Does the government want to snoop on your data?
Does the government really want you to tell them everything? And what are its new communications-watching plans all about? Simon Brew finds out more…
By now, there's a sporting chance that you may already have heard this particular news. It's regarding the government's plan that it's effectively bringing back to life a proposal that was dropped by the previous administration, to enable the broader, real-time monitoring of e-ails and website history.
It's a blanket enforcement that's being proposed, too, that won't require a warrant, and effectively sees the power of the Regulatory Powers Act of 2000 (RIPA) being extended.
I am totally opposed to the idea of governments reading people's emails at will, or creating a new central government database.
This did not go down well the last time it was mooted. Unsurprisingly, it's not gone down too well this time, either. As news filtered out about the plan, an almost-obligatory Twitter-hashtag - #TellDaveEverything cropped up, and you didn't have to look far to find various gradations of ire.
So what's happening?
Well, word has leaked' in advance of the Queen's Speech that the Government Communications Headquarters, more commonly known as GCHQ, is to be given extended rights to monitor UK electronic communications.
The information that it will be able to get hold of, without the requirement for any kind of warrant, won't include the content of the communications themselves, but it will cover who they were from and to, the duration, frequency and timings. It will be able to access this information "on demand", reports The Sunday Times, and also as it happens. Furthermore, if GCHQ subsequently gets a warrant, then it can access the content of the communications, too.
This then also means that said communications' content would be stored, which presents challenges in itself, beyond the moral issues, that we'll come to shortly.
In This Article
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now