The UK Now Wields Unprecedented Surveillance Powers — Here’s What It Means

pennine: So without even being a criminal, we’re all(in the UK at least)on databases somewhere.

                        My concern is what if those databases themselves are  criminal or employ rogue elements? This has gone way too far. I have been aware of being watched over by cop airplanes for the past 8yrs, possibly more & the only reason I can think why this must be, is because of  having an interest in politics and discussing politics -heck i’d prefer to be running a blog dedicated to other things that interest me. But seeing that we cannot rely on the Main-Stream Media any longer, God Willing i will do my bit in keeping folk informed about issues they have a right to know,as much as it is possible. It may not be much,but there’s a vast ocean out there of good professional journalists and investigators of integrity and if I’m just a drop in that wide ocean in passing their good stuff along, then it’s a pleasure doing so. There are other great bloggers doing likewise, it’s  certainly a  privilege & honour to me getting to meet & know them. We Keep On Keeping Onward & Upward. & Certainly No Surrendering!!!

Oli Scarff/Getty Images

The UK Now Wields Unprecedented Surveillance Powers — Here’s What It Means

by Nov 29, 2016, 12:05pm EST

The UK is about to become one of the world’s foremost surveillance states, allowing its police and intelligence agencies to spy on its own people to a degree that is unprecedented for a democracy. The UN’s privacy chief has called the situation “worse than scary.” Edward Snowden says it’s simply “the most extreme surveillance in the history of western democracy.”

legalizing the bulk collection of data while adding new powers

The legislation in question is called the Investigatory Powers Bill. It’s been cleared by politicians and granted royal assent on November 29th — officially becoming law. The bill will legalize the UK’s global surveillance program, which scoops up communications data from around the world, but it will also introduce new domestic powers, including a government database that stores the web history of every citizen in the country. UK spies will be empowered to hack individuals, internet infrastructure, and even whole towns — if the government deems it necessary.

Although the UK’s opposition Labour Party originally put forward strong objections to the bill, these never turned into real opposition. The combination of a civil war between different factions in Labour and the UK’s shock decision to leave the European Union means the bill was never given politicians’ — or the country’s — full attention. Instead, it will likely inspire similar surveillance laws in other countries. After all, if the UK can do it, why shouldn’t everyone else? And there will be no moderating influence from the US, where the country’s mostly intact surveillance apparatus will soon be handed over to president-elect Donald Trump.


With this global tide of surveillance rising, it’s worth taking a closer look at what exactly is happening in the UK. Here’s our overview of what the Investigatory Powers Bill entails:

A NATION’S BROWSER HISTORY and a search engine to match


The UK government will keep a record of every website every citizen visits for up to a year, with this information also including the apps they use on their phone, and the metadata of their calls. This information is known as internet connection records, or ICRs, and won’t include the exact URL of each site someone visits, but the base domain. For this particular webpage, for example, the government would know you went to, the time you visited, how long you stayed, your IP address, and some information about your computer — but no individual pages.

Each Internet Service Provider (ISP) and mobile carrier in the UK will have to store this data, which the government will pay them to do. Police officers will then be able to access a central search engine known as the “request filter” to retrieve this information. Exactly how this request filter will work still isn’t clear (will you be able to find every visitor to a certain website, for example, then filter that down to specific weeks or days?), but it will be easy to tie browsing data to individuals. If you sign a contract for your phone, for example, that can be linked to your web history.


Your web history and call data — available without a warrant

There are a few ways this data could be muddied. For a start, services like VPNs and Tor, that bounce your internet traffic around the world, will be difficult to follow. And when it comes to tracking activity on your phone — for an app like Facebook Messenger, for example — this information will be fairly useless, as most of these apps maintain regular connections to the internet throughout the day. “The government won’t be able to get all of the data all of the time,” Jim Killock, executive director of the UK’s Open Rights Group tells The Verge. “But they’re not expecting most people to bother to protect their privacy.”

The key point about this power, though, is that it has no judicial oversight. Access to citizens’ web history will be solely at the discretion of the police, with a specially trained supervising officer approving or denying requests. “It makes this kind of surveillance a simple, routine activity,” says Killock, adding that without oversight, it’ll be impossible to know when police target specific groups disproportionately. That’s definitely a problem in a country where even senior law enforcement officers admit that claims that the police force is institutionally racist have “some justification.”

Although this power sounds almost farcical in its reach (“The police will know what porn you look at! They’ll know how much time you waste on Facebook!”), it’s no laughing matter. It’s not as intrusive as other measures, but it establishes a dangerous new norm, where surveillance of all citizens’ online activity is seen as the baseline for a peaceful society. Collect evidence first, the government is saying, and find the criminals later. The country has a surprising tolerance for this, embracing the use of surveillance cameras more than most. Now, though, it has CCTV for the nation’s online life.




Other parts of the bill don’t introduce new powers, but establish surveillance and hacking activities revealed by the Snowden revelations. These include the collection of metadata from around the world, and targeted hacking of individuals’ computers — bugging their phone calls, reading texts, and so on. Unlike access to browser history, these latter powers will require a warrant from both the Secretary of State and a panel of judges.

“equipment interference” is just what spies calls hacking

The government has given hacking the deceptively understated description of “equipment interference,” and splits it into two camps: targeted and bulk. Targeted equipment interference allows law enforcement and security agencies to hack specific devices, phones or computers, while bulk hacking can cover larger groups. The only difference between the two powers is that bulk hacking is only authorized for foreign targets.

We already know quite a bit about these capabilities thanks to Snowden’s leaks, and they cover the sort of malware and spyware you might expect any hacker to use. GCHQ’s toolkit, for example, includes a collection of programs named after smurfs: “Nosey Smurf” activates a device’s microphone to record conversations; “Tracker Smurf” hijacks its GPS to track location in real time; while “Dreamy Smurf” allows a phone that appears to be off to secretly turn itself on.

GCHQ headquarters UK (Credit: GCHQ/Crown Copyright)

The headquarters of GCHQ, the UK’s signals intelligence agency.Out of all the new legislation, targeted hacking has probably been objected to the least. This is because it will require a warrant approved by both government ministers and a specially appointed panel of seven judicial commissioners — the so-called double lock procedure — and will be reserved for “serious crimes” and threats to national security. This sort of interception also takes place on a much smaller scale. The UK police made more than half a million requests for metadata last year, but there were only around 2,700 warrants for directly intercepting communications in the same period.

However, what is new is the authorization of “bulk equipment interference” or the hacking of large groups of people. This power will be limited to the security agencies and can only be used outside of the UK, but the government is clear about its potential scope. It’s said that if it needs to hack every phone and laptop in a “major town” to stop a terrorist attack, it will; and it’s suggested that it might be used to take over the entire internal email system of a “hypothetical totalitarian state,” if it’s developing biological weapons.

so-called targeted hacking could be used to target groups

There’s also the worry that the targeted hacking laws could be used to hack multiple people under the use of something called a “thematic warrant.” Ross Anderson, a professor of security engineering at Cambridge University who gave testimony about the IP bill to the government, gives the example of the police chief of a UK city wanting to stem knife crime, and asking the government to force Google to get data from Android smartphones. “The point is that it’s possible,” Anderson tells The Verge. “Perhaps the government has given some private assurances to these companies [that it won’t happen], but we know from long experience that such private assurances are not worth the paper they’re not written on.”

In addition to bulk hacking, the IP bill legalizes the bulk collection of communication data from around the world, activity that Snowden first revealed in 2013. The UK courts judged that this activity was in breach of human rights law earlier this year, but once the IP bill passes, it’ll be absolutely legal. Although the government claims that this sort of information is treated respectfully, its own internal memos have shown staff abusing their powers; using bulk datasets for things like finding addresses to send birthday cards, and “checking details of family members for personal convenience.”

GOOGLE Connie Zhou data center server



One of the biggest trouble spots for the bill, though, isn’t so much an explicit power as an assumption by the government — namely, that it can force tech companies to decrypt user data on demand.

Now, there are a lot of caveats to this statement. Firstly, requests for this data will be on a small scale, like targeted hacking. Secondly, the wording of the bill is ambiguous. It doesn’t explicitly force companies to install backdoors in their products, but it does say they should be able to remove encryption on users’ data whenever “practicable.” What exactly “practicable” means is never explained. The UK might argue that it’s “practicable” for a company to undermine its own encryption; that company might respond that doing so would endanger its business around the world.

Earlier this year, big tech companies including Facebook, Microsoft, and Google lined up to denounce this part of the legislation. Apple CEO Tim Cook was particularly critical, noting that the law would have “dire consequences” if introduced. “If you halt or weaken encryption, the people that you hurt are not the folks that want to do bad things. It’s the good people,” said Cook in 2015. “The other people know where to go.”

Tim Cook

Apple CEO Tim Cook says the law could have “dire consequences.” What exactly will happen if the UK government demands that a company like Apple decrypt its data isn’t clear. However, it won’t be straightforward replay of San Bernardino, when Apple battled the FBI over the decryption of a terrorist’s iPhone. The UK has the legal authority to penalize companies that don’t comply, but experts aren’t sure whether they would bother. “A lot of this is about setting a precedent of how you think things ought to function, rather than necessarily expecting to be able to enforce the laws against overseas companies,” says Killock. In many cases, he suggests, the issue will come down to leverage. Tech companies without any UK presence will be able to shrug off demands (what’s the government going to do to them?), but big firms like Apple and Facebook, which have thousands of staff in the UK, may feel more at risk. Alternatively, this might give them an advantage against the government; allowing them to threaten to withdraw jobs, for example.

“There wouldn’t be any public debate about it.”

Experts say what is even more dangerous, is the fact that any such battles between tech companies and the UK government will take place in private. Any warrants issued to a company to decrypt users’ data will come with a gagging order, forbidding the firm from discussing it. “There wouldn’t be any public debate about it,” Harmit Kambo, campaigns director at Privacy International, tells The Verge. “Apple vs. the FBI just wouldn’t happen in the UK.” The first we might know of a battle over encryption could be a company simply withdrawing its services from the UK. “The invisibility of it is the biggest trick they’ve pulled,” says Kambo. “It’s sad that the Snowden revelations backfired so spectacularly here. Rather than rolling back powers, they’ve been used to legitimize these practices.”

The scope of the law reaches far beyond the UK’s borders, and the knock-on effects will likely be felt in countries around the world. Taken as a whole, it’s hard to see the Investigatory Powers Bill as anything other than a reshaping of the concept of private civil society.

Update November 29th: The story has been updated to note that the Bill has now received royal assent and is officially law.

3 thoughts on “The UK Now Wields Unprecedented Surveillance Powers — Here’s What It Means

  1. From before birth to today everyone is on a database of one sort or the other.
    So what.
    If ‘they’ want you corraled in some way and the facts don’t fit then ‘they’ will simply interprete the data in a different way to achieve their goals.

    Is it best you unplug, go off grid, or disappear?
    Too late.
    When you surface you’ll have to explain your absence anyway if you were a person of interest.

    So just get on with your life, keep no hard or electronic copy of anything on their banned lists, and just try not to raise too many flags.

    I console myself with the thought that when everything kicks off, the first EMP pulse will disable the nations electrical supply and a lot of electronic equipment.
    That and I think ‘they’ will be a bit too busy to worry about a knackered old shit like me.

    Liked by 1 person

    1. Many Thanks Thoughtfully Prepping,Thanks for the tips.Best maybe to keep all treasurable stuff on memory stix etc..Yet, how long would it be afore we could access them again(it all being fixed) Yet, will the elite really allow this to happen, seeing that they’re dependent themselves upon the same systems? & even among feuding nations at the top end (of the elites)there seems to be a certain protocol of respect tween the leaders -i.e. our people can be made to hate one another, beat shit out of each other, whilst there is a mutual respect ‘tween the top dogs. Altho the Israelis are a bit more sincere in their feuds with others as they have indeed gone after the ringleaders of the opposing trouble-making sides. But theirs is an unenviable position, and constantly face an existential threat of literally being driven out into the sea,surrounded as they are by wild dogs who despite all their own inner differences,bickerings, (eg sunni vs shia etc..)are waiting for the kill. But in the main, would the elites really like to be inconvenienced themselves? Am hoping it is this way for all our sakes & they have adequate backups to prevent such a situation from happening, or if it does, there are contingency plans that would come into force. Best being prepared though, so you have the right idea. Take good care friend, wishing you a good weekend. Kindest from pennine:-)

      Liked by 1 person

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s