Implications..
The document says "[who's sending messages to whom] is universally regarded as a vital tool for national authorities." but no one is required to put a sender address on a letter in the post, are they?
Am I reading this right?
It seems like she wants at the very least, every ISP to be running tcpdump on their servers, counting UDP packets and TCP connect/disconnects. But reading the doc it seems clear that she also wants some deep packet inspection to read what html page I'm requesting, who that email is going to, whose blog I'm reading, etc. etc.
But my (rural) ISP gives me a NAT address behind a NAT adddress behind a NAT address, so they're going to have to do the logging down at the bottom level servers and pass that info up to the logging machine, which probably means doubling the bandwidth on the uplink ... :-(
And if they looked at my on-line habits all they'll see is various encrypted connections to the
US of A, and Germany, which won't help them see who I'm emailing, the odd DNS lookup or
10, and of course me spending too much time reading El Reg, bbc news, etc.
If they want to reverse DNS the connections, they'd have to do that query almost packet
by packet, as at least one of the servers I talk to is on a dynamic IP, except that it probably won't
give an answer because of the policies of that server's ISP. I guess the alternative is for each subscriber they maintain a cache of what the DNS servers returned to them (more content logging).
Nice big data-centre, and lots of extra fibre, I guess.
And of course there's also Granny's wireless network which gets hijacked by the half the kids on her road.. There's going to be a lot of traffic that she doesn't know about (even though she's unwittingly providing the connection)... and I bet Granny won't be able to do that sort of packet sniffing and logging, even if her little wireless router let her know it was shipping data for anyone else in the first place...
Sorry Jacqui, the internet hasn't been designed to provide that data, and the encryption side
of it that has been designed to hide data from criminals is just as good at hiding it from the police.