UK Security Agencies Say Mass Internet Spying Is Crucial

Lawyers for UK spy agencies said at the start of a trial over privacy concerns that the bulk interception of communications is critical in protecting the country against terrorism.

Without the ability to collect mass data, MI5, MI6 and GCHQ "would be less effective in protecting the UK against threats such as terrorism, cyber threats or espionage," government lawyers said in court documents responding to a suit from Privacy International, an advocacy group that’s seeking to clarify whether the UK government has been acting lawfully.

"Exploitation of Bulk Personal Datasets is an essential tool that is used on a daily basis, in combination with other capabilities, right across the intelligence services’ operations," an unidentified GCHQ witness said in documents prepared for the trial at a special London court.

Western governments have had to tread a fine line between civil liberties and protecting civilians in the face of an increase in extremist violence across Europe and the US. Recently there have been attacks in Germany and France that have seen dozens of people killed or injured.

Foiled Attacks

The UK faces the threat of a domestic attack not just from supporters of Islamist extremism, but also Northern Ireland and authoritarian regimes, government lawyers said. UK agencies foiled six attacks in the country in the 12 months before September 2015, they said.

But lawyers for Privacy International said there weren’t adequate measures in place to ensure spy agencies don’t overstep the mark when it comes to bulk interception.

"There are no sufficient safeguards to challenge the aggressive and expansive interpretation of the security services legal powers," Thomas De La Mare, Privacy International’s lawyer, said in court.

Current bulk-collections include location and call data for everyone’s mobile phone in the UK for one year, Privacy International said in its prepared arguments for the Investigatory Powers Tribunal, a special court that investigates complaints about spying.

Information-Management

 

« Bio-Electronics: A New Business Controlling Human Organs With Electronic Implants
European Privacy Directive: Encryption Without Backdoors »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security create a secure digital environment for countries, governments, and organisations and implement cybersecurity resilience enhancement projects around the world.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

SafeHouse Technologies

SafeHouse Technologies

SafeHouse is a cloud-based, high-end cybersecurity platform that can secure and insure any device that is connected to it.

Kainos

Kainos

Kainos is a leading provider of Digital Services and Platforms. Our services include Digital Transformation, Cyber Security, Cloud, AI, IoT and more.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.

Cybercentry

Cybercentry

Cybercentry is a specialist information security, data protection and cyber security consultancy.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.

Cloud Native Computing Foundation (CNCF)

Cloud Native Computing Foundation (CNCF)

CNCF seeks to drive adoption of cloud native technologies by fostering and sustaining an ecosystem of open source, vendor-neutral projects.