UK Security Agencies Say Mass Internet Spying Is Crucial

Lawyers for UK spy agencies said at the start of a trial over privacy concerns that the bulk interception of communications is critical in protecting the country against terrorism.

Without the ability to collect mass data, MI5, MI6 and GCHQ "would be less effective in protecting the UK against threats such as terrorism, cyber threats or espionage," government lawyers said in court documents responding to a suit from Privacy International, an advocacy group that’s seeking to clarify whether the UK government has been acting lawfully.

"Exploitation of Bulk Personal Datasets is an essential tool that is used on a daily basis, in combination with other capabilities, right across the intelligence services’ operations," an unidentified GCHQ witness said in documents prepared for the trial at a special London court.

Western governments have had to tread a fine line between civil liberties and protecting civilians in the face of an increase in extremist violence across Europe and the US. Recently there have been attacks in Germany and France that have seen dozens of people killed or injured.

Foiled Attacks

The UK faces the threat of a domestic attack not just from supporters of Islamist extremism, but also Northern Ireland and authoritarian regimes, government lawyers said. UK agencies foiled six attacks in the country in the 12 months before September 2015, they said.

But lawyers for Privacy International said there weren’t adequate measures in place to ensure spy agencies don’t overstep the mark when it comes to bulk interception.

"There are no sufficient safeguards to challenge the aggressive and expansive interpretation of the security services legal powers," Thomas De La Mare, Privacy International’s lawyer, said in court.

Current bulk-collections include location and call data for everyone’s mobile phone in the UK for one year, Privacy International said in its prepared arguments for the Investigatory Powers Tribunal, a special court that investigates complaints about spying.

Information-Management

 

« Bio-Electronics: A New Business Controlling Human Organs With Electronic Implants
European Privacy Directive: Encryption Without Backdoors »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

XenArmor

XenArmor

XenArmor products include NetCertScanner, an enterprise software to scan & manage expired SSL Certificates on your local network or internet.

Censornet

Censornet

Censornet's autonomous, integrated cloud security gives mid-market organisations the confidence and control of enterprise-grade cyber protection.

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Inogesis

Inogesis

Inogesis helps blue-chip organisations harness disruptive technologies and thinking to drive new revenues or overcome challenges by connecting them with dynamic small companies.

Excellium Services

Excellium Services

Excellium’s Professional Services team combines expertise and experience that complements your in-house security resources.

Combis

Combis

COMBIS is a regional high-tech ICT company focused on the development of application, communication, security and system solutions and the provision of services.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

Zemana

Zemana

Zemana provides innovative cyber-security solutions to deal with complex malicious software and other cyber threats.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

LimaCharlie

LimaCharlie

LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility, build what you want, control your data, get the security capabilities you need.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.