There was some mention of costs in the recent Communications Data Bill committee hearings and I also ran across an interesting Freedom of Information request on the costs of the current system, so I thought I’d take a look at them side by side. Which system gives better value for money, the existing Data Retention or the proposed Communications Data Bill?

Cost-per-request under the Data Retention Directive

There are three pieces of useful information here. Firstly is the evidence of Charles Farr, Director General of the Office for Security and Counter-Terrorism. From his answer to Question 6 in oral evidence to the Communications Data Bill Committee: “As you know, we have put, based on our survey of the relevant organisations, a figure of 25% of data that organisations would like to get access to but cannot.” (In other words, 75% of the data is available)

Secondly is Question 10 from Michael Ellis MP: “in 2010 there were over half a million requests for communications data: 552,550.” In combination with the above 75%, that gives around 414,400 successful requests in 2010.

And finally, we have a Freedom of Information response to Caspar Bowden from which we have the yearly cost of running the Data Retention programme. Taking an average for 2009-10 and 2010-11 (Presumably Fiscal years) we find an average for 2010 of £13.15 million.

That’s quite a simple calculation to do: Each successful data request has a data retention cost of £31.76.

Cost-per-request under the Communications Data Bill

Again, Charles Farr has given us some useful information here. In response to question 9, he believes they will “improve our coverage to a figure of what we think should be in the region of 85%, as opposed to 75%, which is where we are now”.

I’ll be generous here and assume they actually get an immediate 10% increase, although even Mr. Farr admit that’s not likely and they won’t see the 85% figure until 2018. That means an extra 55,255 requests for data would be successful based on their figures.

As for the cost, Dr Julian Hupperts Question 73 states “The Home Office estimate is that the cost of this Bill as it currently is would be £1.8 billion over the next 10 years.”

So that’s £180 million a year for 55,255 more successful requests – or £3258 per request, over 100 times more expensive than under the current data retention regime.

So this additional cost is all the “black boxes” snooping on people, right?

Not according to Richard Alcock, Director of the Communications Capabilities Development Programme. From question 73: “The majority of the costs are around data retention. Over 50% are associated with working with communications service providers in the UK, to establish data retention stores.” It would seem that despite their claims that the new bill is mostly about improving data retention, their idea of data retention is significant more expensive (And thus much more extensive?) than the current system.

This discrepancy presumably explains why, despite complaints that much of the existing problem is that the Data Retention Directive is “ambiguous” and does not go far enough

But what about the benefits? There is a claim (Question 76) that this will have a benefit of £600 million per year. When asked to justify this by Dr Julian Huppert MP, Charles Farr included the phrase “We then attached a monetary value to lives saved”. In other words, it’s not a saving, just an analysis of the benefits. We do not have the raw numbers as the Home Office have not released them, so we can not assess if that “value” of lives saved is actually better spent not snooping on people, but in hospitals.

If we assuming the Home Office are being honest in response to Freedom of Information requests, it may simply be that the £1.6 billion figure is made up. (This would not be the first time we have caught someone making up such figures) When I requested a breakdown of the costs of the proposed system, they claimed it would take in excess of 100 hours to compile the information. Which rather sounds like “We do not have this”.

No, not the title of a new kids novel, it’s news that sex offenders face mandatory lie detector tests.

It seems Cameron is “impressed” enough (According to the Guardian) with lie detectors to want to use them on sex offenders. Lie detectors that are otherwise inadmissible in court.

Fail a lie detector test? Bad luck. “Any offenders found to have broken their licence as a result of a lie detector test would be sent back to prison“.

Lie detectors only work when people think they work. There is no fundamental difference between this approach and putting someone in a room with a “psychic mind reader”. I doubt we would stand for that, and there is no reason we should put up with it just because it looks a little bit like science.

(An alternate title for this blog post was going to be Cargo Cult Cameron. Not sure which I prefer…)

Featured on Liberal Democrat VoiceYesterday, the first set of evidence into the Home Office’s controversial interception plans was heard in front of the special committee established to look at the draft bill and you can watch the Video on Parliament’s web site. (More is scheduled for this afternoon).

We learnt a few things about what’s being planned as a result of the evidence given, which was predominantly given by Charles Farr, ex-MI6 man and Director of the Office for Security & Counter-Terrorism.

Firstly, the existing Regulation of Investigatory Powers Act and Data Retention Directive are allowing police and security services to get access to around 75% of the data they are after. It’s envisaged that the wide-scale interception of communications data would increase that to 85% – so by only 10%, which seems a huge cost in both monetary and civil liberties terms for a relatively small increase. The existing shortfall was attributed in part to “ambiguities” in the EU Data Retention Directive as it’s implemented in the UK.

Secondly, when asked about their ability to break cryptography they Home Office mandarins ducked the question, instead saying that their preferred method was to “co-operate” with (I.e. coerce) service providers. This would be the likes of Google, Facebook and Twitter, both UK-based and foreign, so that they stored the communications data themselves.

They were quite clear on this point when asked about “black boxes” too and not just crypto – even though interception is the very first clause in the draft bill, they claim the main thrust is retaining data at the service provider.

A big hole in their argument as a result is that they have not made clear why altering the existing Data Retention Directive to allow this isn’t enough. There is a big difference in liberal terms between being asked to retain data you already have and actually listening in to obtain data.

The issue that remains is foreign non-cooperative service providers who cannot be coerced and the Home Office seems to imagine only intercepting communications as it enters and leaves the UK, and not widespread interception within the UK. This approach will cut the number of boxes they need. They may not even need to talk to big household-name service providers to do this, instead targeting the lesser-known (To the public) fibre providers who offer the bits of glass that go under the oceans, seas and English Channel.

This has the side effect of also intercepting private (Non-internet) traffic and communications transiting the UK from, say, the US to Germany. I’m sure this point hasn’t been lost on those pushing for it.

In terms of capability, the spooks believe it will be nearly impossible to remain anonymous with the volume of data they are able to collect, something that has sinister overtones for anyone with a genuine need to speak out against the establishment or against the police. You don’t even need to look as far as China to see this in action, as it would be the police justifying the use of interception and there is far from universal trust of the police to regulate themselves in this country.

On the topic of the police self-justifying their use of powers, requiring warrants to obtain data for lesser needs (e.g. Harassment and Non-payment of fines) was discussed and the Home Office did not seem to have a good reason why this shouldn’t be the case. Their argument in favour of allowing minor offences to be included is that they might escalate into more serious offences, and that’s OK because they don’t (ab)use these powers much. (Yet…)

Finally, they were asked by one MP if they could rule out “fishing” expeditions where they would obtain the data from hundreds of users but they were not able to do this. The example given was if they know a suspect was at a certain place, they might pull the communications data for everyone in that area at that time.

For those interested in this, there is also an ongoing consultation where you can submit evidence direct to the committee.

Featured on Liberal Democrat VoiceGoogle released the latest update to their half-yearly Transparency Report today, something I’ve reported on previously. The Google data lists the number of “user data requests” per country, but what it doesn’t do is break it down per head of population.

Doing that breakdown gives depressing results. The UK had slipped into second place behind Singapore in terms of the number of requests per citizen, but as of the latest data – covering the second half of 2011 – we’re back on top. The table below shows the top ten countries, with the number of user data requests per million population. For comparison, I’ve also included the rankings of each country appearing in the top ten for the last couple of years since Google’s records began.

Rank
Country Requests 2011 H1 2010 H2 2010 H1 2009 H2
1 United Kingdom 23.5 2 2 1 2
2 France 21.5 3 3 3 3
3 United States 20.4 4 5 4 5
4 Singapore 20.1 1 1 2 4
5 Australia 19.8 5 4 7 8
6 Germany 17.4 8 7 8 11
7 Italy 14.0 6 6 6 6
8 Portugal 13.8 7 9 10 13
9 Norway 9.8 28 26 22 22
10 Taiwan 9.7 15 16 13 22

You can download the raw data (CSV) used to calculate this from the google figures too.

Remember, this is before the latest government plans come before parliament. We would probably drop off the charts completely if this legislation were to go through as they would no longer have to ask google for the data: The ISPs would be forced to do the snooping instead.

It was reported yesterday that the Home Office are now saying that they’re not worried about encryption, because they can look inside HTTPS. Most people’s reaction is that this isn’t possible, or at least isn’t easy unless you’re going to throw huge resources at the problem. (Edit: Privacy International have reported this in more detail)

Sadly, it’s not that hard – but it has worrying implications.

The technical bit

There’s been a trick used by large corporate IT departments for a while to check on what employees are doing, which they often need to do for regulatory compliance. It works because the IT department controls your PC and the can tell it what Certificate Authorities (CAs) to trust to authenticate remote sites. The proxy you use to access the internet has a root CA on it that your PC has been told to trust, so it can create apparently legitimate looking certificates on-the-fly for any web site on the internet you visit.

This is known as a “Man-in-the-Middle” attack, because you’re sitting between A and B and altering the communications, rather than just listening to it passively. It’s also out there and used today – here’s an example of a commercial device that uses this technique.

That’s fine for corporates, because they control the end devices. However, things became a little scarier earlier this year when one of the real root Certificate Authorities broke the trust of the community.

CAs don’t use their highest level certificates for day-to-day signing. Those certificates are installed in every web browser out there and they have to negotiate with browser manufacturers individually if they’re to change them, so if they’re compromised it’s game over for them. Instead, they generate an “intermediate root” certificate and use that, so it can be revoked if someone leaks it. The real root key stays locked in a safe somewhere. One root CA, Trustwave, didn’t just generate intermediate roots for it’s own use, however: It also generated one for use in one of these snooping devices.

Unsurprisingly, the shit hit the proverbial fan, Mozilla threatened to revoke their CA status (Which would have ended them as a company) and they apologised and promised never to do it again.

Back to where we are today

It seems likely that if the Home Office think they can break HTTPS, they’ve spoken to someone with one of these magic SSL snooping boxes and also spoken with a root CA willing to let them have a certificate. If that’s the case, it’s concerning because they think it’s acceptable not just to listen in on traffic but to alter it in transit in order to glean the contents. We’ve seen the unintended consequences of such actions before, when the Internet Watch Foundation listed Wikipedia as a child porn hosting site.

I can see nothing in the proposed Bill that would act as a safeguard against the Home Office mandating the ISPs engage in such behaviour.

Luckily, it probably won’t work. The moment a CA is caught giving the Home Office a root certificate, Mozilla would likely revoke it. They can lean on Apple, Google and Microsoft as corporate entities to play along but Mozilla is run by the community and it’s going to be hard to pull the wool over everyone’s eyes there.

You wouldn’t be able to get on a site without being snooped on, but at least your browser will pop up lots of warnings letting you know that Big Brother is watching.

P.S. If you’re worried about this sort of attack being used on you, I can recommend Certificate Patrol for Firefox. It pops up quite a few false-positives, but will give a pretty good clue if something suddenly causes all your certificates to change.

Featured on Liberal Democrat VoiceThe draft Communications Data Bill has, at last, been published. We can finally debate what has been written down, rather than what the Home Office have been telling people in off-the-record briefings. Julian Huppert MP has an excellent post on safeguards which might be worth a look first, as those are the principles I would like to see in the Bill. Sadly, the draft bill falls down on several counts.

Firstly, we did point out quite forcefully in early debate that the police and security services were asking for powers that they did not have over the postal service. They’ve fixed that in the draft… by granting themselves powers over post too. Under the draft bill, the Royal Mail would need to scan and store the outside of every envelope that goes through the postal system if the Secretary of State asked them to.

Secondly, the vast majority of requests would still not require any form of judicial warrant. Instead, the police would still retain the ability to authorised themselves to go after communications data.

Finally, (for the major concerns), clause 1 which places the obligations on ISPs to collect data is still far too broad. “Interception” is not allowed, but that would seem to only rule out real-time monitoring as it uses the previous RIPA definition. ISPs could still be mandated to look at the content of all traffic to try to drag out “communications data”.

Internet traffic is not like the post, with the addressee neatly written on the outside. Instead, the outer envelope (IP) contains another envelope (TCP). You need to collect together all the IP envelopes in order to make sense of the TCP conversation. Once you have that, you need to open the TCP envelopes to see if they contain little Instant Message, Club Penguin, World of Warcraft or Facebook envelopes. Then, we need to read the data off that envelope, no mean feat given that World of Warcraft envelopes will be written in whatever language makes sense to them, not to us as service providers.

By the time you’ve built this system, even assuming you figure out how, you have something that is required to read the entire content of everyone’s communication to figure out where the envelopes stop and the letters start.

All this is before anyone puts wax seals on their envelopes encrypts their data, which I suspect will start happening quite widely should this bill pass.

How are the Home Office going to do this anyway? Black Boxes. Clause 1(2) allows the Home Office to impose “requirements for telecommunications operators… to acquire, use or maintain specified equipment or systems“. The Home Office might not operate the black boxes, but by mandating the supplier they’re not far off having complete control. I rather suspect ISPs will have very limited information on or access to any mandated systems, which will limit technical oversight.

Even then, Labour’s original “central database” idea isn’t far off, courtesy of clauses 14 to 16 which talk about “filtering” systems operated not by service providers but by the Home Office. There are no safeguards proposed to stop the Home Office from simply demanding all data held by an ISP as part of a trawl for interesting information.

There are a few other holes that need addressing too, but I would expect them to be tightened up in the usual course of events. For example, if you’re given a notice saying your data might be needed for a court case, you have to keep it until you are told it is no longer needed. However, there is no provision, requirement or obligation for the scope of the retention to be limited. Given how long court cases can take, this could mean that an ISP ends up storing all of it’s communications data for years.

It still needs a little more scrutiny. I notice they’ve slipped in powers to allow snooping to collect unpaid fines and taxes, but I forget if that’s still in RIPA. No doubt as people pour over this more, we’ll get better and better breakdowns of what it all means.

Writing in The Times today, the comissioner for the Metropolitan Police defends forthcoming legislation to allow the police to intercept emails by saying that for him, “policing… is about a Total War on crime”. (£)

According to Wikipedia, Total War involves “less differentiation between combatants and civilians than in other conflicts, and sometimes no such differentiation at all“.

So it seems, in comissioner Hogan-Howe’s view, a bit of collateral damage with civilians getting caught up in the conflict is OK. To me, if that’s the case then the police have failed: they are supposed to be protecting the general population, not dragging us into their conflicit with the criminals.

If Hogan-Howe needs to use the failure of his own police force to justify draconian new powers for the police, then something has gone very wrong with policing in this country. We do not yet know the contents of the snoopers bill, to be revealed later today, but so far these are worrying noises.

Yes, there are many responses out there but this one is mine.

Most of the interesting bits, where I will have said something different to someone else, are in Question 16 as that’s the “any other comments bit”. The language is slightly clunky due to their quite restrictive word limits and I would like to have said more, although I’ve actually ended up sending this via email as the Home Office site is down. If you’d like to response and have not done so far (You have until Thursday) but can’t because of web site issues, there is a copy of the consultation document handily mirrored by the other side, C4M (PDF link). If you don’t want to read through the whole thing to pick out the questions, they’re also reproduced right at the end.

Question 1: Do you agree or disagree with enabling all couples, regardless of their gender to have a civil marriage ceremony?

Agree.

Question 2: Please explain the reasons for your answer. Please respond within 1,225 characters (approx. 200 words).

Even if Civil Partnerships and Marriage were legally identical, “Separate but equal” is not truly equal. Separation of the two institutions creates the impression of “second class citizens” in the thoughts of the general population, which can lead to more widespread discrimination. In this regard, the government should be setting the tone for the rest of the country to follow.

Failure to recognise marriage equally in the UK can also create unexpected and unintentional corner-cases in legislation. For example, I am aware of one British-born Trans person who does not have a Gender Recognition Certificate (GRC) and is currently resident in another country. They are legally married there to someone of the opposite gender, but lack of a GRC is not an issue because that country allows marriage regardless of the (legal) gender of the partners. They cannot obtain a GRC, because they are “married”/”civil-partnered”, and the other country would not recognise an interim GRC as grounds for divorce/annulment.

Basing marriage on one set of legislation, regardless of gender, would remove such problems.

Question 3: If you identify as being lesbian, gay, bisexual or transsexual would you wish to have a civil marriage ceremony?

Yes.

Question 4: If you represent a group of individuals who identify as being lesbian, gay, bisexual or transsexual would those you represent wish to have a civil marriage ceremony?

This question doesn’t apply to me

Question 5: The Government does not propose to open up religious marriage to same-sex couples. Do you agree or disagree with this proposal?

Disagree – religious marriage should be opened up to same-sex couples

Question 6: Do you agree or disagree with keeping the option of civil partnerships once civil marriage is available to same-sex couples?

Agree (Also see answer to Question 16)

Question 7: If you identify as being lesbian, gay or bisexual and were considering making a legal commitment to your partner would you prefer to have a civil partnership or a civil marriage?

Civil marriage

Question 8: The Government is not considering opening up civil partnerships to opposite-sex couples. Do you agree or disagree with this proposal?

Disagree – civil partnerships should be opened up to opposite-sex couples (Also see answer to Question 16)

Question 9: If you are in a civil partnership would you wish to take advantage of this policy and convert your civil partnership into a marriage?

This question doesn’t apply to me

Question 10: Do you agree or disagree that there should be a time limit on the ability to convert a civil partnership into a marriage?

There shouldn’t be a time limit. (Careful answering this question, as there appear to be two versions out there depending on which document you have)

Question 11: Do you agree or disagree that there should be the choice to have a civil ceremony on conversion of a civil partnership into a marriage?

Yes, there should be an option

Question 12: If you are a married transsexual person would you want to take advantage of this policy and remain in your marriage while obtaining a full Gender Recognition Certificate?

Yes. (Although I am now divorced)

Question 13: If you are the spouse of a transsexual person, would you want to take advantage of this policy and remain in your marriage whilst your spouse obtained a full Gender Recognition Certificate? This question doesn’t apply to me

Question 14. Do you have any comments on the assumptions or issues outlined in this chapter on consequential impacts? Please respond within 1,225 characters (approx 200 words).

No.

Question 15: Are you aware of any costs or benefits that exist to either the public or private sector, or individuals that we have not accounted for in the impact assessment? Please respond within 1,225 characters (approx 200 words).

No.

Question 16: Do you have any other comments on the proposals within this consultation? Please respond within 1,225 characters (approx 200 words).

Q5: As noted, (2.12) “many faiths” view marriage as only mixed-sex, but not all and prioritising the views of some above others is discriminatory. There is already differing marriage legislation per religion & this could be continued, e.g. one option may be secondary legislation allowing some faiths the ability to conduct same-sex marriage. Those not supporting this would be unable to carry them out & thus could not be forced to.

Q6&8: Whatever is chosen, it should be equal, i.e. nothing open to same-sex couples not also available to mixed-sex couples. Also, creating anything gender-specific may cause problems for GRCs. Although legislation can handle unusual cases, the bureaucracy often can not, e.g. the intent with Interim GRCs was no break between an annulment & new relationship but this is not possible in practice.

Q10: Having a time limit would serve no purpose, and not every couple will necessarily be in a position to convert in a given time e.g. because they do not hear about it, no money, living abroad.

Other: The precise meaning of 2.30 (“we would not be in a position to reinstate their benefit contributions or entitlements from their original marriage“) is not clear. If backdated payments would be an issue, any previously annulled relationship should on restoration also restore full future state & private entitlements.

All prescribed wording and forms/certificates should also have a gender-neutral option. (E.g. Refer to partners as well as/instead of husband/wife)

News in this afternoon, via a statement on their web site and an email to those that complained, is that Conway Hall have cancelled the booking for the controversial RadFem2012 conference.

The statement is quite interesting, in that it includes the line “In addition, we are not satisfied it conforms with the Equality Act (2010)” and – this is the interesting bit – “We had sought assurances that the organisers would allow access to all“. Note they don’t say “transwomen”, they say “all”: it’s as much about excluding men from a feminist conference being unlawful as it is transwomen, which is right and proper.

Basically, you can run a women-only workshop as part of a conference for rape victims. You can run a cis-only workshop for partners of trans people. These are good ideas and, as long as sensitively handled, to be encouraged.

You absoultely can not run a whole conference on the basis that you hate transwomen, men and anyone who identifies as anything other than pure female so much you’re going to exclude them.

From an activism point of view, it’s good to note that the legal advice received by venues hosting events such as this is sufficient to make them think twice and I also see that the RadFem2012 web site currently mentions simply that “the venue has been changed”. I suspect they’ll only tell paid-up attendees where it is this time, and try to keep it from everyone else.

The latest round in the ongoing LibDem conference accreditation saga has been opened by party president Tim Farron in a LibDemVoice post.

It isn’t good. (Although kudos to Tim Farron for engaging with and discussing the issue – it’s a situation he probably had no role in creating)

Firstly, the cardinal rule of minority issues has been broken: “Nothing about us, without us”. LGBT+ LibDems did not know this was going to be announced and we certainly didn’t approve anything like this. From what Tim has said subsequently on Twitter, it appears that no Trans people at all were involved in coming up with the solution.

Unsurprisingly as a result, the solution is unworkable: If you out yourself to the party as Trans, we’ll let you bypass accreditation. But given that the concern was the risk of people being outed in the first place… well, I suspect you can see the problem. It appears that those in charge didn’t quite understand the concerns.

And if LGBT+LD are involved in vouching for people, I have no idea how we’re supposed to tell. It may surprise people to know that there is no secret handshake and no piece of paper that everyone will have that can serve as proof. So even if we had a system to verify paperwork, at some level we’d just have to take people’s word for it!

A possible solution to all this mess is lots of cis people to come forward and also say they’re Trans. That way, nobody can be quite sure if you’re Trans or not just because you bypassed accreditation.

This also has the advantage that anyone with a sensitive identity who has concerns about accreditation, perhaps because you’re the victim of domestic abuse and changed your name or you have a history of attacking deputy Prime Ministers, you can still get in to conference.

We can call it the “Spartacus” system.