Saktanong - stock.adobe.com

Why police forces need to be honest about mass mobile phone surveillance

Police forces across the UK are covering up their use of sophisticated mass surveillance devices, known as IMSI-catchers - the Bristol Cable and Liberty are campaigning for proper transparency

While “stop and search” occurs in plain sight, police forces are rapidly and discretely becoming equipped with more intrusive methods of searching individuals and communities.

The tools on offer vary – from in-the-field technology that can hack mobile phones, to facial recognition and predictive policing capabilities. This technological revolution is granting police unprecedented access to people’s lives.

Investigations by The Bristol Cable have revealed that at least nine police forces in the UK have secretly purchased mobile phone surveillance devices, known as IMSI-catchers.

These indiscriminate surveillance tools allow police to track mobile phone locations and identities in real time, to intercept text messages and calls across a large radius. According to some manufacturers’ catalogues, IMSI-catchers can hack up to 1,500 handsets per minute across five networks within 8km2 of their deployment.

At least 197 parliamentary constituencies are policed by the nine constabularies known to possess IMSI-catchers. This information only came to light after police procurement data and documents were analysed by The Bristol Cable.

The investigation showed that constabularies had spent hundreds of thousands of pounds (over £1m by the Metropolitan Police alone) on IMSI-catchers, and that they were using an acronym – CCDC (covert communications data capture) – to disguise their purchases.

To date, the Home Office and individual police forces have pursued a policy of neither confirming nor denying the possession or use of IMSI-catchers. Public authorities and ministers have consistently refused to declare whether police or other agencies possess or operate the technology, despite mounting evidence that its use is becoming widespread.

This was last published in February 2018