UK Security Agencies Say Mass Internet Spying Is Crucial

Lawyers for UK spy agencies said at the start of a trial over privacy concerns that the bulk interception of communications is critical in protecting the country against terrorism.

Without the ability to collect mass data, MI5, MI6 and GCHQ "would be less effective in protecting the UK against threats such as terrorism, cyber threats or espionage," government lawyers said in court documents responding to a suit from Privacy International, an advocacy group that’s seeking to clarify whether the UK government has been acting lawfully.

"Exploitation of Bulk Personal Datasets is an essential tool that is used on a daily basis, in combination with other capabilities, right across the intelligence services’ operations," an unidentified GCHQ witness said in documents prepared for the trial at a special London court.

Western governments have had to tread a fine line between civil liberties and protecting civilians in the face of an increase in extremist violence across Europe and the US. Recently there have been attacks in Germany and France that have seen dozens of people killed or injured.

Foiled Attacks

The UK faces the threat of a domestic attack not just from supporters of Islamist extremism, but also Northern Ireland and authoritarian regimes, government lawyers said. UK agencies foiled six attacks in the country in the 12 months before September 2015, they said.

But lawyers for Privacy International said there weren’t adequate measures in place to ensure spy agencies don’t overstep the mark when it comes to bulk interception.

"There are no sufficient safeguards to challenge the aggressive and expansive interpretation of the security services legal powers," Thomas De La Mare, Privacy International’s lawyer, said in court.

Current bulk-collections include location and call data for everyone’s mobile phone in the UK for one year, Privacy International said in its prepared arguments for the Investigatory Powers Tribunal, a special court that investigates complaints about spying.

Information-Management

 

« Bio-Electronics: A New Business Controlling Human Organs With Electronic Implants
European Privacy Directive: Encryption Without Backdoors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

Thrive

Thrive

Thrive delivers the experience, resources, and expertise needed to create a comprehensive cyber security plan that covers your vital data, SaaS applications, end users, and critical infrastructure.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Risk Strategies

Risk Strategies

Risk Strategies is a leading specialty risk management consultancy and insurance broker offering smarter, practical approaches to risk mitigation including Cyber Liability insurance.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

SecurityGen

SecurityGen

SecurityGen is a global cybersecurity start-up focused on telecom security, with a focus on 5G networks.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Primus Institute of Technology

Primus Institute of Technology

At Primus Institute of Technology our mission is to inspire, support, and empower current and aspiring IT professionals through training and career development workshops.

SecurEyes

SecurEyes

SecurEyes is a leading cybersecurity firm that provides specialised services, including cybersecurity assessments, managed services, and governance risk and compliance services.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

Coastline Cybersecurity

Coastline Cybersecurity

Coastline Cyber is a cybersecurity consulting firm dedicated to helping organizations strengthen their security posture by reducing risks, mitigating threats, and protecting against attacks.