Anderson Report: Review Of UK Anti-Terror Data Laws.

Anderson_NICA103357_270895c.jpg

David Anderson QC

The UK Government will publish a comprehensive review on the laws governing the bulk interception of communications on mobile phones and the Internet.

The report by David Anderson QC, an Independent Reviewer of Terrorism Legislation, has examined all laws, which allow police and security services to access the public's personal communications – and will offer new recommendations.
Lord Carlile, his predecessor, told Sky News: "There's been a huge amount of controversy about intercepted communications, communications data, about the state of the law, and about the capacity of the police and other authorities to detect very serious crime using material that comes from internet service providers and from mobile telephony. There is a huge need for the law to be revamped and revised."

The Anderson Review was a condition of emergency legislation passed last year by the Government to force phone and Internet companies to keep records for up to two years. It was delivered to Downing St on 6 May.
The review is expected to look at the relationship between the Government and US Internet giants such as Google, Twitter and Facebook.

Last year, the inquiry into the murder of Fusilier Lee Rigby blamed Facebook for not passing on messages exchanged between the soldier's killers, Michael Adebowale and Michael Adebolajo.
The Government is set to introduce a wide-ranging investigatory powers bill – dubbed the "snoopers' charter" – which the Home Office says will "better equip law enforcement and intelligence agencies to meet their key operational requirements, and address the gap in these agencies' ability to build intelligence and evidence where subjects of interest, suspects and vulnerable people have communicated online".

Details are few, though, because the Government has promised that its legislation will respond to the Anderson Review.
Writing on his blog ahead of the report's publication, Mr Anderson said: "The report won't please everybody (indeed it may not please anybody).
"But if it succeeds in informing the public and parliamentary debate on the future of the law, from an independent perspective, it will have done its job."

The Waves:  http://bit.ly/1FbamOd

 

« NSA Planned to Plant Malware via Google & Samsung Phones
The Brave New World of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Becrypt

Becrypt

Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

SySS

SySS

SySS is a market leader in penetration testing in Germany and Europe.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.