Patrice Riemens on Mon, 6 Mar 2000 12:32:20 +0100 (CET) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
[Nettime-bold] UK's RIP (fwd) |
Hi Mods, comes from the HfH list. Pls see if it was posted before! See http://www.stand.org.uk/ripnotes/ for the full text. Here's the executive summary: ISPs as wiretappers ISPs are now classified as "public telecommunication systems". As are mobile telephone providers, Net gateways, newservers, and, potentially, operators of Web applications like Hotmail. This provides a new set of burdens on even the smallest ISP, and may introduce a new level of bureaucracy and liability for anyone seeking to offer any form of Internet service. Additionally, employees of these companies are compelled to keep any surveillance they conduct on their customers secret in perpetuity. We believe this to be a dangerous extension of obligations on British Net citizens, with no corresponding checks or balances on law enforcement. Interception Methods Additionally, the Home Secretary has reserved the right to demand the placing of specific devices to monitor ISP traffic with little deliberation, and no guarantee that the nature of this monitoring will ever be publicised. We'd like to see such impositions made public. Mass Surveillance The bill clarifies the requirements for an interception warrant, but also provides for Certificates, which are general permissions granted by the Home Secretary in a set of situations that don't make sense on the global Internet. In particular, the security services can now attempt to gather information on all communications that travel across an international boundary, without limit. We believe this affects everyone who uses the Net, to an extent unwarranted by the requirements of law enforcement. Permanent Secrecy Surveillance of communications, as before, is explicitly excluded from being used in a court of law. While this ostensibly provides continuing privacy for your e-mails (they won't be quoted in a court case), it also means that if your communications are tapped, you will never know. Traffic Data A wide group of government authorities are now allowed to collect communications data - that's to say, everything about your Net sessions *apart* from the contents of your messages. So, for instance, the Web sites you visit or the full list of who you have contacted may be collected by anyone from the local police to the security services, with very little supervision. We think that collecting mass traffic data is effectively watching your every movement online, and should have the same safeguards as watching your home. Government Access to Keys The government can still demand you hand over keys or plaintext, and can still potentially gaol computer users for being unable to unlock their own files. This tipping-off offence provides serious criminals with a get-out-of-jail-quick escape, while still effectively criminalising the widespread use of encryption by making the act of losing keys or forgetting passwords a criminal offence. ----- End forwarded message ----- _______________________________________________ Nettime-bold mailing list Nettime-bold@nettime.org http://www.nettime.org/cgi-bin/mailman/listinfo/nettime-bold