Anderson Report: Review Of UK Anti-Terror Data Laws.

Anderson_NICA103357_270895c.jpg

David Anderson QC

The UK Government will publish a comprehensive review on the laws governing the bulk interception of communications on mobile phones and the Internet.

The report by David Anderson QC, an Independent Reviewer of Terrorism Legislation, has examined all laws, which allow police and security services to access the public's personal communications – and will offer new recommendations.
Lord Carlile, his predecessor, told Sky News: "There's been a huge amount of controversy about intercepted communications, communications data, about the state of the law, and about the capacity of the police and other authorities to detect very serious crime using material that comes from internet service providers and from mobile telephony. There is a huge need for the law to be revamped and revised."

The Anderson Review was a condition of emergency legislation passed last year by the Government to force phone and Internet companies to keep records for up to two years. It was delivered to Downing St on 6 May.
The review is expected to look at the relationship between the Government and US Internet giants such as Google, Twitter and Facebook.

Last year, the inquiry into the murder of Fusilier Lee Rigby blamed Facebook for not passing on messages exchanged between the soldier's killers, Michael Adebowale and Michael Adebolajo.
The Government is set to introduce a wide-ranging investigatory powers bill – dubbed the "snoopers' charter" – which the Home Office says will "better equip law enforcement and intelligence agencies to meet their key operational requirements, and address the gap in these agencies' ability to build intelligence and evidence where subjects of interest, suspects and vulnerable people have communicated online".

Details are few, though, because the Government has promised that its legislation will respond to the Anderson Review.
Writing on his blog ahead of the report's publication, Mr Anderson said: "The report won't please everybody (indeed it may not please anybody).
"But if it succeeds in informing the public and parliamentary debate on the future of the law, from an independent perspective, it will have done its job."

The Waves:  http://bit.ly/1FbamOd

 

« NSA Planned to Plant Malware via Google & Samsung Phones
The Brave New World of Cybersecurity »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Oodrive

Oodrive

Oodrive is the first trusted European collaborative suite allowing users to collaborate, communicate and streamline business with transparent tools that ensure security.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.