Britain: Details of Every Phone Call, Text Message, Email and Websites Visited Will Be Stored in Vast Corporate Databases for the Government to Access

February 20th, 2012

Via: Telegraph:

Landline and mobile phone companies and broadband providers will be ordered to store the data for a year and make it available to the security services under the scheme.

The databases would not record the contents of calls, texts or emails but the numbers or email addresses of who they are sent and received by.

For the first time, the security services will have widespread access to information about who has been communicating with each other on social networking sites such as Facebook.

Direct messages between subscribers to websites such as Twitter would also be stored, as well as communications between players in online video games.

The Home Office is understood to have begun negotiations with internet companies in the last two months over the plan, which could be officially announced as early as May.

It is certain to cause controversy over civil liberties – but also raise concerns over the security of the records.

Access to such information would be highly prized by hackers and could be exploited to send spam email and texts. Details of which websites people visit could also be exploited for commercial gain.

The plan has been drawn up on the advice of MI5, the home security service, MI6, which operates abroad, and GCHQ, the Government’s “listening post” responsible for monitoring communications.

Rather than the Government holding the information centrally, companies including BT, Sky, Virgin Media, Vodafone and O2 would have to keep the records themselves.

Under the scheme the security services would be granted “real time” access to phone and internet records of people they want to put under surveillance, as well as the ability to reconstruct their movements through the information stored in the databases.

The system would track “who, when and where” of each message, allowing extremely close surveillance.

Mobile phone records of calls and texts show within yards where a call was made or a message was sent, while emails and internet browsing histories can be matched to a computer’s “IP address”, which can be used to locate where it was sent.

2 Responses to “Britain: Details of Every Phone Call, Text Message, Email and Websites Visited Will Be Stored in Vast Corporate Databases for the Government to Access”

  1. LoneWolf says:

    FOR THE PURE FUN OF THE SITUATION WE CAN SUPER SATURATE AND PROVIDE DECOYS IN EMAIL AND BLOG TRANSMISSION:

    To use ECHELON Spoofer words when sending an email, simply grab a bunch of the ECHELON keywords and paste them into your email message at the top or bottom.

    Put in an Instant Message, paste a few of the ECHELON keywords into the IM window (ICQ, Yahoo, Skype, MSN, etc).

    You can also use ECHELON Spoofer keyords in a web page, although it’s best if you rotate the keywords occasionally.

    You can even use ECHELON keyords while on the phone- simply repeat a few of the keywords from time to time. Challenge your friends to come up with the most keyword-laden sentence possible, and hand out prizes to the winner! For example:

    Hey dude my 5 Name: Anonymous : 2007-11-26 04:43 50MZ Sears Tower Undercover VBS GEOS 2600 Magazine Alouette site NACSI Uziel DC7 detcord Lynch Wackenhutt 52 52 N – 03 03 W freedom GQ360 Ft. Meade NSAS STEEPLEBUSH Link 16 rain Sayeret Tzanhanim BVD Porno BRIGAND AG Bunker MITI S/Key SBIRS Fax encryption Offensive Information WANK DSS Aladdin LHR fuses captain Recce CUSI LHI NSLEP Galil arm siliconpimp NAWAS zone Flintlock SADF GGL SAFE IWO SADT Oscor hope wetsu Middleman Investigation condor Toth ECCM MIT SecDef Kiwi NMIC ASIS credit mines INFOSEC Bach Flashbangs F-22 ANC ISWG 64 Vauxhall Cross piz ZL31 1080H SASR SISDE ULF toad screws weapons boobytraps shelter PFS blackjack honor assault team OTAR Secert Service nitrate GEBA pink noise Blowpipe SARA DDIS composition b hostages EKMC SGI Magdeyev Steve Case RG POCSAG SDI ASDIC Gorizont Asset Montenegro rita KWR-46 grenades IRS ISSSP hmtd
    explicit interception S.E.T. Team ZNI1 Loin Cypherpunks Gorelick Jasmine Defense Information Warfare impact OC-12 Ronco rogue DUVDEVAN PzB39 NAIAG rednoise VGPL EAM BIOL Waihopai
    Merlin ASWS FLiR Type I DONCAF sulfur rebels CQB EOD pmk 40 DERA ZARK VNET Freeh Ti NCSA gtegsc

    =============================================

    Apparently the original spoofer page was removed … but here is a list:

    http://dis.4chan.org/read/lounge/1196066356

    =============================================

    Spoofing ECHELON helps in a number of ways:

    If enough people did this the ECHELON system would be overwhelmed and would grind to a halt. In addition, the inclusion of thousands or millions of extra messages with the keywords in the would increase the signal-to-noise level of the whole system while providing lots of “false positives”, making the ECHELON system less and less reliable over time.

    We suggest that when sending an email, grab a chunk of the ECHELON keywords and paste them into your email message at the top or bottom. In theory, this will cause decreased effectiveness of the ECHELON system since it has to deal with and process more communicaton containing the keywords.

    IF NOT MISTAKEN NEW ZEALAND HOSTED SOME MAJOR INTEL STATIONS AND ANTENNAS FOR THE ELABORATE SPY SYSTEM IN SERVICE FOR YEARS.

Leave a Reply

You must be logged in to post a comment.