UK to introduce new laws and a code of practice for police wanting to rifle through mobile phone messages

But there's a lot more to worry about in new Bill, say campaigners


A new UK law will explicitly authorise the "voluntary" slurping of data from mobile phones of crime suspects and witnesses.

The Police, Crime, Sentencing and Courts Bill, which was introduced to Parliament this week, contains clauses that will allow police and others to extract data from mobile phones if the user "voluntarily" hands the device over.

Although it seems counterintuitive, the move comes after headlines in years gone by of police accessing excessive amounts of data from the phones of people who handed them over.

The most pointed criticism came from privacy pressure group Big Brother Watch, which insisted that victims of sexual assault were submitting to "digital strip searches" [PDF, 60 pages] as a result of cooperating with police investigators.

"Victims who do give blanket consent to these digital interrogations are afforded no protections. All the data taken from their devices, which can even include their social media accounts, can be kept by the police for up to 100 years," said the pressure group in a report it published last year.

iphone unlock

UK cops blasted over 'disproportionate' slurp of years of data from crime victims' phones

READ MORE

Clause 36 [PDF, 307 pages] of the bill says an "authorised person" can only extract information from somebody's phone if it is handed over "voluntarily" and if that person agrees to have their phone's contents digitally hoovered up.

The device can only be examined by police investigating or prosecuting crime, or if they are "helping to locate a missing person" or "protecting a child" from harm.

It appears that the proposed law is an effort to address campaigners by introducing some easy-to-meet procedural requirements. If an officer wants to slurp the digital contents of somebody's phone and pry into them, they must first be satisfied that "there are no other means of obtaining the information sought by the authorised person which avoid that risk".

A legally binding code of practice will also be introduced. Normal practice in the modern era is for the law to be vague and broad, and for so-called "codes of practice" to contain the actual controls, procedures and safeguards to be followed by investigators. Importantly, police are not as strictly bound by these codes of practice as they are by the actual law – the proposals in the new Bill say police must only "have regard" to the code of practice.

A Home Office spokeswoman said: "This Bill will bring clarity and consistency around the extraction of information and, for the first time, introduces safeguards to protect the privacy of victims and others in primary legislation."

Silkie Carlo, director of Big Brother Watch (BBW) told The Register: "This is a missed opportunity to legislate for a proportionate, fair, rights-respecting digital evidence system. This is a high priority issue. Despite the legal wins against digital strip searches, we are now getting calls again from victims of rape and sexual assault who are told they can't proceed with a police report unless they hand over years of mass data from their phones. The Home Office needs to address this urgently and seriously as offenders aren't being brought to justice."

BBW campaigned hard on what it called "digital strip searches" as part of a questionable response to a Crown Prosecution Service scandal where police and prosecutors had deliberately withheld evidence from courts showing that men accused of rape and sexual assault were likely to be innocent. Reforms intended to protect the innocent from miscarriages of justice became the focus of BBW's campaigning, with the pressure group arguing the pendulum had tilted too far against victims of crime.

Campaign group Liberty said it hadn't looked specifically at the mobile phone search parts of the Police, Crime, Sentencing and Courts Bill but instead pointed to other troubling parts of it, saying: "It's a primary duty of Government to ensure that our communities are safe and free. But parts of this Bill will facilitate discrimination and undermine protest, which is the lifeblood of a healthy democracy.

"We should all be able to stand up for what we believe in, yet these proposals would give the police yet more powers to clamp down on protest." ®

Similar topics

Narrower topics


Other stories you might like

  • Verizon: Ransomware sees biggest jump in five years
    We're only here for DBIRs

    The cybersecurity landscape continues to expand and evolve rapidly, fueled in large part by the cat-and-mouse game between miscreants trying to get into corporate IT environments and those hired by enterprises and security vendors to keep them out.

    Despite all that, Verizon's annual security breach report is again showing that there are constants in the field, including that ransomware continues to be a fast-growing threat and that the "human element" still plays a central role in most security breaches, whether it's through social engineering, bad decisions, or similar.

    According to the US carrier's 2022 Data Breach Investigations Report (DBIR) released this week [PDF], ransomware accounted for 25 percent of the observed security incidents that occurred between November 1, 2020, and October 31, 2021, and was present in 70 percent of all malware infections. Ransomware outbreaks increased 13 percent year-over-year, a larger increase than the previous five years combined.

    Continue reading
  • Slack-for-engineers Mattermost on open source and data sovereignty
    Control and access are becoming a hot button for orgs

    Interview "It's our data, it's our intellectual property. Being able to migrate it out those systems is near impossible... It was a real frustration for us."

    These were the words of communication and collaboration platform Mattermost's founder and CTO, Corey Hulen, speaking to The Register about open source, sovereignty and audio bridges.

    "Some of the history of Mattermost is exactly that problem," says Hulen of the issue of closed source software. "We were using proprietary tools – we were not a collaboration platform before, we were a games company before – [and] we were extremely frustrated because we couldn't get our intellectual property out of those systems..."

    Continue reading
  • UK government having hard time complying with its own IR35 tax rules
    This shouldn't come as much of a surprise if you've been reading the headlines at all

    Government departments are guilty of high levels of non-compliance with the UK's off-payroll tax regime, according to a report by MPs.

    Difficulties meeting the IR35 rules, which apply to many IT contractors, in central government reflect poor implementation by Her Majesty's Revenue & Customs (HMRC) and other government bodies, the Public Accounts Committee (PAC) said.

    "Central government is spending hundreds of millions of pounds to cover tax owed for individuals wrongly assessed as self-employed. Government departments and agencies owed, or expected to owe, HMRC £263 million in 2020–21 due to incorrect administration of the rules," the report said.

    Continue reading

Biting the hand that feeds IT © 1998–2022