Recent Comments on Entries

Comments are welcome, but to reduce the amount of Comment Spam, sometimes your comments will not appear online immediately. Try to be polite, even if you feel strongly about something written here.

We will summarise any arguments or constructive criticism of the Government proposals which get posted here into our response to this Public Consultation

Surely the Government should be providing such a public feedback mechanism ?

  • wtwu
    "The Department fo..."
    Electronic signature keys paras 3.14 to 3.16
  • wtwu
    "Comparison should..."
    Application for appropriate permission paras 4.6 to 4.8
  • wtwu
    "Multiple Disclosu..."
    Application for appropriate permission paras 4.6 to 4.8
  • wtwu
    "Most people will ..."
    Notices requiring disclosure of a key paras 6.9 to 6.15
  • wtwu
    "Amendments to the..."
    Amending a notice para 4.30
  • wtwu
    "What exactly is t..."
    Application for appropriate permission paras 4.6 to 4.8
  • wtwu
    "This Code of Prac..."
    Application for appropriate permission paras 4.6 to 4.8
  • wtwu
    "@ rag - true enou..."
    Electronic signature keys paras 3.14 to 3.16
  • rag
    "On the definition..."
    Electronic signature keys paras 3.14 to 3.16
  • wtwu
    "Why does this Cod..."
    Necessity and proportionality paras 3.25 to 3.31

  • Revised version of the draft Code of Practice for RIPA Part III - Investigation of Protected Electronic Information

  • RIPA Part III Consultation and draft CoP

  • Summary, paragraphs 1 to 10

  • Consultation Questions para 11

  • Additional Consultation Questions paras 12 to 19
    It is peculiar to se...
    by wtwu

  • The Consultation Process paras 20 to 23

  • The Consultation Criteria paras 24 to 25

  • Consultation Coordinator para 26

  • Contents - Draft Code of Practice Investigation of Protected Electronic Data

  • INTRODUCTION paras 1.1 to 1.6
    More comments on "Ci...
    by wtwu

  • BACKGROUND paras 2.1 to 2.5

  • SCOPE OF THE POWERS paras 3.1 to 3.3

  • Protected information paras 3.4 to 3.7

  • Protected Information in an intelligible form paras 3.8 to 3.9

  • Description of a key paras 3.10 to 3.13
    How, in real life, ...
    by wtwu

  • Electronic signature keys paras 3.14 to 3.16
    Remember that the ol...
    by wtwu

  • Multi-use keys para 3.17

  • Session keys para 3.18

  • Possession of a key paras 3.19 to 3.24

  • Necessity and proportionality paras 3.25 to 3.31
    Why does this Code o...
    by wtwu

  • RULES ON GIVING OF NOTICE paras 4.1 to 4.5

  • Application for appropriate permission paras 4.6 to 4.8
    This Code of Practic...
    by wtwu

  • Obtaining appropriate permission paras 4.9 to 4.10

  • Format of notices paras 4.11 to 4.15

  • Description of the protected information paras 4.16 to 4.19

  • Time to comply with a notice paras 4.20 to 4.23

  • Authenticity of section 49 notices paras 4.24 to 4.26
    Examples of the form...
    by wtwu

  • Explaining the notice paras 4.27 to 4.29

  • Amending a notice para 4.30
    Amendments to the "n...
    by wtwu

  • Contributions to Costs para 4.31

  • Confirmation of compliance with a notice para 4.32

  • RULES ON THE EFFECT OF IMPOSING DISCLOSURE REQUIREMENTS paras 5.1 to 5.4

  • SPECIAL RULES ON THE EFFECT OF IMPOSING DISCLOSURE REQUIREMENTS paras 6.1 to 6.2

  • Special circumstances requiring disclosure of a key paras 6.3 to 6.8
    6.8 Particular care...
    by wtwu

  • Notices requiring disclosure of a key paras 6.9 to 6.15
    Most people will nev...
    by wtwu

  • KEEPING OF RECORDS paras 7.1 to 7.3
    Footonote [17] does ...
    by wtwu

  • PROCEDURES FOR DEALING WITH DISCLOSED MATERIAL paras 8.1 to 8.11
    8.5 Key material mu...
    by wtwu

  • Procedures for dealing with disclosed intelligible material para 8.12

  • Damages paras 8.13 to 8.14

  • APPROPRIATE PERMISSION FOR THE GIVING OF NOTICES paras 9.1 to 9.3

  • Appropriate permission granted by a judicial authority para 9.4 to 9.10

  • Appropriate permission granted by the Secretary of State paras 9.11 to 9.15

  • Appropriate permission granted by an authorising officer paras 9.16 to 9.18

  • Appropriate permission granted by a person exercising a statutory function paras 9.19 to 9.21

  • General requirements relating to appropriate permission paras 9.22 to 9.24

  • Appropriate additional permission for giving directions for the disclosure of keys paras 9.5 to 9.29

  • Duration of appropriate permission paras 9.31 to 9.32

  • OFFENCES para 10.1

  • Failure to comply with a notice paras 10.2 to 10.6

  • Tipping off paras 10.7 to 10.13
    Note also the commen...
    by wtwu

  • Automatic tipping-of paras 10.14 to 10.17

  • Authorised disclosure paras 10.18 to 10.19

  • OVERSIGHT paras 11.1 to 11.4
    The "Oversight" of t...
    by wtwu

  • COMPLAINTS paras 12.1 to 12.2

    Relevant UK Legislation

    Copyright, Designs and Patents Act 1988
    Official Secrets Act 1989- widely abused by the Government to selectively leak information, a couple of "not guilty" cases throw this law into doubt.

    Computer Misuse Act 1990 completely out of date with regard to the internet.

    Intelligence Services Act 1994

    Data Protection Act 1998 very wide Exemptions for "the prevention and detection of crime" etc. Deliberately budget limited enforcement by the Information Commissioner

    Human Rights Act 1998 - very wide Exemptions for "national secuirty" or "public health" etc.

    Public Interest Disclosure Act 1998 - limited protection for some whistleblowers under employment law. Government whilstleblowers still persecuted.

    Electronic Communications Act 2000 - legalises the uses of DIgital Signatures on electronic communications, almost toally ignored by Government subsequently.

    Freedom of Information Act 2000 - huge number of Exemptions used by the Sir Humphreys to evade the spirit of transparency and open government.

    Regulation of Investigatory Powers Act 2000 - . Warrants etc. signed by politicians or policemen, not by independent Judges. Secretive Commissioners who only audit the processes and try not to deal with public complaints. Part III powers about Encrypted data still not in force, even though penalties are being increased. No protection against snooping by private individuals or companies. Covers the entire electromagnetic spectrum ip to cosmic rays and beyond, "inside the UK" and "outside the UK" i.e. all electomagnetic energy in the entire universe.

    Terrorism Act 2000 - Overbroad definition of terrorism, including "is designed seriously to interfere with or seriously to disrupt an electronic system". "Thought crimes" for the possession of a document or data file which may be of some use to a terrorist, even if you wrote it yourself, or if you have never read it. Very widely abused and ineffective against actual attacks powers of "stop and search".

    Private Security Industry Act 2001 - Some Security Guards. Nightclub Bouncers , but what about IT Security Consultants ?

    Anti-Terrorism, Crime and Security Act 2001 - hodge podge of ineffective measures panicked into law after September 11th 2001 attacks. Detention without charge of foreign terrorist suspects, now overturned. Amends Terrorism Act 2000 to include offence of not informing, even on members of your own family, about suspected terrorists. Communications Data Retention code of practice delayed by several years. Noxious substance hoaxes include "all natural" and "all man made" substances i.e. all matter in the entire universe, "thought crime" of "creating an impression in someone's mind", anywhere in the world. Dubious "protection" of making it illegal to detonate a nuclear weapon in the UK, "without permission". Third Pillar Data Sharing with other EU Governments. Data sharing between UK Government departments.

    Copyright, etc. and Trade Marks (Offences and Enforcement) Act 2002

    Proceeds of Crimes Act 2002 - Assets Recovery Agency can now consfiscate money and property from suspected criminals, without any criminal convictions or court order.

    Communications Act 2003 - regulates the telecomms, internet and radio and tv broadcasting, also the use of the Radio Spectrum e.g. ISM licence free RFID tags or WiFi networks

    Crime (International Co-operation) Act 2003

    Criminal Justice Act 2003 - innocent people's DNA and Fingerprint retention etc.

    Sexual Offences Act 2003 Voyerurism offence applies in limited circumstances to CCTV spy cameras etc. and various changes in the law regarding child porn.

    Children Act 2004 - database on 12 million Children and their parents. Destruction of the common law duty of confidentiality between professional advisors and clients.

    Human Tissue Act 2004 - DNA tissue sample retention and analysis without consen. No regulation of other genetic analysis techniques

    Civil Contingencies Act 2004 - Henry VIII style Emergency Powers have the full force of any Act or the Royal Prerogative. Seizure and destruction of property without compensation etc. State of Emergency by (oral) Order, "in the opinion" of a Minister - more power than Hitler's "Enabling Act" of 1933. No exemptions for constitutional Acts of Parliament, but "all Ministers are deemed to always act reasonably".

    Prevention of Terrorism Act 2005 - Control Orders, house arrest, secret allegations, no habeas corpus, no freedom of assembly. Also applies to British citizens, not just foreigners. By Order of a politician, not an independent Judge.

    Serious Organised Crime and Police Act 2005 - all offences made arrestable, Designated Area around Parliament restricting demonstrations without prior written permission from the Police. More powers for fingerprint and tissue samples.

    Identity Cards Act 2006 re-introduced on 25th May 2005 - just as bad as the previous versions - it is the Centralised Biometric Database and Audit Trail which is so evil and unecessary.

    Terrorism Act 2006 - deeply flawed, vague and catch all, claims worldwide jurisdiction, life sentence for (undefined) "acts preparatory to terrorism", various vague indirect incitement or glorification offences, censorship of websites, criminalisation of libraries and COSHH health and safety literature Amendments to RIPA 2000 further reducing public accountability and increasing penalties on Part III encrypted data offences which have still not yet been brought into force after 5 years

    Legislative and Regulatory Reform Bill 2006 - repeal, amend, replace any legislation by Order with no constitutional safeguards - like the Civil Contingecies Act, but with even fewer safeguards e.g. can amend Human Rights act or be used to modify itself

    Police and Justice Bill 2006 - includes an inept attempt to amend the Computer Misuse Act - bigger penalties, for uneforceable, vague, dual use, offences. The reform of the CMA deserves its own separate Bill to deal with the complexity of IT security in the internet age, not 3 clauses at the end of a complex Bill.

    Safeguarding Vulnerable Groups Bill 2006 - in theory to protect children etc,. but this creates a "banning infrastructure" and even more "red tape" bureaucracy that could be used to target, say, political or religous opponents. Huge potential security and privacy problems with the planned "instant online checks".

    UK Commisioners

    UK Commissioners some of whom are meant to protect your privacy and investigate abuses by the bureaucrats.

    Campaign Button Links

    Watching Them, Watching Us, UK Public CCTV Surveillance Regulation Campaign
    UK Public CCTV Surveillance Regulation Campaign

    NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card
    NO2ID Campaign - cross party opposition to the NuLabour Compulsory Biometric ID Card and National Identity Register centralised database.

    asboconcern logo
    ASBO Concern - is a campaigning alliance of organisations and individuals who are concerned about the abuse of NuLabour's Anti Social Behaviour Orders.

    0800 789 321 free, confidential, Anti-Terrorist Hotline (use 999 or 112 to report immediate threats)
    Anti-terrorism hotline 0800 789 321 free and confidential - use 999 or 112 to report immediate threats.

    MI5 encrypted contact web form use 999 or 112 to report immediate threats
    Encrypted MI5 web response form NuLabour's "Climate of Fear" is not the same as the real fight against terror.

    SIS MI6 careers_logo_sis.gif
    Secret Intelligence Service (MI6) recruitment.

    careers_logo_sis.gif
    Serious Organisesd Crime Agency - have cut themselves off from direct contact with the public and businesses - no phone - no email

    Gary McKinnon is facing extradition to the USA under the controversial 
Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.
    Gary McKinnon is facing extradition to the USA under the controversial Extradition Act 2003, without any prima facie evidence or charges brought against him in a UK court. Try him here in the UK, under UK law.

    Peaceful resistance to the curtailment of our rights to Free Assembly and Free Speech in the SOCPA Designated Area around Parliament Square and beyond

    Parliament Protest blog - resistance to the Designated Area resticting peaceful demonstrations or lobbying in the vicinity of Parliament.

    Petition to the European Commission and European Parliament against their vague Data Retention plans
    Data Retention is No Solution Petition to the European Commission and European Parliament against their vague Data Retention plans.

    Save Parliament: Legislative and Regulatory Reform Bill (and other issues)
    Save Parliament - Legislative and Regulatory Reform Bill (and other issues)

    Open_Rights_Group.png
    Open Rights Group

    renew for freedom - 2006 - renew your passport
    Renew For Freedom - renew your Passport in 2006.

    Tor - the onion routing network
    Tor - the onion routing network - "Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves."

    Tor makes heavy use of SSL/TLS encrypted tunnels and Digital Signatures, which are mostly ephemeral, and cannot be revealed by an end user, even if they wanted to, or were ordered to.

  • February 15, 2006

    Revised version of the draft Code of Practice for RIPA Part III - Investigation of Protected Electronic Information

    There is now a week to submit any final comments on this revised version of the draft Code of Practice for RIPA Part III - Investigation of Protected Electronic Information:

    2007-02-14 RIPA Part III Post Consultation version2 (.pdf 230Kb)

    Thursday 15th February 2007

    Please find attached a revised version of the draft Code of Practice for
    RIPA Part III - Investigation of Protected Electronic Information, which
    takes into account responses and comments received during the public
    consultation.

    Changes to the draft published for consultation are highlighted with
    deletions from that text noted in the margins.

    Any final comments you may have should be sent to

    encryption@homeoffice.gsi.gov.uk

    no later than Thursday 22nd February 2007.

    Subject to Ministers agreement the draft Code of Practice will then be laid
    before Parliament.

    Covert Investigation Policy Team
    Home Office
    Crime Reduction and Community Safety Group
    Room P5.37
    Peel Building
    2 Marsham Street
    London
    SW1P 4DF

    The biggest change seems to be to make the National Technical Assistance Centre (NTAC), into a Single Point of Contact to act as the filter and guardian of any RIPA Part III requests - a sensible idea.

    It was revealed to Parliament October 2006, that NTAC has been moved organisationally, if not yet physically, from the Home Office under MI5 to the Foreign Office under GCHQ, effective from April 2006.

    See "National Technical Assistance Centre (NTAC) subsumed into GCHQ in April 2006 ?"

    Continue reading "Revised version of the draft Code of Practice for RIPA Part III - Investigation of Protected Electronic Information" »

    June 12, 2006

    RIPA Part III Consultation and draft CoP

    The Home Office has published, with as little fanfare as possible (paper published on Tuesday, press release only on Friday), the threatened public consultation on RIPA Part III i.e.

    Regulation of Investigatory Powers Act 2000: Part III Investigation of Electronic Data Protected by Encryption etc

    - after a delay of over 6 years !

    The introductory blurb:
    Consultation on the Draft Code of Practice for the Investigation of Protected Electronic Information - Part III of the Regulation of Investigatory Powers Act 2000

    The document:
    Consultation paper, and Draft Statutory Code of Practice on Investigation of Protected Electronic Data (293 K )

    However, since this (.pdf) document seems to use non-standard fonts, this means that most people will not be able to Copy and Paste any of the text into their responses to this Public Consultation..

    We will try to discover if this is a deliberate attempt to be bothered with as few responses to this Public Consultation as possible, or if it is Yet Another Example of the Home Office being.

    "Not fit for purpose. It is inadequate in terms of its scope, it is inadequate in terms of its information technology, leadership, management systems and processes"

    Home Secretary John Reid. 23rd May 2006

    Thanks to JR, a reader of Spy Blog, who overcame this technical hurdle with some Optical Character Recognition software, we have forced the text of the Consultation Document and of the Draft Code of Practice, pointless footnotes and all, into HTML format., which is published in reasonable chunks below.

    Hopefully this will be of use to those veterans of the UK Crypto wars (see the Foundation for Information Policy Research RIPA archive,) who provided such detailed and knowledgable responses to the Government's handwaving, when the original Regulation of Investigatory Powers Act was proposed.

    Who now remembers when Charles Clarke MP was the junior Under-secretary of State at the Home Office in charge of Policing, who failed to convince the audience at the seminal "Scrambling for Safety" conference in March 2000, at the London School of Economics, of the merits of the then Home Secretary Jack Straw's proposed legislation ?

    We welcome any comments on the documents below, and will try to summarise them in our submission to the Public Consultation, by the 30th August 2006.

    UPDATE 19th December 2006:

    The schedule and some of the speaker presentations from the Scrambling for Safety 8 seminar organised by FIPR on August 14th 2006 are available online.

    SImon Watkin, from the Home Office's Covert Investigation Policy team, said that they could still be influenced by submissions and evidence, up until the Code of Practice has is finalised for presentation to Parliament. This was due to happen before the Christmas recess, but nothing has been published yet, so there may still be time to get your views considered over the Christmas and New Year Parliamentary recess.

    Summary, paragraphs 1 to 10

    A PUBLIC CONSULTATION

    Summary

    Continue reading "Summary, paragraphs 1 to 10" »

    Consultation Questions para 11

    Consultation Questions

    Continue reading "Consultation Questions para 11" »

    Additional Consultation Questions paras 12 to 19

    Additional Consultation Questions

    Continue reading "Additional Consultation Questions paras 12 to 19" »

    The Consultation Process paras 20 to 23

    The Consultation Process

    Continue reading "The Consultation Process paras 20 to 23" »

    The Consultation Criteria paras 24 to 25

    The Consultation Criteria

    Continue reading "The Consultation Criteria paras 24 to 25" »

    Consultation Coordinator para 26

    Consultation Coordinator

    Continue reading "Consultation Coordinator para 26" »

    Contents - Draft Code of Practice Investigation of Protected Electronic Data

    Contents

    Draft Code of Practice Investigation of Protected Electronic Data

    Continue reading "Contents - Draft Code of Practice Investigation of Protected Electronic Data" »

    INTRODUCTION paras 1.1 to 1.6

    INTRODUCTION

    Continue reading "INTRODUCTION paras 1.1 to 1.6" »

    BACKGROUND paras 2.1 to 2.5

    BACKGROUND

    Continue reading "BACKGROUND paras 2.1 to 2.5" »

    SCOPE OF THE POWERS paras 3.1 to 3.3

    SCOPE OF THE POWERS

    Continue reading "SCOPE OF THE POWERS paras 3.1 to 3.3" »

    Protected information paras 3.4 to 3.7

    Protected information

    Continue reading "Protected information paras 3.4 to 3.7" »

    Protected Information in an intelligible form paras 3.8 to 3.9

    Protected Information in an intelligible form

    Continue reading "Protected Information in an intelligible form paras 3.8 to 3.9" »

    Description of a key paras 3.10 to 3.13

    Description of a key

    Continue reading "Description of a key paras 3.10 to 3.13" »

    Electronic signature keys paras 3.14 to 3.16

    Electronic signature keys

    Continue reading "Electronic signature keys paras 3.14 to 3.16" »

    Multi-use keys para 3.17

    Multi-use keys

    Continue reading "Multi-use keys para 3.17" »

    Session keys para 3.18

    Session keys

    Continue reading "Session keys para 3.18" »

    Possession of a key paras 3.19 to 3.24

    Possession of a key

    Continue reading "Possession of a key paras 3.19 to 3.24" »

    Necessity and proportionality paras 3.25 to 3.31

    Necessity and proportionality

    Continue reading "Necessity and proportionality paras 3.25 to 3.31" »

    RULES ON GIVING OF NOTICE paras 4.1 to 4.5

    RULES ON GIVING OF NOTICES

    Continue reading "RULES ON GIVING OF NOTICE paras 4.1 to 4.5" »

    Application for appropriate permission paras 4.6 to 4.8

    Application for appropriate permission

    Continue reading "Application for appropriate permission paras 4.6 to 4.8" »

    Obtaining appropriate permission paras 4.9 to 4.10

    Obtaining appropriate permission

    Continue reading "Obtaining appropriate permission paras 4.9 to 4.10" »

    Format of notices paras 4.11 to 4.15

    Format of notices

    Continue reading "Format of notices paras 4.11 to 4.15" »

    Description of the protected information paras 4.16 to 4.19

    Description of the protected information

    Continue reading "Description of the protected information paras 4.16 to 4.19" »

    Time to comply with a notice paras 4.20 to 4.23

    Time to comply with a notice

    Continue reading "Time to comply with a notice paras 4.20 to 4.23" »

    Authenticity of section 49 notices paras 4.24 to 4.26

    Authenticity of section 49 notices

    Continue reading "Authenticity of section 49 notices paras 4.24 to 4.26" »

    Explaining the notice paras 4.27 to 4.29

    Explaining the notice

    Continue reading "Explaining the notice paras 4.27 to 4.29" »

    Amending a notice para 4.30

    Amending a notice

    Continue reading "Amending a notice para 4.30" »

    Contributions to Costs para 4.31

    Contributions to Costs

    Continue reading "Contributions to Costs para 4.31" »

    Confirmation of compliance with a notice para 4.32

    Confirmation of compliance with a notice

    Continue reading "Confirmation of compliance with a notice para 4.32" »

    RULES ON THE EFFECT OF IMPOSING DISCLOSURE REQUIREMENTS paras 5.1 to 5.4

    RULES ON THE EFFECT OF IMPOSING DISCLOSURE REQUIREMENTS

    Continue reading "RULES ON THE EFFECT OF IMPOSING DISCLOSURE REQUIREMENTS paras 5.1 to 5.4" »

    SPECIAL RULES ON THE EFFECT OF IMPOSING DISCLOSURE REQUIREMENTS paras 6.1 to 6.2

    SPECIAL RULES ON THE EFFECT OF IMPOSING DISCLOSURE REQUIREMENTS

    Continue reading "SPECIAL RULES ON THE EFFECT OF IMPOSING DISCLOSURE REQUIREMENTS paras 6.1 to 6.2" »

    Special circumstances requiring disclosure of a key paras 6.3 to 6.8

    Special circumstances requiring disclosure of a key

    Continue reading "Special circumstances requiring disclosure of a key paras 6.3 to 6.8" »

    Notices requiring disclosure of a key paras 6.9 to 6.15

    Notices requiring disclosure of a key

    Continue reading "Notices requiring disclosure of a key paras 6.9 to 6.15" »

    KEEPING OF RECORDS paras 7.1 to 7.3

    KEEPING OF RECORDS

    Continue reading "KEEPING OF RECORDS paras 7.1 to 7.3" »

    PROCEDURES FOR DEALING WITH DISCLOSED MATERIAL paras 8.1 to 8.11

    PROCEDURES FOR DEALING WITH DISCLOSED MATERIAL

    Procedures for dealing with disclosed key material

    Continue reading "PROCEDURES FOR DEALING WITH DISCLOSED MATERIAL paras 8.1 to 8.11" »

    Procedures for dealing with disclosed intelligible material para 8.12

    Procedures for dealing with disclosed intelligible material

    Continue reading "Procedures for dealing with disclosed intelligible material para 8.12" »

    Damages paras 8.13 to 8.14

    Damages

    Continue reading "Damages paras 8.13 to 8.14" »

    APPROPRIATE PERMISSION FOR THE GIVING OF NOTICES paras 9.1 to 9.3

    APPROPRIATE PERMISSION FOR THE GIVING OF NOTICES

    Continue reading "APPROPRIATE PERMISSION FOR THE GIVING OF NOTICES paras 9.1 to 9.3" »

    Appropriate permission granted by a judicial authority para 9.4 to 9.10

    Appropriate permission granted by a judicial authority

    Continue reading "Appropriate permission granted by a judicial authority para 9.4 to 9.10" »

    Appropriate permission granted by the Secretary of State paras 9.11 to 9.15

    Appropriate permission granted by the Secretary of State

    Continue reading "Appropriate permission granted by the Secretary of State paras 9.11 to 9.15" »

    Appropriate permission granted by an authorising officer paras 9.16 to 9.18

    Appropriate permission granted by an authorising officer

    Continue reading "Appropriate permission granted by an authorising officer paras 9.16 to 9.18" »

    Appropriate permission granted by a person exercising a statutory function paras 9.19 to 9.21

    Appropriate permission granted by a person exercising a statutory function

    Continue reading "Appropriate permission granted by a person exercising a statutory function paras 9.19 to 9.21" »

    General requirements relating to appropriate permission paras 9.22 to 9.24

    General requirements relating to appropriate permission

    Continue reading "General requirements relating to appropriate permission paras 9.22 to 9.24" »

    Appropriate additional permission for giving directions for the disclosure of keys paras 9.5 to 9.29

    Appropriate additional permission for giving directions for the disclosure of keys

    Continue reading "Appropriate additional permission for giving directions for the disclosure of keys paras 9.5 to 9.29" »

    Duration of appropriate permission paras 9.31 to 9.32

    Duration of appropriate permission

    Continue reading "Duration of appropriate permission paras 9.31 to 9.32" »

    OFFENCES para 10.1

    OFFENCES

    Continue reading "OFFENCES para 10.1" »

    Failure to comply with a notice paras 10.2 to 10.6

    Failure to comply with a notice

    Continue reading "Failure to comply with a notice paras 10.2 to 10.6" »

    Tipping off paras 10.7 to 10.13

    Tipping off

    Continue reading "Tipping off paras 10.7 to 10.13" »

    Automatic tipping-of paras 10.14 to 10.17

    Automatic tipping-off

    Continue reading "Automatic tipping-of paras 10.14 to 10.17" »

    Authorised disclosure paras 10.18 to 10.19

    Authorised disclosure

    Continue reading "Authorised disclosure paras 10.18 to 10.19" »

    OVERSIGHT paras 11.1 to 11.4

    OVERSIGHT

    Continue reading "OVERSIGHT paras 11.1 to 11.4" »

    COMPLAINTS paras 12.1 to 12.2

    COMPLAINTS

    Continue reading "COMPLAINTS paras 12.1 to 12.2" »

    About this blog

    This blog has been spawned from Spy Blog in order to provide a public space in which to comment on and discuss the long delayed Code of Practice and the latest UK Government proposals regarding Part III of the Regulation of Invesitgatory Powers Act 2000

    This is the controversial portion of the Act which has lain dormant for 6 years, which deals with Government and Police access to Encrypted Data and Encryption Keys..

    Email

    Please feel free to email your views about this blog, or news about the issues it tries to comment on., or to correct errors

    blog@spy[dot]org[dot]uk

    Our PGP public encryption key is available for those correspondents who wish to send us news or information in confidence, and also for those of you who value your privacy, even if you have got nothing to hide.

    We look forward to the day when UK Government Legislation, Press Releases and Emails etc. are Digitally Signed under the HMG PKI Root Certificate hierarchy so that we can be assured that they are not fakes. Trusting that the digitally signed content makes any sense, is another matter entirely.

    Links

    Watching Them, Watching Us

    London 2600

    Need To Know

    The Register

    Privacy International

    Liberty Human Rights campaigners

    Statewatch - monitoring the state and civil liberties in the European Union

    Foundation for Information Policy Research

    UK Crypto - UK Cryptography Policy Discussion Group email list

    UK CINAC - UK Crypto Is Not A Crime list

    Technical Advisory Board on internet and telecomms interception under RIPA

    Cryptome - censored or leaked government documents etc.

    NewsNow Encryption and Security aggregate news feed
    KableNet - UK Government IT project news
    Ideal Government - debate about UK eGovernment
    PublicTechnology.net - UK eGovernment and public sector IT news
    eGov Monitor

    NO2ID - opposition to the Home Office's Compulsory Biometric ID Card
    NO2ID bulletin board discussion forum

    International Civil Aviation Organisation - Machine Readable Travel Documents standards for Biometric Passports etc.

    UK Biometrics Working Group run by CESG/GCHQ experts etc. the UK Government on Biometrics issues feasability

    UK Government

    Home Office - "Not fit for purpose. It is inadequate in terms of its scope, it is inadequate in terms of its information technology, leadership, management systems and processes" - Home Secretary John Reid. 23rd May 2006. Not quite the fount of all evil legislation in the UK, but close.

    No. 10 Downing Street Prime Minister's Official Spindoctors

    United Kingdom Parliament
    Home Affairs Committee of the House of Commons.

    House of Commons "Question Book"

    FaxYourMP - identify and then fax your Member of Parliament
    WriteToThem - identify and then contact your Local Councillors, members of devolved assemblies, Member of Parliament, Members of the European Parliament etc.
    They Work For You - House of Commons Hansard made more accessible ?

    UK Members of the European Parliament

    Bichard Inquiry delving into criminal records and "soft intelligence" policies highlighted by the Soham murders.

    ACPO - Association of Chief Police Officers - England, Wales and Northern Ireland
    ACPOS Association of Chief Police Officers in Scotland

    Other Links

    Our UK Freedom of Information Act request tracking blog - the "Wilson Doctrine", RIPA Commissioners and the FOIA.

    Financial Cryptography blog

    Bruce Schneier's Crypto-Gram newsletter and blog by the author of the standard textbook "Applied Cryptography".

    panGloss - A UK-based cyberlaw blog by Lilian Edwards

    Light Blue Touchpaper - News, views, and musings on security – a weblog by Cambridge computer scientists

    Blogzilla - Ian Brown

    rabenhorst - Kai Billen (mostly in German)

    Nearly Perfect Privacy - Tiffany and Morpheus and the No Keys Campaign - " To prevent the draconian measures contained in Part 3 of the RIPA legislation from being implemented by the Blair government."