications prior to publishing a Bill to replace the 1985
Interception of
     Communications Act (IOCA) (see Statewatch, vol 9 no 3 & 4). This dealt
primarily with
     state agencies intercepting phone-calls, e-mails and faxes. On 9
February the "Regulation of
     Investigatory Powers Bill" (RIP Bill) was introduced. The title of the
Bill can only be described
     as deliberately misleading, placing the emphasis on the "Regulation"
rather than on the
     extensive new powers of surveillance being legitimised. It covers:

     - the interception of telecommunications (including the exchange of
data with third
     states/agencies)

     - intrusive surveillance (on residential premises and vehicles)

     - covert surveillance

     - the "use of covert human intelligence sources" (agents, informants,
undercover officers)

     - power to demand communications data (eg: billing details)

     - power to order the handing over of encryption "keys"

     Home Secretary, Jack Straw, said: "None of the law enforcement
activities specified in the Bill
     are new. Covert surveillance by police and other law enforcement
officers is as old as policing
     itself; so too is the use of informants, agents and undercover
officers." The Home Secretary is
     thus, at a stroke, seeking to legitimise all the current practices of
the "law enforcement
     agencies" which are currently unregulated and in most cases not covered
by law.

     There may be nothing "new" but there are certainly practices in the
Bill which should have
     been the subject of democratic control and scrutiny. There are a host
of new surveillance
     powers in the Bill which have not been put out to consultation but
simply added to the
     proposed legislation.

     The scope of the new surveillance powers reflects the changing nature
of "policing", not just in
     the UK but in most EU countries. Over the past ten years secret and
clandestine methods of
     gathering "intelligence" previously employed in the days of the Cold
War by internal security
     agencies have permeated policing practice. According to the Home Office
the Bill will enable
     the law enforcement agencies to conduct systematic targeting of an
individual over a period of
     time in order "to obtain a picture of his life, activities and his
associates."

     Another driving force behind the provisions in the Bill is the EU draft
Convention on Mutual
     Criminal Assistance (which covers interception and covert operations)
and the "requirements"
     set out in the EU-FBI telecommunications surveillance plan adopted by
the EU in January
     1995.

     Liberty has commented that:

     the clandestine nature of the operations regulated by the legislation
heightens the care
     needed to ensure that necessary official activities impinge as little
as possible on
     citizens' rights. Against that background, the current criteria for
authorising
     interception and surveillance are objectionably vague and overboard.

     One of the most objectionable aspects of the Bill is that it will allow
the executive - politicians
     and officials - to authorise themselves to conduct surveillance rather
than on the basis of a
     court order.

     It may offer some comfort to know that the Home Secretary has, as
required by Section 19 of
     the Human Rights Act 1998 (which incorporated the European Convention
on Human Rights)
     formally made the following statement: "In my view the provisions of
the Regulation of
     Investigatory Powers Bill are compatible with the Convention Rights."
When the Home
     Secretary says the R.I.P. Bill will secure "a better balance between
law enforcement and
     individual rights" it is certain that it is the former's interest he
has in mind and not the latter's.

Analysis: section by section

     R.I.P. Bill to introduce far-reaching
     surveillance

     The Bill will legitimise existing clandestine practices and introduce
     controls over encryption - all on the authority of politicians and
officials

     The Regulation of Investigatory Powers Bill has 73 clauses and 4
lengthy Schedules plus 357
     points in the "Explanatory Notes". It is presented in three main
sections: Part I - Interception
     of communications; Part II - Intrusive Investigation Techniques; Part
III - Decryption powers.

     Part I - Interception of communications

     This section incomprehensibly starts with defining "unlawful
interception" which covers
     interception by anyone not authorised by the state (Home Secretary,
judge or a host of
     others). Though it makes "lawful" real-time interception (as it is
happening) if carried out by a
     person who has the right to "control the operation or use of the
system" or who has "the
     express or implied consent of such a person" (Article 1.6). This
proposed lawful power
     extends to collecting and storing a communication that "is being, or
has been, transmitted" or
     while being transmitted is "diverted or recorded" and to "data attached
to a communication"
     (Article 2.7, 2.8, 2.9).

     Article 3 plunges straight into "Lawful interception without a warrant"
(both post and
     communications). It is lawful, without a warrant, if one of the parties
(the sender or receiver)
     consents or if "surveillance.. has been authorised in Part II" (covert
investigations).

     Article 4 extends the categories where interception is "lawful" without
a warrant. It covers
     prisons, hospitals and patients under the Mental Health Act 1983. It
also covers any
     "business", which can by authorised by the Home Secretary by
regulation, to monitor or
     record all communications conducted by that business. "Business" in
this section is defined as
     including government departments, "any public authority" and any person
given authorisation.

     This Article also makes "lawful" the interception of communications in
line with the EU draft
     Convention on Mutual Assistance in criminal matters without a warrant.
It allows the
     interception of communications of a person in another country through
telecommunications
     systems based in the UK due to an interception warrant issued in that
country. No limits are
     placed on the use made of the intercepted material, ie: it does not
have to be used for the
     grounds on which the interception was requested.

     Article 5 finally gets around to dealing with instances where a warrant
is needed for the
     interception of telecommunications and postal services.

     Article 5.1.b. covers intercepting communications (post and
telecommunications) at the
     request of a non-UK state or agency under an "international mutual
assistance agreement".
     While Article 5.1.c. allows the Home Secretary to request interception
of communications
     outside the UK. Article 5.1.d. covers "intercepted material" and
"communications data"
     (electronic communications).

     Article 5.1.3 sets out the criteria for issuing warrants: a) "in the
interests of national security"
     (valid for up to six months); b) "for the purpose of preventing or
detecting serious crime" (valid
     for up to three months); c) "for the purpose of safeguarding the
economic well-being of the
     UK" (valid for up to six months, for people outside the UK); d) for
international mutual
     assistance agreements.

     Hidden at the back of this lengthy Bill in section 71 (2) and (3) is
the definition of "serious
     crime". This includes:

     conduct by a large number of persons in pursuit of a common purpose

     The Explanatory note says this reflects Article 8 of the European
Convention on Human
     Rights which refers to "disorder and crime".

     The concept of "national security" is as usual not defined and is
subject to the changing
     perceptions of governments, ministers and officials of all kinds.
Liberty, observes: "If
     Parliament has not judged an activity sufficiently grave or insidious
to justify bringing it within
     the criminal law, then it should not generally be regarded as a
legitimate basis for interception
     or surveillance."

     Article 5.6 says that an interception warrant covers "all such
conduct.. as is necessary to
     undertake in order to do what is expressly authorised or required by
the warrant."

     Article 6 sets out the agencies which can request an interception
warrant: MI5, MI6, GCHQ,
     NCIS, the police, customs, Permanent Under-Secretary at the Ministry of
Defence plus
     non-UK states and agencies under mutual assistance. For international
mutual assistance a
     "senior official" can issue a warrant where the person under
surveillance is outside the UK
     (including "real-time" surveillance). Where it involves satellite
telecommunications (Iridium-like
     "ground stations") warrants a senior official can issue a warrant
"without further formality" as
     the UK is apparently not concerned with the validity or not of the
warrant issued by the
     non-UK state or agency.

     Article 8.3.b. provides that the Home Secretary has to issue a
"certificate" setting out a
     "descriptions of intercepted material" required - this is directly
relevant to telecommunications
     service providers. Article 11 sets out penalties for failure to
cooperate: up to two years or an
     unlimited fine or both on indictment or up to six months or a fine or
both in a magistrates court
     (summary conviction). Article 12 sets out obligations on service
providers to assist in
     interception.

     Articles 16 says that no reference or assertion may be made in any
legal proceedings to the
     existence or not of an interception warrant. Article 17 allows
exceptions for the prosecution
     and a judge to be shown the evidence - but not the defence.

     Article 18 provides draconian sentences for people who reveal the
existence of an
     interception warrant or the content of a communication or communication
data (not the
     contents but the details of the sender and receiver of a message)
revealed by the surveillance,
     including everyone who works for the postal service or for a
telecommunications provider
     (including ISPs). This information is to be kept "secret" for all time.
It provides for up to five
     years in prison or an unlimited fine or both on conviction.
      

     Obtaining and disclosing "communications data"

     Article 20 includes the definition of "communications data" as
including "any information which
     includes none of the contents of a communication". This obscure
definition can best be
     understood by looking at the categories of information set out in an EU
document -
     ENFOPOL 98 (the EU-FBI surveillance plans). This says the law
enforcement agencies need:
     the IP address, customer account no and address, logon ID and password
used, PIN
     number, e-mail address and any credit card details. It would also
details of messages sent and
     received and to/from whom. The Article also covers the postal services.

     The Article allows for authorisations (as distinct from warrants above)
and the serving of
     notices by "a person designated" (see below) on the following grounds:

     a) "in the interests of national security"

     b) "for the purpose of preventing or detecting crime or of preventing
disorder"...

     c) "in the interests of public safety"

     The test here is quite different and simply defined as "crime" (not
serious crime) with
     "disorder" added. It also covers protecting public health, collecting
taxes, and "for any
     purpose.. specified.. by an order made by the Secretary of State"
(Article 21.h, emphasis
     added).

     Article 21.3 allows a person in a "public authority" (to be set out by
the Home Secretary) to
     anybody else in the same authority to issue an authorisation/notice on
a communications
     provider for communications data (for a period of up to one month,
renewable).

     Article 21.4 says that where it "appears" to the potentially thousands
of "designated" people in
     public authorities that a "postal or telecommunications operator is or
may be" (emphasis
     added) in possession of communications data they can serve a "notice"
on them to obtain and
     disclose this to them whether "old" data or new data.

     The assumption that access to communications data is a lesser intrusion
into the rights of
     privacy that interception is unacceptable.

     PART II:

     Surveillance and "covert human intelligence sources"

     The core of a surveillance state is the combination of intercepting
communications and direct
     sources (informants and listening devices). Part II of the R.I.P. Bill
makes lawful previous
     dubious and "unlawful" practices.

     Three types of surveillance are to be "authorised":

     a) "directed surveillance": this is so called on the grounds that
"surveillance is directed if it
     is covert but not intrusive" (Article 25.2).

     The grounds for issuing authorisations for "directed surveillance"
include "national security",
     "preventing or detecting crime or of preventing disorder", and for "any
purpose" laid down by
     the Home Secretary (Article 27.3).

     The people able to issue authorisations are those "offices, ranks and
positions with relevant
     public authorities" laid down (but not set out here) by the Home
Secretary.

     b) "intrusive surveillance": surveillance is "intrusive" if it is
"covert surveillance".
     Surveillance is thus "intrusive" if a device (whether to record sound
or video) is put in a
     "residential premises" (but by implication not if it is not a
residential premises, like place of
     work or meeting place). It is intrusive if it involves as it is
politely termed "an individual" (ie:
     undercover agent or informant). It is also intrusive if a listening
device is in a vehicle, but it is
     not "intrusive" if a tracking device is attached to a vehicle to plot
its location. However, it is
     "intrusive" if a "device" outside a premises or vehicle produces
information of the "same quality
     and detail" as might be obtained from a device actually present in the
premises or vehicles.

     The grounds for issuing authorisations for "intrusive surveillance"
include "national security",
     "preventing or detecting serious crime", and for "any purpose" laid
down by the Home
     Secretary (Articles 30 and 33).

     The people able to issue authorisations are "senior authorising
officers" in the police, military
     or customs. Police and customs have to refer authorisations to the
Surveillance Commissioner.

     c) "the conduct and use of covert human intelligence sources": covers
"inducing, asking
     and assisting" a source. What the term "inducing" means is not set out
("inducing" could include
     turning a blind eye to a criminal offence). The "covert" source is
exempted from civil liability
     for "incidental" conduct (Article 26.2.a) and the "conduct" can be
authorised for "conduct"
     outside the UK (the terminology is original). Although not spelt out
"covert human intelligence
     sources" cover undercover agents, paid and unpaid, and "induced"
informants.

     The grounds for issuing authorisations for "the use of a covert human
intelligence source"
     include "national security", "preventing or detecting crime or of
preventing disorder" (a lesser
     standard than for "intrusive" surveillance), and for "any purpose" laid
down by the Home
     Secretary (Article 28.).

     The people able to issue authorisations are those "offices, ranks and
positions with relevant
     public authorities" laid down (but not set out here) by the Home
Secretary.

     PART III:

     Investigation of electronic data protected by encryption

     This Section of the Bill introduces notices requiring service providers
to disclose encryption
     "keys", known as a "section 46 notice". The grounds for such a notice
include: "national
     security" and "preventing and detecting crime" (again a lesser
standard). Failure to surrender a
     "key" could land a person in jail for up to two years or an unlimited
fine or both. However,
     failure to keep "secret" the fact that a "key" has been given to a
state agency can bring a jail
     sentence up to five years.

     These proposals fail to address the fact that parties (sender and
receiver) can encrypt
     messages "at source", the "key" in these cases would not be in the
hands of the service
     provider. For a more detailed critique of Part III see:
http://www.fipr.org.uk

     Commissioners and the Tribunal

     Two Commissioners are to be appointed, the Interception of
Communications Commissioner
     and the Covert Investigations Commissioner as is a Tribunal (to hear
complaints). The
     Tribunal, along the lines of the existing ones covering interception
and the security services,
     has powers (to hear evidence without the complainant being present and
to suppress any
     evidence which would endanger the "public interest" etc).

     Conclusion

     A number of overall comments need to be made. First, the concept of
"crime" used to justify
     such surveillance. "Serious crime", used in the powers for
interception, includes "conduct by a
     large number of persons in pursuit of a common purpose" which could be
used against
     political groups and activists and/or demonstrations. In other areas
there is the lesser test of
     simply "crime", any crime however minor. While the provisions on
"communications data" and
     covert, undercover, surveillance are expressly extended to cover
"disorder".

     Second, the power, whether under warrants or authorisations, given to
state agencies (police,
     customs, immigration, tax, health bodies and local authorities) to
undertake surveillance
     amount to self-authorisation by politicians or officials. Liberty say:

     Retention of executive rather than prior judicial authorisation of
interception is
     fundamentally objectionable. That the executive should secretly
authorise itself to
     commit clandestine interferences with important rights is neither
acceptable or
     necessary.

     Third, there is nothing to prevent the issuing of a warrant,
authorisations or notices to cover an
     organisation or group and hence for the conducting of general
surveillance ("fishing or trawling
     expeditions").

     Fourth, the whole emphasis on the Bill is that the use of all these new
legal powers is to be
     kept secret - and like the Official Secrets Acts the people involved
have to take their "secrets"
     to the grave.

     The fact that the Home Secretary has assured the nation that the R.I.P.
Bill is in line with the
     European Convention provides little comfort. Nor will the appointment
of two
     Commissioners, whose role will be defined by the open-ended powers
given for surveillance.
     The Tribunal can be expected to be as toothless as the existing ones -
which have never found
     in favour of a complainant. But then how can people know they are under
surveillance, for
     proper or perverse reasons, if they never find out?

     The Data Protection Working Party for the European Commission said in
its report in May
     1999 that:

     a person under surveillance [should] be informed of this as soon as
possible.

     This would ensure a proper test of whether or not the surveillance was
legitimate (see
     Statewatch, vol 9 nos 3 & 4). The government's analysis of the
responses to it's consultation
     paper on interception says this is "an idea that law enforcement felt
to be unworkable".

     It may be a sad truism but too often this government when it lays down
new legislation
     affecting civil liberties diminishes the rights of the people at the
expense of the demands of "law
     and order" and the "law enforcement agencies", diminishing privacy and
freedoms bit by bit
     and Bill by Bill.

     Sources: Regulation of Investigatory Powers Bill; R.I.P. Bill
Explanatory Notes; Regulatory Impact
     Assessment, Parts I and III; FIPR press release, 10.2.00; R.I.P. Bill:
Second reading briefing, Liberty,
     28.2.00; Interception of Communication in the UK, Consultation Paper,
Home Office, June 1999;
     Interception of Communication in the UK: An analysis of responses to
the governments' consultation
     paper (CM 4368), 15.12.99.
--------END--------------



%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

May 2024
April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
June 2022
May 2022
March 2022
February 2022
October 2021
July 2021
June 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
July 2020
June 2020
May 2020
April 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager