Recently in CHIS - Covert Human Intelligence Sources Category

Dear Sirs,

Here are some points which need to be considered in the new Covert Human Intelligence Source Code of Practice:

https://www.gov.uk/government/consultations/covert-surveillance

This is 2014 and somehow, yet again, there is no specific mention of *online* CHIS activities in the Code of Practice - this is inexcusable


Online "Legend" building and maintenance

It may be necessary and proportionate for a CHIS or a Relevant Source to create fake online internet service accounts e.g. Google Gmail, Microsoft Live ID, Twitter, Facebook, blog registrations, online discussion forum registrations etc.

A Relevant Source is essentially an undercover police officer etc. holding a public office, rather than acriminal or other informant, defined in The Regulation of Investigatory Powers (Covert Human Intelligence Sources: Relevant Sources) Order 2013

These may be used to help establish a "Legend" (does nobody else find the use of this Soviet era KGB espionage slang by the Home Office questionable ?)

N.B. by doing so, the CHIS or Relevant Source will almost certainly be breaking the legal Terms and Conditions of the online service.

Since newly created social media accounts which participate in discussions or which try to "follow" or "friend" other users, are less trustworthy and more suspicious, a convincing online persona requires a searchable history of online activity for it to be
accepted.

Therefore any such "Legend" building (which may not yet have been allocated to a particular Relevant Source or investigation or operation) could take years and must also be reviewed by a senior responsible officer and the Surveillance Commissioners, with the same audit trails and regularity as other Relevant Sources i.e. regular review at least annually.


Automated social media software

There are plenty of companies willing to sell or create social media software tools and services for "marketing" or for "social media intelligence", the use of which can help in the creation of believable online "Legends", or allow the gathering of online social media details about an individual or group.

Any use of such tools or services must also be clearly authorised and audited as per Relevant Sources.

online CHIS risk of Disruption , Agents Provocateurs & Entrapment

One particular danger is the temptation for a CHIS or Relevant Source to use automated scripts or software to easily create and try to maintain multiple fake online personalities, often with limited artificial intelligence to send and reply to messages, so as to to create "buzz" or "chatter" online about a particular topic or issue.

They are also used to try to to manipulate (up or down) the ranking of certain keywords in web search engine queries.

These are abused by unethical businesses and by criminals to, for example, manipulate the price (up or down) of stocks and shares ("pump and dump" or "boilerhouse" operators) or to try to hide unfavourable or embarrassing press articles or social media commentary (no matter how truthful) from most naive web search engine users, who rarely progress beyond the first page or two of results.

Such software can also be used to "swarm" or "spam" political discussion forums, pushing a particular viewpoint and stifling free debate through "trolling" and "sock puppetry".

Therefore any use of such software must also be carefully authorised like a Relevant Source and audited by the Surveillance Commissioners. There also needs to be a clear Financial audit trail, as there is could be a substantial cost to the public purse.

Any use of such software for the dubious purpose of "disruption" of criminal or terrorist enterprises is also fraught with danger that it will be used to disrupt and cause collateral damage to innocent people e.g. those involved in political or social campaigns, peaceful demonstrations etc.

Although popular in the USA and with repressive dictatorships, such techniques risk creating online Agent Provocateurs and Entrapment, which should be a legal anathema in the UK.

N.B. even a "justifiable" use of such software or techniques will inevitably cause reputational damage to the trustworthiness of the law enforcement agency which uses them, when, not if, this becomes public.

This new CHIS Code of Practice must clearly forbid any use of Agents Provocateurs or Entrapment, whether online or in person.



Annual report of the Chief Surveillance Commissioner to the Prime Minister and to Scottish Ministers for 2010-2011 (.pdf)

The Chief Surveillance Commissioner, the Rt. Hon. Sir Christopher Rose writes:

Chief Surveillance Commissioner

2.4 I was invited to oversee the removal of 'covert' cameras around specific areas of Birmingham. I have confirmed in writing that no cameras installed specifically for covert use were capable of use before the decision to remove them. All camera equipment has been removed and, by the time this report is published, I will have confirmed that all related 'street furniture' has been removed.

See Spy Blog: Project Champion Review - CCTV and ANPR mass surveillance ghettos in Birmingham

2.5 Towards the end of the year, significant media reporting relating to the activity of an undercover officer authorised to conduct activity against domestic extremism resulted in a number of investigations by Her Majesty's Chief Inspector of Constabulary, SOCA and the IPCC. At the time of this report's preparation these investigations continue. I am monitoring all investigations to ensure consistent and accurate interpretation of legislation. I am reassured by the involvement and publication of the terms of reference of an objective External Reference Group in relation to HMCIC's investigation.

Will any of the senior Police officers and bureaucrats and politicians, who were responsible for the various undercover police spies and agent provocateurs
who have been caught infiltrating the various "environmental" protest groups ever be named and shamed or punished ?

What are their links to the state and private sector powerful vested interests ?

OSC guidance

3.4 I explained in paragraphs 3.6 to 3.8 of my last report that my Commissioners from time to time publish guidance; the latest was published in September 2010. If I continue to find that this document is not readily available to those who need it, or is not promoted by national associations, I may make it publicly available on my website. I have resisted this temptation so far because:

3.4.1 my small office does not have the capacity to answer the inevitable influx of requests for clarification that this would invite;

Surveillance is big business, affecting millions of people in the UK.

The taxpaying public has a right to demand the publication of this document and for clarifications to be answered promptly and fully.

3.4.2 law enforcement agencies in particular are concerned that tactics might be unnecessarily revealed;

3.4.3 it is not a comprehensive document which covers every eventuality and it might be misconstrued or misused; and

That sounds like bureaucratic backside covering.

Publish the guidance anyway.

How can it be misconstrued and misused any more than the Acts of Parliament
and the Codes of Practice upon which it is based ?

If these are not crystal clear then they must be amended.

3.4.4 it is not my remit to provide free legal advice, though I proffer guidance to public authorities which I have a responsibility to review, in order to raise standards and promote consistency.

Public Authorities should make this guidance available to everybody. Why should it be kept secret ?

Time for a Freedom of Information Act request to , say, the Metropolitan Police Service , for a copy of this Guidance.

Why are the RIPA Commissioners still excluded from the list of Public Bodies, even though they absolutely meet and exceed the conditions for such a listing under the FOIA section Schedule 1 ?

3.8 The procedural changes proposed in the Protection of Freedoms Bill involving magistrates in the authorisation process for local authorities and a higher threshold for authorised covert activity will not reduce the frequency or nature of my inspections even if the number of authorisations is reduced. My inspections will continue to focus on the training, knowledge and competence of local authority officials involved in the identification of activity which may be covert and which, if it is, should be authorised under the legislation in a clear and principled way.

So there is not going to be any reduction in Surveillance by public authorities as a result of the proposed Protection of Freedoms Bill ?

3.10 I have commented in previous reports that there appears to be an over-reliance on the capacity of the OSC to examine authorisations. I remain concerned that my limited capacity is misappreciated. Public authorities, particularly law enforcement agencies, should not be lulled into a false sense of confidence if at trial lawyers do not scrutinise relevant documents. Lack of challenge does not imply compliant authorisation. I mentioned last year (paragraph 5.19) that there is an expectation of authorisation. I add this year that authorisations should be of a quality to withstand examination at trial however rarely such scrutiny may occur.

Is this an oblique, soviet style hint, that there are some illegal cases involving authorisations which will not stand up to proper scrutiny ?

3.11 I have considered carefully, but resisted, a few requests to increase the duration between inspections. My inspection capability is limited. The sample of documents which can be examined is small and the inspection can only be regarded as a 'snapshot in time'; it is not an indicator of trends. Often key personnel change in the period between inspections. I recognise the inconvenience of an inspection (especially for law enforcement agencies) but less frequent inspections would not provide the effective oversight which Parliament requires of me.

Which snooping organisations are moaning about the current, totally inadequate level of inspections ?

"the effective oversight which Parliament requires of me."

is a misnomer - it does not actually represent properly transparent and effective oversight, which the public has a right to demand.

3.12 I have still not been given the power to inspect local authorities in Northern Ireland. I am concerned that these authorities have never been inspected.

That is a scandal which should have been rectified years ago.

3.14 I invited representation from the Association of Chief Police Officers Automated Number Plate Reading Working Group to one of the meetings in order better to understand its concerns regarding specific guidance on that topic. It is my intention to provide further guidance, if necessary, before this report is published.

Automated Number Plate Reading (ANPR) is a whole area of mass surveillance which the current and previous Surveillance Commissioner have ineffectively criticised.

No doubt the Chief Surveillance Commissioner will not actually investigate any actual or potential abuses of ANPR, only issue secret Guidance to the snoopers as per paragraph 3.4 above. He may even abrogate this responsibility and leave it to the new RIPA style Surveillance Camera Commissioner, proposed in the Protection of Freedoms Bill, to deal with.

OSC website

3.18 I have not had the capacity to improve my website. The Cabinet Office has recently decided that all government related websites, including those of Non Departmental Public Bodies such as mine, will migrate to a corporate process. It is essential that I remain independent and be seen to be independent.

At least the OSC actually has a website, unlike the other two RIPA Commissioners.

Neither the Chief Surveillance Commissioner nor the other two RIPA Commissioners
will ever be "seen to be independent" whilst they reports only to Ministers rather than to Parliament and the public directly. and whilst they weasel out of compliance with the Freedom of Information Act.

3.25 In order to achieve a reduced budget for the financial year 2011 - 2012 I have reluctantly reduced my capacity by one Inspector and the Secretary post and downgraded a further post. My capacity has always been limited and I wrote to the Home Secretary to explain the impact of reducing my budget by £140K. I recognise the severity of the country's financial situation but a reduction of nine percent has serious operational repercussions in a tiny organisation. I am only able to work within this tight limit by reducing inspectorate and secretarial staff.

How about the Home Office reducing the amount of Surveillance it funds by 10 per cent ?

4.2 Statistics for directed surveillance and the use of CHIS have been supplied by all law enforcement agencies. I am pleased to report that all other public authorities have responded to my request for this statistical information, so this year's figures are again based on a one hundred per cent return.

4.3 It is important that these statistics are not misconstrued. Reports relating to local authority use of covert surveillance have been misleading and often inaccurate. I have identified no systemic attempts to misuse legislation. There are, occasionally and inevitably, misjudgments but these are rarely the result of abuse of power.

[...]

Misjudgments about proportionality etc. in the exercise of such powerful and dangerous legislation are an abuse of power, the only question is whether such inevitable human lapses within an inhuman system of surveillance bureaucracy, should be punished or not.

Given the secrecy which surrounds such surveillance, there is no effective system of public apology and financial compensation for the victims of such misjudgments - the Courts are only available to the rich and are useless for the protection of privacy.

The Surveillance Commissioner should "name and shame" the culprits in this Report, which is his only sanction, pathetically weak though that is.

Section 49 - encryption

4.11 During the period to which this report relates, NTAC granted 26 approvals from 30 applications. Permission was not sought in eight cases after NTAC approval. From the remainder, 17 had permission granted by a Circuit Judge, of which 12 have so far been served. Four were complied with and two were not; the remainder were still being processed. Five people were charged with an offence, of whom it was decided not to prosecute two. So far there has been one conviction with other cases still to be decided.

4.12 The conviction related to the possession of indecent images of children. Other offences include: domestic extremism, insider dealing, fraud, evasion of excise duty, drug trafficking and drug possession with intent to supply.

Not the complete absence of the words "terrorism" or "national security".

NTAC = National technical Assistance Centre, which has lurked somewhere under the GCHQ empire since 2006.

4.13 These statistics are provided by NTAC which is able to be accurate regarding the number of approvals it has granted. But it is reliant on those processing notices to keep it informed regarding progress. It appears that there has been delay in serving some notices after approval has been granted (hence the difference between the number approved and the number served). Notices, once approved, should be served without delay.

Delays by the legalistic surveillance bureaucracy ? Who could have imagined that, apart from, say Franz Kafka.

Legislation

5.4 At the time of writing, the Protection of Freedoms Bill is at the Committee stage.

[...]

it is not apparent why local authorities should be treated differently from other public authorities

Agreed

[...]

The higher threshold in the proposed legislation will reduce the number of cases in which local authorities have the protection of RIPA when conducting covert surveillance; it will not prevent the use of those tactics in cases where the threshold is not reached but where it may be necessary and proportionate to obtain evidence covertly and there will be no RIPA audit trail. Part I of RIPA makes unauthorised interception unlawful. In contrast, Part II makes authorised surveillance lawful but does not make unauthorised surveillance unlawful.

[...]

Why should the minority users of RIPA surveillance powers i.e. Local Authorities have to be authorised by Magistrates, when the vast bulk of request by the Police and Intelligence Agencies and other Government Departments e.g. DWP, HMRC etc. will
continue to be self authorised ? They should all have independent judicial warrant oversight of every application, before (or in emergencies, immediately after) the privacy intrusion happens, not just a RIPA Commissioner audit of a sample of requests every year or two.

5.11 We have evidence that some public authorities are purchasing highly intrusive technical capability without properly considering the legislative implications of its use. For instance, a single digital camera is capable of coverage equivalent to or greater than a larger number of analogue cameras; but the reduction in the number of cameras does not reduce privacy concerns. We have seen noise monitoring equipment that is capable of 'permanent' monitoring even though it has not been activated to store a recording in an easily interpreted form and I am not convinced that data is irretrievable. For this reason, my Commissioners have provided guidance that authorising officers should avoid accepting loose terminology and understand the capability of the equipment. Corporately, public authorities should ensure that equipment which is more capable than can be justified should not easily be procured.

Vaguely hoping that the purchasing of intrusive technology will somehow not happen is foolish - e.g. digital cameras are cheaper than analogue ones these days.

There should be detailed consideration of the technological capabilities being used or potentially abused, by those who supposedly, independently, scrutinise the proportionality of each application for covert surveillance.

The Rt. Hon. Sir Christopher Rose makes this interesting legal point regarding Covert Human Intelligence Sources (CHIS):

Availability of powers

5.15 Many public authorities which are not law enforcement agencies prefer not to use CHIS. Their reasoning usually reflects a laudable desire to use less intrusive methods or a belief that they are ill-prepared to manage them compliantly. The desire is good practice and the belief is often accurate. However, the ease with which statutory criteria are met is often misjudged; a person, irrespective of motive, may be a CHIS if he uses a personal or other relationship to pass information to a public authority in a manner that is covert in relation to the person to whom the information refers. This may not be of significant concern if the reporting is occasional or when the information attracts no action or when it has been volunteered. It should be a concern if the individual reports information on which action is likely to be taken or if the information is likely to be retained for later analysis. Public authorities may not ignore this because they do not wish to use CHIS. In many cases, public authorities wish to retain the power but make no effort to prepare properly for the eventuality. In other cases, the public authority has decided that it no longer requires the capability, without recognising that it is dealing with persons who should be authorised as a CHIS. I have no power to insist on proper training or retention of powers. I can only draw the risk to the attention of the relevant authority. But I take this opportunity to remind public authorities that the threshold set by Parliament is low and that there is significant risk in reliance on a person within the statutory definition of a CHIS who is not authorised.

We will have plenty of criticism of the Home Office's reluctant
Review of counter-terrorism and security powers,hopefully sometime this weekend.

Here is a copy of the

Review of counter-terrorism and security powers - findings and recommendations (PDF file - 428kb)

for those of you who do not want to give the Home Office website (and the US owned , commercial Sitestat OnClick web tracking / snooping system which they employ) your IP address and web browser details etc.

As always, the Chief Surveillance Commissioner tends to reveal a little more than either the Interception of Communications Commissioner or the Intelligence Services Commissioner ever do in their Annual reports.

Annual report of the Chief Surveillance Commissioner to the Prime Minister and to Scottish Ministers for 2009-2010 (.pdf)

Unlike the other two RIPA Commissioners, Sir Christopher Rose does actually have something to report about RIPA Part II:

CHIS = Covert Human Intelligence Sources
i.e. spies , undercover agents, paid informers, unpaid informers etc.

CHIS

4.8 There were 5,320 CHIS recruited by law enforcement agencies during the year; 4,495 were cancelled (including some who were recruited during the previous year) ; and 3,767 were in place at the end of March 2010. The figures for the previous year which were 4,278, 4,202 and 3,722 indicate a slight increase in usage.

4.9 During the current reporting year other public authorities recruited 229 CHIS of whom 182 were cancelled during the year with 90 in place on 31 March 2010.

During the previous year 234 were recruited, 153 cancelled and 106 were in place at the end of the year. Again just over half of CHIS usage was by government departments. The light use of RIPA/RIP(S)A powers by local authorities is even more pronounced in relation to CHIS recruitment. 97% recruited five or fewer and 86% did not use CHIS.

There are some criticisms of CHIS management and tradecraft:

5.9 There are too many occasions when inspections reveal poor tradecraft in managing CHIS. Infrequent physical meetings and reliance on communication by text messages are rarely adequate. There have also been instances where law enforcement officers have pretended to be the CHIS when communicating with his associates online, without properly providing the CHIS with an alibi. It seems to me that this is an unsafe practice.

The protection of CHIS is one of the main reasons cited for the vast amount of secrecy and lack of freedom of information and transparency in the Police and Intelligence Agencies etc.

Such amateurism in the handling of CHIS should be punished by removal of those responsible from any positions of power or authority involving CHIS - they could literally get people killed through such incompetence.

Encryption Keys and RIPA Part III

At last a few details about RIPA Part III:

NTAC = National Technical; Assistance Centre, now run by GCHQ, politically controlled by the Foreign Secretary.

Section 49 - encryption

4.10 During the period reported on, NTAC granted 38 approvals. Of these, 22 had permission granted by a Circuit Judge, of which 17 have so far been served. Six were complied with and seven were not complied with, the remainder were still being processed. Of the seven that were not complied with, five people were charged with an offence, one was not charged and the other is still being processed. So far there has been one conviction with other cases still to be decided.

4.11 The conviction related to the possession of indecent images of children and this offence is the main reason why section 49 notices are served. Other offences include: insider dealing, illegal broadcasting, theft, evasion of excise duty and aggravated burglary. It is of note that only one notice was served in relation to terrorism offences.

These statistics further aggravate the injustice to someone who does not fall into any of these categories see the previous Spy Blog article: "JFL" provides some more details about his imprisonment for refusing to divulge his cryptographic keys under a RIPA Part III section 49 notice

4.12 These statistics are provided by NTAC which is able to be accurate regarding the number of approvals it has granted. But it is reliant on those processing notices to keep it informed regarding progress. It appears that there has been delay in serving some notices after approval has been granted (hence the difference between the number approved and the number served) . Notices, once approved, should be served without delay. If delays continue, I will require an explanation.

Sir Christopher does not seem to have delved into whether or not the de-crypted plaintext or the cryptographic keys were actually stored securely, ideally also using strong encryption or not, once they had been seized as evidence through the section 49 orders.

Unless and until the public is reassured about that, then there will be lots of non-cooperation from businesses which risk massive "collateral damage" to their core business systems, as a result of police investigations involving only part of their computer infrastructure, or a few employees or customers.


There is nothing specific about Automatic Number Plate Recognition (ANPR), but there is a section on CCTV:

Closed Circuit TeleVision - CCTV

CCTV

5.22 My Chief Inspector has met the Interim CCTV Regulator and, as a member of the Independent Advisors Group, he will represent me in the development of the National CCTV Strategy.

How things have changed. Previously the Surveillance Commissioners took no interest in overt or covert CCTV spy cameras.

5.23 I am pleased by the proliferation of protocols between local authorities and police forces. In particular, I am satisfied that there is a wider acceptance of the need for authorisations to be shown to those responsible for using cameras covertly. But I am concerned at the number of inspections reporting the ability of some police forces to control, remotely, cameras owned, solely by or in partnership with, a local council. Sometimes control can be taken without the knowledge of the council CCTV Control Room or the guarantee that an appropriate authorisation exists. Equally, there is no guarantee that the person remotely operating the camera is appropriately qualified to conduct such an operation. Protocols should clarify the procedures to be followed when control is taken by others outside the CCTV Control Room and ensure that suitable safeguards are in place to prevent misuse.

Report of the Intelligence Services Commissioner for 2009 (.pdf), by the Rt,Hon. Sir Peter Gibson

Just like all the previous Intelligence Services Commissioner reports, the lack of public detail makes a mockery of the whole RIPA oversight process - it takes 16 pages to say almost nothing at all.

Yet again, there has been no call for Sir Peter to oversee any RIPA Part III encryption key or plaintext orders. This appears to have been left to the Chief Surveillance Commissioner.

Part III of RIPA

34. As I have noted above, Part III of RIPA came into force on 1 October 2007. However, no notification of any directions to require disclosure in respect of protected electronic information has been given to me in 2009 and there has been no exercise or performance of powers and duties under Part III for me to review.

The Intelligence Services Commissioner has gone through the motions with the Identity Scheme Commissioner Sir Joseph Pilling, bearing in mind the scrapping of the scheme which is still in progress.

11. On 16 November 2009 the Identity Minister, Meg Hillier, signed the Commencement Order allowing the Identity and Passport Service to begin issuing identity cards to members of the public living or working in Greater Manchester with effect from 30 November 2009 though it should be noted that identity cards were also made available to Home Office/Identity and Passport Service civil servants as well as airside workers in Manchester and London City Airport for a few weeks beforehand. On 10 December 2009 I had a useful meeting with Sir Joseph Pilling, the Identity Commissioner, in which we discussed our respective areas of responsibility under the ICA. I informed him that I did not envisage that I would need to obtain information about the acquisition, storage and use of data in the National Identity Register by organisations other than the intelligence services. At the time of writing this Report I am not aware of any acquisition, storage and use made by the intelligence services pursuant to the ICA of information recorded in the National Identity Register and in view of the intended repeal of the ICA it is unlikely that there will be any such acquisition, storage or use

Obliviously he has a good professional working contacts with the Intelligence agencies, but does that automatically taint him as the chairman of the Inquiry looking into allegations of complicity in torture of foreign terrorist suspects by MI5 or MI6 etc, appointed by PM David Cameron ?

He is already looking at:

Guidance on detention and interviewing of detainees by intelligence officers and military personnel

39. On 18 March 2009 the Prime Minister made a statement to Parliament about the detention and interviewing of detainees by intelligence officers and military personnel and announced my agreement to his request that the Intelligence Services Commissioner should monitor compliance by the intelligence agencies with the consolidated guidance on the standards to be followed during the detention and interviewing of detainees. My role in monitoring compliance will not commence until the consolidated guidance has been published. Such publication has not yet occurred,

The Report contains exactly the same words as the Interception of Communications Commissioner regarding the Investigatory Tribunal. A public agency broke the law, but will not be published for doing so. Why can they not at least be named and shamed in public ? There cannot be any "national security" grounds for not doing so.

One Parliamentary Bill which did just complete its passage through Parliament without the wretched "wash up" process was the largely symbolic Bribery Act 2010

We criticised this Bill when it first appeared for its flawed attempt to correct the stupid Anti Terrorism Crime and Security Act 200 Part 12 Bribery and Corruption sections 108 to 110. , which made it a criminal offence for the intelligence agencies or for the military to ever bribe any foreign officials either for spy recruitment purposes or to help in the escape of military personnel trapped behind enemy lines etc.

Presumably the intelligence agencies and the military have simply been ignoring that stupid law ever since.

See: Bribery Bill 2009 clause 12 - some Secret Intelligence Service MI6 or Security Service MI5 exemptions, but why should Local Authority Trading Standards etc. ever be allowed to bribe anyone ?


13 Defence for certain bribery offences etc.

(1) It is a defence for a person charged with a relevant bribery offence to prove that the person's conduct was necessary for--

(a) the proper exercise of any function of an intelligence service, or
(b) the proper exercise of any function of the armed forces when engaged on active service.

(2) The head of each intelligence service must ensure that the service has in place arrangements designed to ensure that any conduct of a member of the service which would otherwise be a relevant bribery offence is necessary for a purpose falling within subsection (1)(a).

(3) The Defence Council must ensure that the armed forces have in place arrangements designed to ensure that any conduct of--

(a) a member of the armed forces who is engaged on active service, or
(b) a civilian subject to service discipline when working in support of any person falling within paragraph (a),

which would otherwise be a relevant bribery offence is necessary for a purpose falling within subsection (1)(b).

(4) The arrangements which are in place by virtue of subsection (2) or (3) must be arrangements which the Secretary of State considers to be satisfactory.

(5) For the purposes of this section, the circumstances in which a person's conduct is necessary for a purpose falling within subsection (1)(a) or (b) are to be treated as including any circumstances in which the person's conduct--

(a) would otherwise be an offence under section 2, and
(b) involves conduct by another person which, but for subsection (1)(a) or (b), would be an offence under section 1.

(6) In this section--

"active service" means service in--

(a) an action or operation against an enemy,
(b) an operation outside the British Islands for the protection of life or property, or
(c) the military occupation of a foreign country or territory,

"armed forces" means Her Majesty's forces (within the meaning of the Armed Forces Act 2006),

"civilian subject to service discipline" and "enemy" have the same meaning as in the Act of 2006,

Even we noticed that the original text of the Bill did not specify the Armed Forces Act 2006

"GCHQ" has the meaning given by section 3(3) of the Intelligence Services Act 1994,

"head" means--

(a) in relation to the Security Service, the Director General of the Security Service,
(b) in relation to the Secret Intelligence Service, the Chief of the Secret Intelligence Service, and
(c) in relation to GCHQ, the Director of GCHQ,

"intelligence service" means the Security Service, the Secret Intelligence Service or GCHQ,

"relevant bribery offence" means--

(a) an offence under section 1 which would not also be an offence under section 6,
(b) an offence under section 2,
(c) an offence committed by aiding, abetting, counselling or procuring the commission of an offence falling within paragraph (a) or (b),
(d) an offence of attempting or conspiring to commit, or of inciting the commission of, an offence falling within paragraph (a) or (b), or
(e) an offence under Part 2 of the Serious Crime Act 2007 (encouraging or assisting crime) in relation to an offence falling within paragraph (a) or (b).

Compared with the original text of the Bill when it was introduced, there is an improvement, with the removal of the huge attempted exemption

(a) the prevention, detection or investigation by, or on behalf of, a law enforcement agency of serious crime,

and

"law enforcement agency" means a public authority acting in pursuance of a duty of a public nature under the law of any part of the United Kingdom to prevent, detect or investigate crime,

which would have allowed the Serious Organised Crime Agency, any Police force, or HM Customs and Excise or the UK Border Agency or even Local Authority Trading Standards officials or even for private sector sub contractors working on behalf of Whitehall or Local Government departments investigating alleged fraud etc. to bribe officials in the UK or the rest of the world, without any scrutiny.

None of these public bodies should ever be allowed to bribe anyone, ever. To be fair to them, most of them would never wish to have such a power granted or imposed on them either.

Similarly GCHQ does not need the power to bribe people with impunity, but, for no good reason, this Act lumps them in with MI5 the Security Service and MI6 the Secret Intelligence Service, who may well do so.

Surely any conceivable scenario involving bribery of say, foreign Government telecommunications monopoly or company officials, which GCHQ might have an interest in, could be handled by MI6 the Secret Intelligence Service or by by Active Service Military personnel in the field ?

GCHQ should not have and should not seek to have, any of their personnel involved in the recruitment of Covert Human Intelligence Sources, the recruitment and proper handling of which must surely apply to any attempts to bribe foreign officials. This should be left to MI6 the Secret Intelligence Service or, in limited counter-intelligence operations, to MI5 the Security Service.

There is no independent scrutiny of the "arrangements" which the heads of the intelligence agencies or the Defence Council have to put in place according to the clause above.

There are no penalties for officials of those agencies or the armed forces, if they contravene such "arrangements".

Presumably these unspecified "arrangements" will involve some more bureaucratic form filling and blanket rubber stamp self authorisations, which will be kept secret from the public and Parliament, under the claim of "national security" exemptions to the Freedom of Information Act etc.

There is no mechanism for independent investigation of individual cases of alleged bribery involving people hiding behind "national security" secrecy.

There is not even any duty imposed on Ministers to report to Parliament and the public how much public money has been spent on bribes in total each year.
.


Another bit of proposed legislation, which will hopefully be lost due to the forthcoming General Election, is the flawed Bribery Bill 2009

For some reason it has been introduced by Jack Straw's Ministry of (In)Justice in the House of Lords.

Note that there are no provisions to strengthen the legislation against corrupt lobbying by Members of the House of Commons or of the House of Lords or of senior Whitehall Sir Humphreys.
.
Incredibly, it appears that this Labour Government still intends to make it illegal for, say the Secret Intelligence Service MI6 to bribe a Foreign Government official for information or influence, even where this serves the United Kingdom's national security interests.

Conversely, they are giving any "law enforcement agency", an unfathomable exemption from bribery offences, "for the prevention or detection" of Serious Crime. This includes Local Authority Trading Standards or Environmental Health departments, who are notorious for their lack of expertise and training, when it comes to "simple" Regulation of Investigatory Powers Act use of Covert Human Intelligence Sources.

What conceivable excuse have these "law enforcement agencies", including the Police or HM Revenue and Customs, got for bribing anyone whatsoever ?


The Home Office has published its summary of the responses to the public consultation Regulation of Investigatory Powers Act 2000: Consolidating orders and codes of practice (1.7Mb .pdf) which ran from April to July.

The Regulation of Investigatory Powers Act 2000: consolidating orders and codes of practice - responses to the consultation (269Kb .pdf) says that:

The 222 respondents comprised:

  • 104 local authorities;
  • 9 local authority associations;
  • 10 law enforcement bodies;
  • 9 other public authorities;
  • 6 legal reform or scrutiny bodies;
  • 5 communications service providers;
  • 3 training organisations;
  • 2 housing agencies;
  • 2 oversight commissioners (the Chief Surveillance Commissioner and the Interception of Communications Commissioner);
  • 68 members of the public (of whom 27 had experience of working with RIPA); and
  • 4 other NGOs with interests in the prosecution of offenders, waste management, computing and children's rights.

Spy Blog raised the following issues in response to this public consultation, with little success:

1) Mandatory use of strong Encryption should be explicit in the Regulations and Codes of Practice

2) Automatic Number Plate Recognition data needs to be brought within the RIPA framework

3) Sub-division of "Communications Data" to now include a separate Location Based Services data category

4) All Local Authorities should have their Intrusive Surveillance and Covert Human Intelligence Source powers removed. Access to Subscriber Details should continue, but no LA access to Location Based Services data.

5) The abuse of Children as Covert Human Intelligence Sources

About this blog

This United Kingdom based blog attempts to draw public attention to, and comments on, some of the current trends in ever cheaper and more widespread surveillance technology being deployed to satisfy the rapacious demand by state and corporate bureaucracies and criminals for your private details, and the technological ignorance of our politicians and civil servants who frame our legal systems.

The hope is that you the readers, will help to insist that strong safeguards for the privacy of the individual are implemented, especially in these times of increased alert over possible terrorist or criminal activity. If the systems which should help to protect us can be easily abused to supress our freedoms, then the terrorists will have won.

We know that there are decent, honest, trustworthy individual politicians, civil servants, law enforcement, intelligence agency personnel and broadcast, print and internet journalists etc., who often feel powerless or trapped in the system. They need the assistance of external, detailed, informed, public scrutiny to help them to resist deliberate or unthinking policies, which erode our freedoms and liberties.

Email & PGP Contact

Please feel free to email your views about this blog, or news about the issues it tries to comment on.

blog@spy[dot]org[dot]uk

Our PGP public encryption key is available for those correspondents who wish to send us news or information in confidence, and also for those of you who value your privacy, even if you have got nothing to hide.

We offer this verifiable GPG / PGP public key (the ID is available on several keyservers, twitter etc.) as one possible method to establish initial contact with whistleblowers and other confidential sources, if it suits their Threat Model or Risk Appetite, but will then try to establish other secure, anonymous communications channels e.g. encrypted Signal Messenger via burner devices,or face to face meetings, postal mail or dead drops etc. as appropriate.

Current PGP Key ID: 0x1DBD6A9F0FACAD30 which will expire on 29th August 2021.

pgp-now.gif
You can download a free copy of the PGP encryption software from www.pgpi.org
(available for most of the common computer operating systems, and also in various Open Source versions like GPG)

We look forward to the day when UK Government Legislation, Press Releases and Emails etc. are Digitally Signed so that we can be assured that they are not fakes. Trusting that the digitally signed content makes any sense, is another matter entirely.

Hints and Tips for Whistleblowers and Political Dissidents

Please take the appropriate precautions if you are planning to blow the whistle on shadowy and powerful people in Government or commerce, and their dubious policies. The mainstream media and bloggers also need to take simple precautions to help preserve the anonymity of their sources e.g. see Spy Blog's Hints and Tips for Whistleblowers - or use this easier to remember link: http://ht4w.co.uk

BlogSafer - wiki with multilingual guides to anonymous blogging

Digital Security & Privacy for Human Rights Defenders manual, by Irish NGO Frontline Defenders.

Everyone’s Guide to By-Passing Internet Censorship for Citizens Worldwide (.pdf - 31 pages), by the Citizenlab at the University of Toronto.

Handbook for Bloggers and Cyber-Dissidents - March 2008 version - (2.2 Mb - 80 pages .pdf) by Reporters Without Borders

Reporters Guide to Covering the Beijing Olympics by Human Rights Watch.

A Practical Security Handbook for Activists and Campaigns (v 2.6) (.doc - 62 pages), by experienced UK direct action political activists

Anonymous Blogging with Wordpress & Tor - useful step by step guide with software configuration screenshots by Ethan Zuckerman at Global Voices Advocacy. (updated March 10th 2009 with the latest Tor / Vidalia bundle details)

Links

Watching Them, Watching Us

London 2600

Our UK Freedom of Information Act request tracking blog

WikiLeak.org - ethical and technical discussion about the WikiLeaks.org project for anonymous mass leaking of documents etc.

Privacy and Security

Privacy International
United Kingdom Privacy Profile (2011)

Cryptome - censored or leaked government documents etc.

Identity Project report by the London School of Economics
Surveillance & Society the fully peer-reviewed transdisciplinary online surveillance studies journal

Statewatch - monitoring the state and civil liberties in the European Union

The Policy Laundering Project - attempts by Governments to pretend their repressive surveillance systems, have to be introduced to comply with international agreements, which they themselves have pushed for in the first place

International Campaign Against Mass Surveillance

ARCH Action Rights for Children in Education - worried about the planned Children's Bill Database, Connexions Card, fingerprinting of children, CCTV spy cameras in schools etc.

Foundation for Information Policy Research
UK Crypto - UK Cryptography Policy Discussion Group email list

Technical Advisory Board on internet and telecomms interception under RIPA

European Digital Rights

Open Rights Group - a UK version of the Electronic Frontier Foundation, a clearinghouse to raise digital rights and civil liberties issues with the media and to influence Governments.

Digital Rights Ireland - legal case against mandatory EU Comms Data Retention etc.

Blindside - "What’s going to go wrong in our e-enabled world? " blog and wiki and Quarterly Report will supposedly be read by the Cabinet Office Central Sponsor for Information Assurance. Whether the rest of the Government bureaucracy and the Politicians actually listen to the CSIA, is another matter.

Biometrics in schools - 'A concerned parent who doesn't want her children to live in "1984" type society.'

Human Rights

Liberty Human Rights campaigners

British Institute of Human Rights
Amnesty International
Justice

Prevent Genocide International

asboconcern - campaign for reform of Anti-Social Behavior Orders

Front Line Defenders - Irish charity - Defenders of Human Rights Defenders

Internet Censorship

OpenNet Initiative - researches and measures the extent of actual state level censorship of the internet. Features a blocked web URL checker and censorship map.

Committee to Protect Bloggers - "devoted to the protection of bloggers worldwide with a focus on highlighting the plight of bloggers threatened and imprisoned by their government."

Reporters without Borders internet section - news of internet related censorship and repression of journalists, bloggers and dissidents etc.

Judicial Links

British and Irish Legal Information Institute - publishes the full text of major case Judgments

Her Majesty's Courts Service - publishes forthcoming High Court etc. cases (but only in the next few days !)

House of Lords - The Law Lords are currently the supreme court in the UK - will be moved to the new Supreme Court in October 2009.

Information Tribunal - deals with appeals under FOIA, DPA both for and against the Information Commissioner

Investigatory Powers Tribunal - deals with complaints about interception and snooping under RIPA - has almost never ruled in favour of a complainant.

Parliamentary Opposition

The incompetent yet authoritarian Labour party have not apologised for their time in Government. They are still not providing any proper Opposition to the current Conservative - Liberal Democrat coalition government, on any freedom or civil liberties or privacy or surveillance issues.

UK Government

Home Office - "Not fit for purpose. It is inadequate in terms of its scope, it is inadequate in terms of its information technology, leadership, management systems and processes" - Home Secretary John Reid. 23rd May 2006. Not quite the fount of all evil legislation in the UK, but close.

No. 10 Downing Street Prime Minister's Official Spindoctors

Public Bills before Parliament

United Kingdom Parliament
Home Affairs Committee of the House of Commons.

House of Commons "Question Book"

UK Statute Law Database - is the official revised edition of the primary legislation of the United Kingdom made available online, but it is not yet up to date.

FaxYourMP - identify and then fax your Member of Parliament
WriteToThem - identify and then contact your Local Councillors, members of devolved assemblies, Member of Parliament, Members of the European Parliament etc.
They Work For You - House of Commons Hansard made more accessible ? UK Members of the European Parliament

Read The Bills Act - USA proposal to force politicians to actually read the legislation that they are voting for, something which is badly needed in the UK Parliament.

Bichard Inquiry delving into criminal records and "soft intelligence" policies highlighted by the Soham murders. (taken offline by the Home Office)

ACPO - Association of Chief Police Officers - England, Wales and Northern Ireland
ACPOS Association of Chief Police Officers in Scotland

Online Media

Boing Boing

Need To Know [now defunct]

The Register

NewsNow Encryption and Security aggregate news feed
KableNet - UK Government IT project news
PublicTechnology.net - UK eGovernment and public sector IT news
eGov Monitor

Ideal Government - debate about UK eGovernment

NIR and ID cards

Stand - email and fax campaign on ID Cards etc. [Now defunct]. The people who supported stand.org.uk have gone on to set up other online tools like WriteToThem.com. The Government's contemptuous dismissal of over 5,000 individual responses via the stand.org website to the Home Office public consultation on Entitlement Cards is one of the factors which later led directly to the formation of the the NO2ID Campaign who have been marshalling cross party opposition to Labour's dreadful National Identity Register compulsory centralised national biometric database and ID Card plans, at the expense of simpler, cheaper, less repressive, more effective, nore secure and more privacy friendly alternative identity schemes.

NO2ID - opposition to the Home Office's Compulsory Biometric ID Card
NO2ID bulletin board discussion forum

Home Office Identity Cards website
No compulsory national Identity Cards (ID Cards) BBC iCan campaign site
UK ID Cards blog
NO2ID press clippings blog
CASNIC - Campaign to STOP the National Identity Card.
Defy-ID active meetings and protests in Glasgow
www.idcards-uk.info - New Alliance's ID Cards page
irefuse.org - total rejection of any UK ID Card

International Civil Aviation Organisation - Machine Readable Travel Documents standards for Biometric Passports etc.
Anti National ID Japan - controversial and insecure Jukinet National ID registry in Japan
UK Biometrics Working Group run by CESG/GCHQ experts etc. the UK Government on Biometrics issues feasability
Citizen Information Project feasability study population register plans by the Treasury and Office of National Statistics

CommentOnThis.com - comments and links to each paragraph of the Home Office's "Strategic Action Plan for the National Identity Scheme".

De-Materialised ID - "The voluntary alternative to material ID cards, A Proposal by David Moss of Business Consultancy Services Ltd (BCSL)" - well researched analysis of the current Home Office scheme, and a potentially viable alternative.

Surveillance Infrastructures

National Roads Telecommunications Services project - infrastruture for various mass surveillance systems, CCTV, ANPR, PMMR imaging etc.

CameraWatch - independent UK CCTV industry lobby group - like us, they also want more regulation of CCTV surveillance systems.

Every Step You Take a documentary about CCTV surveillance in the Uk by Austrian film maker Nino Leitner.

Transport for London an attempt at a technological panopticon - London Congestion Charge, London Low-Emission Zone, Automatic Number Plate Recognition cameras, tens of thousands of CCTV cameras on buses, thousands of CCTV cameras on London Underground, realtime road traffic CCTV, Iyster smart cards - all handed over to the Metropolitan Police for "national security" purposes, in real time, in bulk, without any public accountibility, for secret data mining, exempt from even the usual weak protections of the Data Protection Act 1998.

RFID Links

RFID tag privacy concerns - our own original article updated with photos

NoTags - campaign against individual item RFID tags
Position Statement on the Use of RFID on Consumer Products has been endorsed by a large number of privacy and human rights organisations.
RFID Privacy Happenings at MIT
Surpriv: RFID Surveillance and Privacy
RFID Scanner blog
RFID Gazette
The Sorting Door Project

RFIDBuzz.com blog - where we sometimes crosspost RFID articles

Genetic Links

DNA Profiles - analysis by Paul Nutteing
GeneWatch UK monitors genetic privacy and other issues
Postnote February 2006 Number 258 - National DNA Database (.pdf) - Parliamentary Office of Science and Technology

The National DNA Database Annual Report 2004/5 (.pdf) - published by the NDNAD Board and ACPO.

Eeclaim Your DNA from Britain's National DNA Database - model letters and advice on how to have your DNA samples and profiles removed from the National DNA Database,in spite of all of the nureacratic obstacles which try to prevent this, even if you are innocent.

Miscellanous Links

Michael Field - Pacific Island news - no longer a paradise
freetotravel.org - John Gilmore versus USA internal flight passports and passenger profiling etc.

The BUPA Seven - whistleblowers badly let down by the system.

Tax Credit Overpayment - the near suicidal despair inflicted on poor, vulnerable people by the then Chancellor Gordon Brown's disasterous Inland Revenue IT system.

Fassit UK - resources and help for those abused by the Social Services Childrens Care bureaucracy

Former Spies

MI6 v Tomlinson - Richard Tomlinson - still being harassed by his former employer MI6

Martin Ingram, Welcome To The Dark Side - former British Army Intelligence operative in Northern Ireland.

Operation Billiards - Mitrokhin or Oshchenko ? Michael John Smith - seeking to overturn his Official Secrets Act conviction in the GEC case.

The Dirty Secrets of MI5 & MI6 - Tony Holland, Michael John Smith and John Symond - stories and chronologies.

Naked Spygirl - Olivia Frank

Blog Links

e-nsecure.net blog - Comments on IT security and Privacy or the lack thereof.
Rat's Blog -The Reverend Rat writes about London street life and technology
Duncan Drury - wired adventures in Tanzania & London
Dr. K's blog - Hacker, Author, Musician, Philosopher

David Mery - falsely arrested on the London Tube - you could be next.

James Hammerton
White Rose - a thorn in the side of Big Brother
Big Blunkett
Into The Machine - formerly "David Blunkett is an Arse" by Charlie Williams and Scribe
infinite ideas machine - Phil Booth
Louise Ferguson - City of Bits
Chris Lightfoot
Oblomovka - Danny O'Brien

Liberty Central

dropsafe - Alec Muffett
The Identity Corner - Stefan Brands
Kim Cameron - Microsoft's Identity Architect
Schneier on Security - Bruce Schneier
Politics of Privacy Blog - Andreas Busch
solarider blog

Richard Allan - former Liberal Democrat MP for Sheffield Hallam
Boris Johnson Conservative MP for Henley
Craig Murray - former UK Ambassador to Uzbekistan, "outsourced torture" whistleblower

Howard Rheingold - SmartMobs
Global Guerrillas - John Robb
Roland Piquepaille's Technology Trends

Vmyths - debunking computer security hype

Nick Leaton - Random Ramblings
The Periscope - Companion weblog to Euro-correspondent.com journalist network.
The Practical Nomad Blog Edward Hasbrouck on Privacy and Travel
Policeman's Blog
World Weary Detective

Martin Stabe
Longrider
B2fxxx - Ray Corrigan
Matt Sellers
Grits for Breakfast - Scott Henson in Texas
The Green Ribbon - Tom Griffin
Guido Fawkes blog - Parliamentary plots, rumours and conspiracy.
The Last Ditch - Tom Paine
Murky.org
The (e)State of Tim - Tim Hicks
Ilkley Against CCTV
Tim Worstall
Bill's Comment Page - Bill Cameron
The Society of Qualified Archivists
The Streeb-Greebling Diaries - Bob Mottram

Your Right To Know - Heather Brooke - Freedom off Information campaigning journalist

Ministry of Truth _ Unity's V for Vendetta styled blog.

Bloggerheads - Tim Ireland

W. David Stephenson blogs on homeland security et al.
EUrophobia - Nosemonkey

Blogzilla - Ian Brown

BlairWatch - Chronicling the demise of the New Labour Project

dreamfish - Robert Longstaff

Informaticopia - Rod Ward

War-on-Freedom

The Musings of Harry

Chicken Yoghurt - Justin McKeating

The Red Tape Chronicles - Bob Sullivan MSNBC

Campaign Against the Legislative and Regulatory Reform Bill

Stop the Legislative and Regulatory Reform Bill

Rob Wilton's esoterica

panGloss - Innovation, Technology and the Law

Arch Rights - Action on Rights for Children blog

Database Masterclass - frequently asked questions and answers about the several centralised national databases of children in the UK.

Shaphan

Moving On

Steve Moxon blog - former Home Office whistleblower and author.

Al-Muhajabah's Sundries - anglophile blog

Architectures of Control in Design - Dan Lockton

rabenhorst - Kai Billen (mostly in German)

Nearly Perfect Privacy - Tiffany and Morpheus

Iain Dale's Diary - a popular Conservative political blog

Brit Watch - Public Surveillance in the UK - Web - Email - Databases - CCTV - Telephony - RFID - Banking - DNA

BLOGDIAL

MySecured.com - smart mobile phone forensics, information security, computer security and digital forensics by a couple of Australian researchers

Ralph Bendrath

Financial Cryptography - Ian Grigg et al.

UK Liberty - A blog on issues relating to liberty in the UK

Big Brother State - "a small act of resistance" to the "sustained and systematic attack on our personal freedom, privacy and legal system"

HosReport - "Crisis. Conspiraciones. Enigmas. Conflictos. Espionaje." - Carlos Eduardo Hos (in Spanish)

"Give 'em hell Pike!" - Frank Fisher

Corruption-free Anguilla - Good Governance and Corruption in Public Office Issues in the British Overseas Territory of Anguilla in the West Indies - Don Mitchell CBE QC

geeklawyer - intellectual property, civil liberties and the legal system

PJC Journal - I am not a number, I am a free Man - The Prisoner

Charlie's Diary - Charlie Stross

The Caucus House - blog of the Chicago International Model United Nations

Famous for 15 Megapixels

Postman Patel

The 4th Bomb: Tavistock Sq Daniel's 7:7 Revelations - Daniel Obachike

OurKingdom - part of OpenDemocracy - " will discuss Britain’s nations, institutions, constitution, administration, liberties, justice, peoples and media and their principles, identity and character"

Beau Bo D'Or blog by an increasingly famous digital political cartoonist.

Between Both Worlds - "Thoughts & Ideas that Reflect the Concerns of Our Conscious Evolution" - Kingsley Dennis

Bloggerheads: The Alisher Usmanov Affair - the rich Uzbek businessman and his shyster lawyers Schillings really made a huge counterproductive error in trying to censor the blogs of Tim Ireland, of all people.

Matt Wardman political blog analysis

Henry Porter on Liberty - a leading mainstream media commentator and opinion former who is doing more than most to help preserve our freedom and liberty.

HMRC is shite - "dedicated to the taxpayers of Britain, and the employees of the HMRC, who have to endure the monumental shambles that is Her Majesty's Revenue and Customs (HMRC)."

Head of Legal - Carl Gardner a former legal advisor to the Government

The Landed Underclass - Voice of the Banana Republic of Great Britain

Henrik Alexandersson - Swedish blogger threatened with censorship by the Försvarets Radioanstalt (FRA), the Swedish National Defence Radio Establishement, their equivalent of the UK GCHQ or the US NSA.

World's First Fascist Democracy - blog with link to a Google map - "This map is an attempt to take a UK wide, geographical view, of both the public and the personal effect of State sponsored fear and distrust as seen through the twisted technological lens of petty officials and would be bureaucrats nationwide."

Blogoir - Charles Crawford - former UK Ambassodor to Poland etc.

No CCTV - The Campaign against CCTV

Barcode Nation - keeping two eyes on the database state.

Lords of the Blog - group blog by half a dozen or so Peers sitting in the House of Lords.

notes from the ubiquitous surveillance society - blog by Dr. David Murakami Wood, editor of the online academic journal Surveillance and Society

Justin Wylie's political blog

Panopticon blog - by Timothy Pitt-Payne and Anya Proops. Timothy Pitt-Payne is probably the leading legal expert on the UK's Freedom of Information Act law, often appearing on behlaf of the Information Commissioner's Office at the Information Tribunal.

Armed and Dangerous - Sex, software, politics, and firearms. Life’s simple pleasures… - by Open Source Software advocate Eric S. Raymond.

Georgetown Security Law Brief - group blog by the Georgetown Law Center on National Security and the Law , at Georgtown University, Washington D.C, USA.

Big Brother Watch - well connected with the mainstream media, this is a campaign blog by the TaxPayersAlliance, which thankfully does not seem to have spawned Yet Another Campaign Organisation as many Civil Liberties groups had feared.

Spy on Moseley - "Sparkbrook, Springfield, Washwood Heath and Bordesley Green. An MI5 Intelligence-gathering operation to spy on Muslim communities in Birmingham is taking liberties in every sense" - about 150 ANPR CCTV cameras funded by Home Office via the secretive Terrorism and Allied Matters (TAM) section of ACPO.

FitWatch blog - keeps an eye on the activities of some of the controversial Police Forward Intelligence Teams, who supposedly only target "known troublemakers" for photo and video surveillance, at otherwise legal, peaceful protests and demonstrations.

Other Links

Spam Huntress - The Norwegian Spam Huntress - Ann Elisabeth

Fuel Crisis Blog - Petrol over £1 per litre ! Protest !
Mayor of London Blog
London Olympics 2012 - NO !!!!

Cool Britannia

NuLabour

Free Gary McKinnon - UK citizen facing extradition to the USA for "hacking" over 90 US Military computer systems.

Parliament Protest - information and discussion on peaceful resistance to the arbitrary curtailment of freedom of assembly and freedom of speech, in the excessive Serious Organised Crime and Police Act 2005 Designated Area around Parliament Square in London.

Brian Burnell's British / US nuclear weapons history at http://nuclear-weapons.info

Syndicate this site (XML):

Follow Spy Blog on Twitter

For those of you who find it convenient, there is now a Twitter feed to alert you to new Spy Blog postings.

https://twitter.com/SpyBlog

Please bear in mind the many recent, serious security vulnerabilities which have compromised the Twitter infrastructure and many user accounts, and Twitter's inevitable plans to make money out of you somehow, probably by selling your Communications Traffic Data to commercial and government interests.

https://twitter.com/SpyBlog (same window)

Recent Comments

  • wtwu: NetIDMe seems to be in process of being wound up read more
  • wtwu: The House of Lords have approved the Regulations, without a read more
  • wtwu: Data Retention and Investigatory Powers Bill Government Note on the read more
  • wtwu: The former Customs Officer and the others involved in dealing read more
  • wtwu: BBC reports the password was $ur4ht4ub4h8 http://www.bbc.co.uk/news/uk-25745989 When Hussain was read more
  • wtwu: "only" an extra 4 months in prison for failing to read more
  • wtwu: Although not confirmed as part of the Wilson Doctrine per read more
  • wtwu: For now (just before Christmas 2013) it appears that the read more
  • wtwu: As expected, the ISC did not give the intelligence agency read more
  • wtwu: N.B. the Intelligence & Security Committee is now legally consituted read more

Categories

Monthly Archives

August 2020

Sun Mon Tue Wed Thu Fri Sat
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31          

UK Legislation

The United Kingdom suffers from tens of thousands of pages of complicated criminal laws, and thousands of new, often unenforceable criminal offences, which have been created as a "Pretend to be Seen to Be Doing Something" response to tabloid media hype and hysteria, and political social engineering dogmas. These overbroad, catch-all laws, which remove the scope for any judicial appeals process, have been rubber stamped, often without being read, let alone properly understood, by Members of Parliament.

The text of many of these Acts of Parliament are now online, but it is still too difficult for most people, including the police and criminal justice system, to work out the cumulative effect of all the amendments, even for the most serious offences involving national security or terrorism or serious crime.

Many MPs do not seem to bother to even to actually read the details of the legislation which they vote to inflict on us.

UK Legislation Links

UK Statute Law Database - is the official revised edition of the primary legislation of the United Kingdom made available online, but it is not yet up to date.

UK Commissioners

UK Commissioners some of whom are meant to protect your privacy and investigate abuses by the bureaucrats.

UK Intelligence Agencies

Intelligence and Security Committee - the supposedly independent Parliamentary watchdog which issues an annual, heavily censored Report every year or so. Currently chaired by the Conservative Sir Malcolm Rifkind. Why should either the intelligence agencies or the public trust this committee, when the untrustworthy ex-Labour Minister Hazel Blears is a member ?

Anti-terrorism hotline - links removed in protest at the Climate of Fear propaganda posters

MI5 Security Service
MI5 Security Service - links to encrypted reporting form removed in protest at the Climate of Fear propaganda posters

syf_logo_120.gif Secure Your Ferliliser logo
Secure Your Fertiliser - advice on ammonium nitrate and urea fertiliser security

cpni_logo_150.gif Centre for the Protection of National Infrastructure
Centre for the Protection of National Infrastructure - "CPNI provides expert advice to the critical national infrastructure on physical, personnel and information security, to protect against terrorism and other threats."

SIS MI6 careers_logo_sis.gif
Secret Intelligence Service (MI6) recruitment.

gchq_logo.gif
Government Communications Headquarters GCHQ

logo-nca.gif
National Crime Agency - the replacement for the Serious Organised Crime Agency

da_notice_system_150.gif
Defence Advisory (DA) Notice system - voluntary self censorship by the established UK press and broadcast media regarding defence and intelligence topics via the Defence, Press and Broadcasting Advisory Committee.

Foreign Spies / Intelliegence Agencies in the UK

It is not just the UK government which tries to snoop on British companies, organisations and individuals, the rest of the world is constantly trying to do the same, regardless of the mixed efforts of our own UK Intelligence Agencies who are paid to supposedly protect us from them.

For no good reason, the Foreign and Commonwealth Office only keeps the current version of the London Diplomatic List of accredited Diplomats (including some Foreign Intelligence Agency operatives) online.

Presumably every mainstream media organisation, intelligence agency, serious organised crime or terrorist gang keeps historical copies, so here are some older versions of the London Diplomatic List, for the benefit of web search engine queries, for those people who do not want their visits to appear in the FCO web server logfiles or those whose censored internet feeds block access to UK Government websites.

Campaign Button Links

Watching Them, Watching Us - UK Public CCTV Surveillance Regulation Campaign
UK Public CCTV Surveillance Regulation Campaign

NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card
NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card and National Identity Register centralised database.

Gary McKinnon is facing extradition to the USA under the controversial Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.
Gary McKinnon is facing extradition to the USA under the controversial Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.

FreeFarid_150.jpg
FreeFarid.com - Kafkaesque extradition of Farid Hilali under the European Arrest Warrant to Spain

Peaceful resistance to the curtailment of our rights to Free Assembly and Free Speech in the SOCPA Designated Area around Parliament Square and beyond
Parliament Protest blog - resistance to the Designated Area restricting peaceful demonstrations or lobbying in the vicinity of Parliament.

Petition to the European Commission and European Parliament against their vague Data Retention plans
Data Retention is No Solution - Petition to the European Commission and European Parliament against their vague Data Retention plans.

Save Parliament: Legislative and Regulatory Reform Bill (and other issues)
Save Parliament - Legislative and Regulatory Reform Bill (and other issues)

Open_Rights_Group.png
Open Rights Group

The Big Opt Out Campaign - opt out of having your NHS Care Record medical records and personal details stored insecurely on a massive national centralised database.

Tor - the onion routing network
Tor - the onion routing network - "Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves."

Tor - the onion routing network
Anonymous Blogging with Wordpress and Tor - useful Guide published by Global Voices Advocacy with step by step software configuration screenshots (updated March 10th 2009).

irrepressible_banner_03.gif
Amnesty International's irrepressible.info campaign

anoniblog_150.png
BlogSafer - wiki with multilingual guides to anonymous blogging

ngoiab_150.png
NGO in a box - Security Edition privacy and security software tools

homeofficewatch_150.jpg
Home Office Watch blog, "a single repository of all the shambolic errors and mistakes made by the British Home Office compiled from Parliamentary Questions, news reports, and tip-offs by the Liberal Democrat Home Affairs team."

rsf_logo_150.gif
Reporters Without Borders - Reporters Sans Frontières - campaign for journalists 'and bloggers' freedom in repressive countries and war zones.

committee_to_protect_bloggers_150.gif
Committee to Protect Bloggers - "devoted to the protection of bloggers worldwide with a focus on highlighting the plight of bloggers threatened and imprisoned by their government."

Icelanders_are_NOT_Terrorists_logo_150.jpg
Icelanders are NOT terrorists ! - despite Gordon Brown and Alistair Darling's use of anti-terrorism legislation to seize the assets of Icelandic banks.

nocctv.gif
No CCTV - The Campaign Against CCTV

phnat-logo-black-on-white_150.jpg

I'm a Photographer Not a Terrorist !

power2010_132.png

Power 2010 cross party, political reform campaign

Cracking_the_Black_Box_black_150.jpg

Cracking the Black Box - "aims to expose technology that is being used in inappropriate ways. We hope to bring together the insights of experts and whistleblowers to shine a light into the dark recesses of systems that are responsible for causing many of the privacy problems faced by millions of people."

surveillance_72.jpg

Open Rights Group - Petition against the renewal of the Interception Modernisation Programme

wblogocrop_150.jpg

WhistleblowersUK.org - Fighting for justice for whistleblowers