- Snapchat just made all political ads purchased publicly available Monday 6:12 PM
- How to stream Barcelona vs. Borussia Dortmund in Champions League action Monday 5:39 PM
- How to stream Liverpool vs. Napoli in Champions League action Monday 5:19 PM
- How to make real money with Amazon’s Mechanical Turk Monday 5:03 PM
- How to stream Chelsea vs. Valencia in the Champions League group stage Monday 4:47 PM
- ‘SNL’ fires Shane Gillis for racist, homophobic comments Monday 4:41 PM
- Ben Shapiro wants accusers to describe Brett Kavanaugh’s penis Monday 4:30 PM
- Twitch suspends streamer for wearing Chun-Li cosplay Monday 4:11 PM
- Report: 8 years of Trump tax returns subpoenaed by prosecutors Monday 3:45 PM
- Netflix lands exclusive streaming rights to ‘Seinfeld’ Monday 3:34 PM
- Jenny Slate sets first comedy special at Netflix Monday 3:05 PM
- #EndSmearFear is aiming to save lives Monday 2:54 PM
- Netflix ‘Living With Yourself’ trailer offers a double dose of Paul Rudd Monday 2:07 PM
- How to stream the 2019-20 UEFA Champions League Monday 2:04 PM
- Caitlyn Jenner ridiculed with transphobic jokes during Alec Baldwin roast Monday 1:27 PM
U.K. quietly publishes ‘code of conduct’ for government hackers
Document confirms government’s domestic spying capabilities
British intelligence officials have quietly opened a door into the inner workings of international surveillance.
In a information release last Friday, the U.K. government published guidelines it purportedly uses to determine when and how it decides to hack computers, mobile devices and other forms of technology for the purposes of spying. It is the first such public disclosure by the British government.
The rather banal sounding, 69-page document, entitled “Interception of communications and equipment interference: draft codes of practice,” not only confirms the wide-ranging hacking capabilities possessed by British intelligence, it also offers a rare insight into how these capabilities are regulated.
Published by the Home Office, the code of practice outlines, among other things, when warrants can be issued to allow investigators to monitor computers, servers, routers, laptops, cellphones and other devices. As Steve Ranger at ZDNet points out, the guidelines also explain how agencies should deal with “collateral” damage that comes from spying on the wrong person or gathering content subject to legal privilege. The draft rules further explain how collected data should be stored and later destroyed.
In the draft policy, which has been published as part of a public review and comment period lasting until March 20, the government states that warrants typically lasts six months, though they may be renewed. In fact, warrants are often renewed because of the amount of time it takes to undo hacks.
The code of conduct is being made public as part of a broader response by the U.K. government to the revelations of the Edward Snowden leaks. Along with the U.S. National Security Agency (NSA), British intelligence Government Communications Headquarters (GCHQ) was implicated in domestic spy activities in the leaks, sparking a push for greater transparency.
But transparency in and of itself is not enough for critics who are upset at the power and reach of U.K. hacking confirmed in the draft code of conduct.
“GCHQ cannot legitimize their unlawful activities simply by publishing codes of conduct with no legislative force,” said Carly Nyst, legal director of the watchdog group Privacy International, speaking to the Guardian. “In particular, the use by intelligence agencies of hacking—an incredibly invasive and intrusive form of surveillance—cannot be snuck in by the back door through the introduction of a code of conduct that has undergone neither parliamentary nor judicial scrutiny. It is surely no mistake that this code of conduct comes only days before GCHQ is due to argue the lawfulness of its hacking activities in court.”
Nyst and other privacy advocates object to the powers exercised by British intelligence, which they say are far broader and more intrusive than traditional bugging and wiretapping techniques used prior to the Internet age. For instance, there is the capability – confirmed in the code of conduct – to bypass end-to-end encryption that has been increasingly used by Internet companies since the Snowden leaks to avoid unwanted government surveillance.
However, the government’s actions are defended by officials like James Brokenshire, the U.K.’s minister of immigration and security.
“As the threat to the U.K. from terrorism, espionage, and organized crime has diversified, these powers have become more important,” he said, adding, “There are limits on what can be said in public about this work. But it is imperative that the government is as open as it can be about these capabilities and how they are used.”
Photo via U.K. Ministry of Defence/Flickr (CC BY-SA 2.0)
Tim Sampson is a reporter who focused on the technology, business, and politics beats. He's also an established comedy writer, with work on Comedy Central and in The Onion and ClickHole.