UK Security Agencies Say Mass Internet Spying Is Crucial

Lawyers for UK spy agencies said at the start of a trial over privacy concerns that the bulk interception of communications is critical in protecting the country against terrorism.

Without the ability to collect mass data, MI5, MI6 and GCHQ "would be less effective in protecting the UK against threats such as terrorism, cyber threats or espionage," government lawyers said in court documents responding to a suit from Privacy International, an advocacy group that’s seeking to clarify whether the UK government has been acting lawfully.

"Exploitation of Bulk Personal Datasets is an essential tool that is used on a daily basis, in combination with other capabilities, right across the intelligence services’ operations," an unidentified GCHQ witness said in documents prepared for the trial at a special London court.

Western governments have had to tread a fine line between civil liberties and protecting civilians in the face of an increase in extremist violence across Europe and the US. Recently there have been attacks in Germany and France that have seen dozens of people killed or injured.

Foiled Attacks

The UK faces the threat of a domestic attack not just from supporters of Islamist extremism, but also Northern Ireland and authoritarian regimes, government lawyers said. UK agencies foiled six attacks in the country in the 12 months before September 2015, they said.

But lawyers for Privacy International said there weren’t adequate measures in place to ensure spy agencies don’t overstep the mark when it comes to bulk interception.

"There are no sufficient safeguards to challenge the aggressive and expansive interpretation of the security services legal powers," Thomas De La Mare, Privacy International’s lawyer, said in court.

Current bulk-collections include location and call data for everyone’s mobile phone in the UK for one year, Privacy International said in its prepared arguments for the Investigatory Powers Tribunal, a special court that investigates complaints about spying.

Information-Management

 

« Bio-Electronics: A New Business Controlling Human Organs With Electronic Implants
European Privacy Directive: Encryption Without Backdoors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NCX Group

NCX Group

NCX Group is committed to helping customers identify and mitigate the risks inherent in today’s interconnected environments and business processes.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

SafeStack Academy

SafeStack Academy

SafeStack Academy is an online cyber security and privacy education platform. Our content is designed by experts to suit small businesses, growing companies, and development teams.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.

ITConnexion

ITConnexion

ITConnexion is an Australian-based Managed IT Service with over 20 years of experience. We offer a complete IT management service for non-profits, SMEs, and enterprises.

LeakSignal

LeakSignal

At LeakSignal, we transform the way you monitor and protect your data. We provide unparalleled visibility and control over your sensitive data flows.