Bulk data harvesting essential to counter terrorism, according to report

Snooper's Charter powers ok-ed by review board

A review into terror legislation has ruled that Britain's spy agencies should be free to collect vast amounts of personal data, calling it vital to counter-terrorism.

David Anderson QC carried out the independent review of four of the powers contained in the Investigatory Powers Bill, known also as the Snooper's Charter, concerning the bulk interception, bulk equipment interference, bulk personal datasets and acquisition of information by MI5, MI6 and GCHQ.

Advertisement - Article continues below

Anderson concluded there was "generally not a viable alternative to bulk interception for overseas operations" and that an individual's right to privacy may be overridden "in the interests of national security, safety and the prevention of disorder or crime".

The techniques deployed by the agencies had been used to counter the child sexual exploitation, counter-terrorism and cyber defence.

Prime Minister Theresa May, in her previous role as home secretary, drafted the Communications Data Bill - also informally known as the Snoopers Charter.

The Investigatory Powers Bill was announced in November 2015, containing fewer "contentious" powers than the previous bill, according to May.

Jonathan Parker-Bray, founder and chief executive of Pryvate encryption app, said the government had ignored the UK cyber security industry's stance, which has stated that any weakening of encryption would stand to dramatically affect its ability to do business on a global scale.

Advertisement
Advertisement - Article continues below

Yet, he acknowledges, such a weakening would be necessary to undertake the level of bulk data harvesting the intelligence services are demanding.

"The important thing to underline is that a balance needs to be struck here, the Government does need tools to fight cybercrime and criminals who use mobile devices to communicate in the digital age and normal citizens and businesses have the right to private communications," he said.

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/business-strategy/careers-training/356422/ibm-job-ad-calls-for-12-year-experience-with-6-year-old
Careers & training

IBM job ad calls for 12-years of experience with six-year-old Kubernetes

13 Jul 2020
Visit/business/business-operations/356395/nvidia-overtakes-intel-as-most-valuable-us-chipmaker
Business operations

Nvidia overtakes Intel as most valuable US chipmaker

9 Jul 2020
Visit/security/cyber-attacks/356417/trump-confirms-cyber-attacks-on-russia-election-trolls
cyber attacks

Trump confirms US cyber attack on Russia election trolls

13 Jul 2020