UK Home Office re-bans cheap call gateways because 'terrorism'

Ofcom would have done this itself but didn't have the power


Security minister Ben Wallace has signed a direction banning commercial multi-user phone gateways in the UK over terrorism fears – barely a week after the only ever prosecution for operating one flopped following years of Kafkaesque wrangling.

The direction to Ofcom (PDF, 1 page), made under section 5(3)(a) of the Communications Act 2003, prohibits the operation of a commercial multi-user gateway (COMUG) unless State agencies can "obtain ... accurate communications data to the same level as can currently be obtained without the use of a commercial multi-user gateway".

In a statement, Wallace said: "This direction is necessary to ensure that those charged with keeping families and communities safe have access to relevant and accurate information when they need it and when they have the appropriate authorisations in order to do their job."

While the ministerial direction refers explicitly to terrorism – that is, national security – Ofcom has no power to consider national security matters, only technical and economic issues. The telecoms regulator thus said to the Home Office that only a formal ministerial direction would enable it to reimpose the ban. If Ofcom was allowed to take national security into consideration by itself, it would not have needed a ministerial direction.

COMUGs were legalised by Ofcom in July following a public consultation. This followed on from an earlier Court of Appeal ruling which overturned the ban on commercial single-user gateways (COSUGs), which are technically very similar to COMUGs.

The precise meaning of "communications data" in the direction is unclear. Although section 261(5) of the Snoopers' Charter claims to define the phrase, it is done in impenetrable legalese. Privacy campaign group Big Brother Watch reckons (PDF) that "communications data" means the "who, when, where and how of any communication", as distinct from the content of a message or phone call.

Although the telecoms regulator said it was only considering "quality of service" and potential interference caused by the operation of COMUGs, there is an intensely political dimension to the whole issue.

The Home Office lobbied Ofcom hard when the regulator was pondering whether to lift its ban, even going to the extent of having its secret Investigatory Powers Unit make an anonymous submission to the public consultation – though it vehemently denies this, insisting the anonymity was a mere admin error despite having been caught red-handed by El Reg.

Central to the Home Office's objection was its inability to trace people using COMUGs – though it pretended the real issue was the ability to geolocate people who dialled 999 through a COMUG. Because sane people ring the emergency services via a cheap calls gateway, obviously.

The decision comes barely a fortnight after the only ever prosecution for illegally operating a COMUG, that of Kent man Daniel Mahony, was dropped. Mahony had languished on bail for eight years while the Home Office and Crown Prosecution Service mucked him about in a scenario straight out of Franz Kafka's novel The Trial. Even the judge repeatedly questioned the public interest in continuing that prosecution.

Keeping State surveillance out of sight and out of mind

Above all, what the Home Office seems to have feared most with COMUGs is a potential inability to spy on anyone using a telephone. Britain's surveillance state apparatus, well documented here and elsewhere, operates on a dragnet basis with few meaningful oversight mechanisms.

The department's response to the Ofcom consultation on legalising COMUGs (PDF) laughably claimed that COMUGs might interfere with safety-of-life geolocation that operates through the normal 999 network. This was a very thin veneer over its true objection, namely the ability to track down terrorists ringing their mates abroad. Though it mentioned policing, the national security objection was absent.

In itself, that attempt to cover up the true reason for objecting to COMUGs raises further questions: why is the Home Office so embarrassed to admit national security is involved here? Virtually all clandestine State snooping for any reason has been retrospectively legalised in the Investigatory Powers Act 2016, so it's not as if hushing this up would give extra protection to anyone in the Home Office who had been breaking the law. As there are no COMUG operators in the UK today, it's not as though publicity could inspire (would-be) terrorists to say "hey, let's find a gateway and ring our masters for orders!" On the technical side, a large number of SIMs in one location shows up on a mobile network pretty quickly; finding and shutting down an illegal COMUG is very straightforward.

Maybe the Home Office knows that the British public's consent for its East German-style mass surveillance isn't as strong as it likes to kid itself. Of course, that's the classical liberal hope, and classical liberalism was just an 18th century blip in British history. The more likely explanation is that by deliberately keeping all of this out of sight, Home Office mandarins hope the public won't be able to ask questions about what it's up to, or otherwise demand transparency and oversight.

Those two things lead to an informed public which is able to raise objections to inappropriate and undesirable government policies – critically, objections that may be hard to publicly dismiss. Again, this is just a theory, but the history of modern government in the UK is hardly littered with shining examples of openness and responsiveness.

Through such obscure matters as the COMUG ban and the Mahony court case is the curtain lifted on how the British state operates behind the scenes. ®

Similar topics


Other stories you might like

  • VMware claims 'bare-metal' performance from virtualized Nvidia GPUs
    Is... is that why Broadcom wants to buy it?

    The future of high-performance computing will be virtualized, VMware's Uday Kurkure has told The Register.

    Kurkure, the lead engineer for VMware's performance engineering team, has spent the past five years working on ways to virtualize machine-learning workloads running on accelerators. Earlier this month his team reported "near or better than bare-metal performance" for Bidirectional Encoder Representations from Transformers (BERT) and Mask R-CNN — two popular machine-learning workloads — running on virtualized GPUs (vGPU) connected using Nvidia's NVLink interconnect.

    NVLink enables compute and memory resources to be shared across up to four GPUs over a high-bandwidth mesh fabric operating at 6.25GB/s per lane compared to PCIe 4.0's 2.5GB/s. The interconnect enabled Kurkure's team to pool 160GB of GPU memory from the Dell PowerEdge system's four 40GB Nvidia A100 SXM GPUs.

    Continue reading
  • Nvidia promises annual datacenter product updates across CPU, GPU, and DPU
    Arm one year, x86 the next, and always faster than a certain chip shop that still can't ship even one standalone GPU

    Computex Nvidia's push deeper into enterprise computing will see its practice of introducing a new GPU architecture every two years brought to its CPUs and data processing units (DPUs, aka SmartNICs).

    Speaking on the company's pre-recorded keynote released to coincide with the Computex exhibition in Taiwan this week, senior vice president for hardware engineering Brian Kelleher spoke of the company's "reputation for unmatched execution on silicon." That's language that needs to be considered in the context of Intel, an Nvidia rival, again delaying a planned entry to the discrete GPU market.

    "We will extend our execution excellence and give each of our chip architectures a two-year rhythm," Kelleher added.

    Continue reading
  • Now Amazon puts 'creepy' AI cameras in UK delivery vans
    Big Bezos is watching you

    Amazon is reportedly installing AI-powered cameras in delivery vans to keep tabs on its drivers in the UK.

    The technology was first deployed, with numerous errors that reportedly denied drivers' bonuses after malfunctions, in the US. Last year, the internet giant produced a corporate video detailing how the cameras monitor drivers' driving behavior for safety reasons. The same system is now apparently being rolled out to vehicles in the UK. 

    Multiple camera lenses are placed under the front mirror. One is directed at the person behind the wheel, one is facing the road, and two are located on either side to provide a wider view. The cameras are monitored by software built by Netradyne, a computer-vision startup focused on driver safety. This code uses machine-learning algorithms to figure out what's going on in and around the vehicle.

    Continue reading

Biting the hand that feeds IT © 1998–2022