Forums › Life › Computers, Gadgets & Technology › The Internet › Every email and website to be stored
Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial Big Brother snooping plans.
The plans were shelved by the Labour Government last December but the Home Office is now ready to revive them.
It comes despite the Coalition Agreement promised to “end the storage of internet and email records without good reason”.
That will allow the security and police authorities to track every phone call, email, text message and website visit made by the public if they argue it is needed to tackle crime or terrorism.
The information will include who is contacting whom, when and where and which websites are visited, but not the content of the conversations or messages.
the data is already stored by many ISPs and telephone companies for their internal purposes such as managing traffic at busy times, or can be. the functionality gets built into telephone exchanges etc by companies like Ericsson, Alcatel, Siemens etc however the log files take up room and get deleted every so often and can’t (for obvious reasons) be accessed by every engineer. Many foreign countries already use this data to keep track of their citizens.
It wasn’t that long ago the Post Office was in control of every form of communications and they intercepted and monitored whatever they wanted. There is no way any govt in the world will give up this control, especially when the Internet was designed by universities, governments and big companies to communicate and only begrudgingly allowed to the public.
the govt themselves don’t trust electronic communications for stuff they want to keep secret.
I was wondering if this applied to things like webmail.. they’re telling ISPs to store all emails but does that only include emails that are youremail@yourdomain.com.. what about googlemail? I dont think your ISP has access to that, the government would need to speak to google as far as I’m aware. What about someObscureWebMail.. or the supposedly SafeMail type webmail services?
good comment on that page..
“1984 anyone? Others are right that the criminals will go into cipherspace. I’d imagine the general public will start using it more and more. I2P, Tor, Freenet and all of the anonymous VPN’s are very easy to set up and will make it impossible for the government to look at any communication. So really they are going to have to wade through more encrypted communications from the general public to find any trace of “criminals”.
I expect it would be the mail provided with the ISP’s package – however Google will and do hand over info to feds if they get the correct Court Order as will anywhere else online which wishes to keep their lucrative business running.
@process 402900 wrote:
good comment on that page..
“1984 anyone? Others are right that the criminals will go into cipherspace. I’d imagine the general public will start using it more and more. I2P, Tor, Freenet and all of the anonymous VPN’s are very easy to set up and will make it impossible for the government to look at any communication. So really they are going to have to wade through more encrypted communications from the general public to find any trace of “criminals”.
In the UK its a criminal offence to not hand over a decryption password when requested to do so by the cops.
The people involved with commercial companies funding the VPNs, and other such things will be scrutinised themselves for links to crime/terrorism (even more than they would normally) and if any are found they will be hung out to dry.
Tor is indirectly funded by and used by the Pentagon and money gives power.
Also the security services aren’t so daft as to even think they can go through all the data they see, encrypted or not.
They still get the bulk targets from normal human based intelligence gathering – i.e the citizen who complains about someone else doing something they disagree with, or the backlash caused by the end actions of the targets themselves, be they selling drugs, distributing illegal content, or blowing themselves up on trains.
A lot of communications is lightly encrypted anyway (such as the GSM mobile voice signals) but there are always ways of getting at it from the point it starts off in clear.
@General Lighting 402906 wrote:
In the UK its a criminal offence to not hand over a decryption password when requested to do so by the cops.
Theoretically the cryptographers will always win over the authorities
It is possible to have two layer encryption, ie encrypted data within encrypted data. You put the sensitive data in the second layer, then if requested you hand over the password for the first layer to the authorities. This uncovers a bunch of harmless information but not the sensitive information
And the best thing is, it is mathematically impossible to prove that the second layer encryption exists.
The more authorities attempt to control the exchange of worldwide information the more they are going to fuck themselves over.
in theory yes but a lot of people who use cryptography don’t understand the implications and/or store passwords in an insecure manner. Encrypted data also becomes bloated and often has headers which hint that its encrypted (not unlike a person wearing a balaclava in the high street)
@Iacchus 402907 wrote:
The more authorities attempt to control the exchange of worldwide information the more they are going to fuck themselves over.
that might be the case with raw data but there is little point in communication, or even surveillance for its sake alone. the most effective surveillance is on a known target who is being watched due to the real or suspected end result of their actions – be that a shipment of drugs being delivered, a political protest/meeting, an act of warfare or terrorism.
Even the oppressive regimes of today and yesteryear don’t control all the information exchange – but they still use a variety of methods to stay in power. A lot of authorities these days only use surveillance as a secondary control method – increasingly they let the communications go through unhindered then deal with the consequences of its action by traditional methods – including simple and effective brute force.
Someone posted this on an American forum i go on 3 days ago.
One of them said ‘the only difference between the UK and USA on this matter is that the UK tells them that they’re doing it’ blatantly true.
Yes its obvious when data is encrypted but like I said not at all obvious when a second layer of encryption is hidden within the first. I agree most people who use cryptography won’t understand how to use it effectively, but this will change the more authorities pry. Soon safe and easy-to-use second layer encryption will be available in easy software packages that anyone who is internet savvy and worried about security will use.
Ultimately the user will be the weakest point, as you say with brute force you will be able to recover anything, as very few people can keep secrets under torture. It depends if authorities will be able to get away with that in the future. Presumably only for matters of national security and not people who want to infringe copyright and sell small quantities of drugs for example.
@Iacchus 402907 wrote:
Theoretically the cryptographers will always win over the authorities
It is possible to have two layer encryption, ie encrypted data within encrypted data. You put the sensitive data in the second layer, then if requested you hand over the password for the first layer to the authorities. This uncovers a bunch of harmless information but not the sensitive information
And the best thing is, it is mathematically impossible to prove that the second layer encryption exists.
The more authorities attempt to control the exchange of worldwide information the more they are going to fuck themselves over.
would the file size not effectively reveal there is more data than being displayed? people said certain forms of incription were impossible mathematically to brake but they did find a backdoor that gave access to the key.
@Iacchus 402912 wrote:
Ultimately the user will be the weakest point, as you say with brute force you will be able to recover anything, as very few people can keep secrets under torture. It depends if authorities will be able to get away with that in the future. Presumably only for matters of national security and not people who want to infringe copyright and sell small quantities of drugs for example.
@p0ly 402913 wrote:
i thought they did this already.
well we’ve supposedly moved on from “Ashes to Ashes” days when cops were able to beat confessions out of folk for committing minor theft/drug offences, hopefully it will stay that way.
@1984 402920 wrote:
would the file size not effectively reveal there is more data than being displayed? people said certain forms of incription were impossible mathematically to brake but they did find a backdoor that gave access to the key.
Not necessarily, I’m not hot on the theory behind it but it may involve for example storing the data inside an existing video file, in a matter that only becomes apparent if you know the algorithm used to hide the data, or adding a random padding of data to all encrypted files as standard.
Backdoors is another matter. The person who designed the algorithm has to put the back door in. If you are relying on your service provider to encrypt your emails then they could stick a back door in for the authorities. However if you encrypt a file with a package you acquired yourself written by nerds for nerds, and attach it to an email, they cant do squat.
@General Lighting 402921 wrote:
well we’ve supposedly moved on from “Ashes to Ashes” days when cops were able to beat confessions out of folk for committing minor theft/drug offences, hopefully it will stay that way.
fingers crossed, i imagine if civil disobedience were to get out of hand the rules would change.
0
Voices
21
Replies
Tags
This topic has no tags
Forums › Life › Computers, Gadgets & Technology › The Internet › Every email and website to be stored