Does the government want to snoop on your data?

Does the government really want you to tell them everything? And what are its new communications-watching plans all about? Simon Brew finds out more…

By now, there's a sporting chance that you may already have heard this particular news. It's regarding the government's plan that it's effectively bringing back to life a proposal that was dropped by the previous administration, to enable the broader, real-time monitoring of e-ails and website history.

It's a blanket enforcement that's being proposed, too, that won't require a warrant, and effectively sees the power of the Regulatory Powers Act of 2000 (RIPA) being extended.

I am totally opposed to the idea of governments reading people's emails at will, or creating a new central government database.

This did not go down well the last time it was mooted. Unsurprisingly, it's not gone down too well this time, either. As news filtered out about the plan, an almost-obligatory Twitter-hashtag - #TellDaveEverything cropped up, and you didn't have to look far to find various gradations of ire.

So what's happening?

The leak

Well, word has leaked' in advance of the Queen's Speech that the Government Communications Headquarters, more commonly known as GCHQ, is to be given extended rights to monitor UK electronic communications.

The information that it will be able to get hold of, without the requirement for any kind of warrant, won't include the content of the communications themselves, but it will cover who they were from and to, the duration, frequency and timings. It will be able to access this information "on demand", reports The Sunday Times, and also as it happens. Furthermore, if GCHQ subsequently gets a warrant, then it can access the content of the communications, too.

This then also means that said communications' content would be stored, which presents challenges in itself, beyond the moral issues, that we'll come to shortly.

Featured Resources

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Simplify cluster security at scale

Centralised secrets management across hybrid, multi-cloud environments

Download now

The endpoint as a key element of your security infrastructure

Threats to endpoints in a world of remote working

Download now

2021 state of IT asset management report

The role of IT asset management for maximising technology investments

Download now

Most Popular

Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

21 Oct 2020
What is Neuralink?
Technology

What is Neuralink?

24 Oct 2020
Hackers demand ransom from therapy patients after clinic data breach
Security

Hackers demand ransom from therapy patients after clinic data breach

27 Oct 2020