GCHQ taken to court by ISPs over network spying

GCHQ under threat of lawsuit from ISP companies angered over Snowden spying revelations

Seven Internet Service Providers (ISPs) from the UK, US, Netherlands, South Korea and others have banded together to take the UK intelligence service GCHQ to court.

It is the first time GCHQ has had to defend itself in court to a corporate body and it will have to answer snooping accusations that stem from the Edward Snowden leaks.

The group claim the government agency performed a series of "network attacks" that undermined "the goodwill the organisations rely on".

Charges filed against GCHQ include claims that Belgian telecoms company Belgacom was infected with malware, that the agency used intrusion technology to covertly monitor communications and that it spied on internet traffic flowing through Germany.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The ISPs involved in the case are GreenNet (UK), Riseup (US), Greenhost (Netherlands), Mango (Zimbabwe), Jinbonet (South Korea) People Link (US) and Chaos Computer Club (Germany).

All seven are noted as being easy targets' as they are not independent firms and not the major service provider in their respective countries.

A supporter of the case, Privacy International, claimed "the type of surveillance being carried out allows them to challenge the practices... because they and their users are at threat of being targeted."

The campaign group has filed two similar cases in the past against the surveillance programmes Tempora, Prism and against GCHQ's deployment of spyware.

"These widespread attacks on providers and collectives undermine the trust we all place on the internet and greatly endangers the world's most powerful tool for democracy and free expression," said Eric King, deputy director of Privacy International

Cedric Knight, of ISP GreenNet, added: "Snowden's revelations have exposed GCHQ's view that independent operators like GreenNet are legitimate targets for internet surveillance, so we could be unknowingly used to collect data on our users. We say this is unlawful and utterly unacceptable in a democracy."

Advertisement - Article continues below

GCHQ told the BBC that all its work is conducted "in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate".

Featured Resources

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management

Download now

6 ways your business could suffer if you don’t backup Office 365

Office 365 makes it easy to lose valuable data regularly, unpredictably, unintentionally, and for good

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now

8 digital best practices for IT professionals

Don't leave anything to chance when going digital

Download now
Advertisement

Recommended

Visit/cyber-security/33079/gchq-boss-says-uk-must-be-vigilant-againt-chinese-tech-firms
cyber security

GCHQ boss says UK must be vigilant againt Chinese tech firms

25 Feb 2019
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/security/cyber-security/354827/mcafee-researchers-trick-tesla-autopilot-with-a-strip-of-tape
cyber security

McAfee researchers trick Tesla autopilot with a strip of tape

21 Feb 2020
Visit/operating-systems/27717/how-to-fix-a-stuck-windows-10-update
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

10 Feb 2020