- Disturbing Snapchat video shows 17-year-old throwing dog on trampoline 4 Years Ago
- How to watch the new Bon Appetit channel for free 4 Years Ago
- Eminem disses Netflix for canceling ‘The Punisher’ 4 Years Ago
- Florida prisons sued for depriving inmates of music they paid for 4 Years Ago
- Chris Hemsworth will become Hulk Hogan for Netflix biopic Today 11:29 AM
- Fortnite just introduced a K-Pop skin, and here’s how to unlock it Today 11:06 AM
- The YouTuber who exposed the site’s ‘softcore pedophile ring’ is under attack Today 10:39 AM
- Trump randomly calls for companies to ‘step up’ their 5G efforts in U.S. Today 10:28 AM
- Professional media person: Poor people have money but they just waste it on ‘benders’ Today 10:22 AM
- Netflix acquires highest-grossing blockbuster of 2019 (so far) Today 9:29 AM
- Ocasio-Cortez blasts media over home reports after Coast Guard member’s hit list revealed Today 8:52 AM
- Are you being harassed by a Bernie Bro or a Bernie bot? Today 7:30 AM
- Jason Reitman is empowering toxic ‘Ghostbusters’ fanboys Today 6:55 AM
- The Twitter accounts taking on journalism’s straight, white, cis male problem Today 6:30 AM
- 12 essential Amazon Echo accessories for your smart home Today 6:00 AM
Document confirms government’s domestic spying capabilities
British intelligence officials have quietly opened a door into the inner workings of international surveillance.
In a information release last Friday, the U.K. government published guidelines it purportedly uses to determine when and how it decides to hack computers, mobile devices and other forms of technology for the purposes of spying. It is the first such public disclosure by the British government.
The rather banal sounding, 69-page document, entitled “Interception of communications and equipment interference: draft codes of practice,” not only confirms the wide-ranging hacking capabilities possessed by British intelligence, it also offers a rare insight into how these capabilities are regulated.
Published by the Home Office, the code of practice outlines, among other things, when warrants can be issued to allow investigators to monitor computers, servers, routers, laptops, cellphones and other devices. As Steve Ranger at ZDNet points out, the guidelines also explain how agencies should deal with “collateral” damage that comes from spying on the wrong person or gathering content subject to legal privilege. The draft rules further explain how collected data should be stored and later destroyed.
In the draft policy, which has been published as part of a public review and comment period lasting until March 20, the government states that warrants typically lasts six months, though they may be renewed. In fact, warrants are often renewed because of the amount of time it takes to undo hacks.
The code of conduct is being made public as part of a broader response by the U.K. government to the revelations of the Edward Snowden leaks. Along with the U.S. National Security Agency (NSA), British intelligence Government Communications Headquarters (GCHQ) was implicated in domestic spy activities in the leaks, sparking a push for greater transparency.
But transparency in and of itself is not enough for critics who are upset at the power and reach of U.K. hacking confirmed in the draft code of conduct.
“GCHQ cannot legitimize their unlawful activities simply by publishing codes of conduct with no legislative force,” said Carly Nyst, legal director of the watchdog group Privacy International, speaking to the Guardian. “In particular, the use by intelligence agencies of hacking—an incredibly invasive and intrusive form of surveillance—cannot be snuck in by the back door through the introduction of a code of conduct that has undergone neither parliamentary nor judicial scrutiny. It is surely no mistake that this code of conduct comes only days before GCHQ is due to argue the lawfulness of its hacking activities in court.”
Nyst and other privacy advocates object to the powers exercised by British intelligence, which they say are far broader and more intrusive than traditional bugging and wiretapping techniques used prior to the Internet age. For instance, there is the capability – confirmed in the code of conduct – to bypass end-to-end encryption that has been increasingly used by Internet companies since the Snowden leaks to avoid unwanted government surveillance.
However, the government’s actions are defended by officials like James Brokenshire, the U.K.’s minister of immigration and security.
“As the threat to the U.K. from terrorism, espionage, and organized crime has diversified, these powers have become more important,” he said, adding, “There are limits on what can be said in public about this work. But it is imperative that the government is as open as it can be about these capabilities and how they are used.”
Photo via U.K. Ministry of Defence/Flickr (CC BY-SA 2.0)
Tim Sampson is a reporter who focused on the technology, business, and politics beats. He's also an established comedy writer, with work on Comedy Central and in The Onion and ClickHole.