• World
    • Africa
    • Asia Pacific
    • Central & South Asia
    • Europe
    • Latin America & Caribbean
    • Middle East & North Africa
    • North America
  • Coronavirus
  • Politics
    • US Election
    • US politics
    • Joe Biden
    • Brexit
    • European Union
    • India
    • Arab world
  • Economics
    • Finance
    • Eurozone
    • International Trade
  • Business
    • Entrepreneurship
    • Startups
    • Technology
  • Culture
    • Entertainment
    • Music
    • Film
    • Books
    • Travel
  • Environment
    • Climate change
    • Smart cities
    • Green Economy
  • Global Change
    • Education
    • Refugee Crisis
    • International Aid
    • Human Rights
  • International Security
    • ISIS
    • War on Terror
    • North Korea
    • Nuclear Weapons
  • Science
    • Health
  • 360 °
  • The Interview
  • In-Depth
  • Insight
  • Quick Read
  • Video
  • Podcasts
  • Interactive
  • My Voice
  • About
  • FO Store
Sections
  • World
  • Coronavirus
  • Politics
  • Economics
  • Business
  • Culture
  • Sign Up
  • Login
  • Publish

Make Sense of the world

Unique insight from 2,000+ contributors in 80+ Countries

Close

Is the Snooper’s Charter as Bad as You Think?

By Gavin E.L. Hall • Mar 10, 2016
Snooper's Charter

© Shutterstock

Security services lack the resources to randomly spy on people.

On March 1, UK Home Secretary Theresa May announced that the redrafting of the Investigatory Powers Bill was complete, following a call for the written evidence on the original draft in November 2015.

The purpose of the bill is to clarify what activity the British security services and law enforcement can engage in online, either by restating existing practice or by introducing new powers. The ability to seek a year’s worth of Internet browsing history has attracted a good deal of publicity and given rise to public concern. The issue is pressing as existing legislation was ruled unlawful, following a challenge from Members of Parliament Tom Watson and David Davis, and is set to expire on March 31, 2016.

David Anderson, the independent reviewer of terrorism legislation, recommends that the so-called “Snooper’s Charter”—the bill’s unofficial name—strikes a balance between freedom and security. Such a positive statement does not appease the critics of the bill who argue, to paraphrase Benjamin Franklin, that liberty is being surrendered in search of temporary security.

Is the public’s fear justified as we enter a new Orwellian age, or do the security services have valid reasons for seeking access to data?

Cyber Reality

The rule of law has developed in the Western world over centuries. The rights of the individual and the demands of the state have been in conflict during this period of legal evolution, and the present Investigatory Powers Bill can be viewed as part of this history—not just a knee jerk. Placing the bill in this historical context is important, as it enables us to establish that the existing laws of the land have been developed over a prolonged period as a series of compromises, while generally maintaining the balance between individual freedom and state security. In other words, what invasions of privacy are permissible in the name of security is well-established, in the real world at least.

Should it be permissible to engage in the same activity in the cyber environment as in the real world, or does this new technology warrant different standards of freedom and privacy? For example, if two known terrorists are meeting at a private house, should a bug be planted? If they speak by phone, should it be tapped? Or if they speak via WhatsApp, should it be hacked? Is there a difference between these examples, or are they fundamentally the same?

The state, in the form of security services, does not randomly spy on people—it lacks the resources. The security services spend their time keeping citizens safe, and mass surveillance requires too much time, both in terms of collation as well as analysis, which would result in the inability to adequately perform the primary security function. While it may technically be possible under the bill to impugn individual freedom, John Bull has little to fear.

Theresa May

Theresa May © Shutterstock

The mass collection of data enables the security services to keep us safe by utilizing snippets of information from a variety of sources to develop situational awareness and identify possible terrorists, with seven attacks being prevented in the United Kingdom in the last six months. This is not only in terms of the presence of information, but also the absence of information—identifying negative patterns is equally important to identifying positive ones. For example, if a known terrorist network goes quiet and stops communicating, it can be an indication that they are about to launch an attack.

Three areas are key to analyzing an individual: centrality, between-ness and degree. Centrality refers to how important the individual is; between-ness relates to a person’s access to others; and degree is the number of people one interacts with. These core principles of intelligence gathering have not changed with the advent of new technology. The sole difference of the 2016 world is that an environment outside the real world exists in which information and data can be stored and transmitted.

The Investigatory Powers Bill seeks to ensure that the same powers that exist within the real world are also present in the cyber environment by avoiding potential arguments that certain powers are only legally relevant to the real world.

White Noise

Of 225 individuals charged with terrorism offenses in the United States between 9/11 and January 2014, only 17 were the result of mass surveillance techniques used by the National Security Agency. Indeed, the issue of white noise—too much information cluttering the relevant information being sought—is considered to be a substantial challenge to security services.

Furthermore, the likelihood of this clause being useful against terrorists is minimal, as most are likely to be using TOR, or similar privacy ensuring tools. TOR—the onion router—is a way of connecting to the Internet that masks your IP address by bouncing the connection across a series of proxies.

While the Internet service provider (ISP) record would reveal a connection to TOR, it would not show which sites had been visited. Seeking to explore what an individual has been doing online—a space where social interaction takes place—is akin to seeking information on an individual’s habits in the real world. As such, asking an ISP to provide data is no more or less of an intrusion into individual privacy than asking the proprietor of a business to share customer information, either general or specific.

Companies have been resisting for commercial reasons. They perceive that their customers will not be happy if they agree to data being made available to the government. In a Reuters poll, 46.3% of respondents agreed with Apple’s stance of refusing to unlock the smartphone of an actual terrorist, with 35.5% disagreeing.

The potential for backdoors to be built into software has recently been the subject of sustained dispute between the Federal Bureau of Investigation (FBI) and Apple, and attracts the most public attention. If more specific attention was made toward educating the public as to why the state was seeking such powers and the benefits of formally codifying—in legal practice—the powers of agencies of state security, the public could be more favorable to the UK bill.

The views expressed in this article are the author’s own and do not necessarily reflect Fair Observer’s editorial policy.

Photo Credit: Maksim Kabakou / Twocoms / Shutterstock.com 


Fair Observer - World News, Politics, Economics, Business and CultureWe bring you perspectives from around the world. Help us to inform and educate. Your donation is tax-deductible. Join over 400 people to become a donor or you could choose to be a sponsor.

Share Story
CategoriesEurope, International Security, Opinion TagsBritain, Investigatory Powers Bill, Surveillance, terrorism, United Kingdom
Join our network of more than 2,000 contributors to publish your perspective, share your story and shape the global conversation. Become a Fair Observer and help us make sense of the world.

Fair Observer Recommends

How Global Britain Confronts the Asian Century How Global Britain Confronts the Asian Century
By Will Marshall • Aug 21, 2020
Are the UK and US Suing for Divorce? Are the UK and US Suing for Divorce?
By Peter Isackson • Jan 15, 2020
Brexit Goes to the Proms Brexit Goes to the Proms
By Anu Shukla • Sep 23, 2019

Post navigation

Previous PostPrevious We May No Longer Be Able to End Wars
Next PostNext Devastating Consequences for Women in War
Subscribe
Register for $9.99 per month and become a member today.
Publish
Join our community of more than 2,500 contributors to publish your perspective, share your narrative and shape the global discourse.
Donate
We bring you perspectives from around the world. Help us to inform and educate. Your donation is tax-deductible.

Explore

  • About
  • Authors
  • FO Store
  • FAQs
  • Republish
  • Privacy Policy
  • Terms of Use
  • Contact

Regions

  • Africa
  • Asia Pacific
  • Central & South Asia
  • Europe
  • Latin America & Caribbean
  • Middle East & North Africa
  • North America

Topics

  • Politics
  • Economics
  • Business
  • Culture
  • Environment
  • Global Change
  • International Security
  • Science

Sections

  • 360°
  • The Interview
  • In-Depth
  • Insight
  • Quick Read
  • Video
  • Podcasts
  • Interactive
  • My Voice

Daily Dispatch


© Fair Observer All rights reserved
We Need Your Consent
We use cookies to give you the best possible experience. Learn more about how we use cookies or edit your cookie preferences. Privacy Policy. My Options I Accept
Privacy & Cookies Policy

Edit Cookie Preferences

The Fair Observer website uses digital cookies so it can collect statistics on how many visitors come to the site, what content is viewed and for how long, and the general location of the computer network of the visitor. These statistics are collected and processed using the Google Analytics service. Fair Observer uses these aggregate statistics from website visits to help improve the content of the website and to provide regular reports to our current and future donors and funding organizations. The type of digital cookie information collected during your visit and any derived data cannot be used or combined with other information to personally identify you. Fair Observer does not use personal data collected from its website for advertising purposes or to market to you.

As a convenience to you, Fair Observer provides buttons that link to popular social media sites, called social sharing buttons, to help you share Fair Observer content and your comments and opinions about it on these social media sites. These social sharing buttons are provided by and are part of these social media sites. They may collect and use personal data as described in their respective policies. Fair Observer does not receive personal data from your use of these social sharing buttons. It is not necessary that you use these buttons to read Fair Observer content or to share on social media.

 
Necessary
Always Enabled

These cookies essential for the website to function.

Analytics

These cookies track our website’s performance and also help us to continuously improve the experience we provide to you.

Performance
Uncategorized

This cookie consists of the word “yes” to enable us to remember your acceptance of the site cookie notification, and prevents it from displaying to you in future.

Preferences
Save & Accept