Bulk data harvesting essential to counter terrorism, according to report

Snooper's Charter powers ok-ed by review board

A review into terror legislation has ruled that Britain's spy agencies should be free to collect vast amounts of personal data, calling it vital to counter-terrorism.

David Anderson QC carried out the independent review of four of the powers contained in the Investigatory Powers Bill, known also as the Snooper's Charter, concerning the bulk interception, bulk equipment interference, bulk personal datasets and acquisition of information by MI5, MI6 and GCHQ.

Advertisement - Article continues below

Anderson concluded there was "generally not a viable alternative to bulk interception for overseas operations" and that an individual's right to privacy may be overridden "in the interests of national security, safety and the prevention of disorder or crime".

The techniques deployed by the agencies had been used to counter the child sexual exploitation, counter-terrorism and cyber defence.

Prime Minister Theresa May, in her previous role as home secretary, drafted the Communications Data Bill - also informally known as the Snoopers Charter.

The Investigatory Powers Bill was announced in November 2015, containing fewer "contentious" powers than the previous bill, according to May.

Jonathan Parker-Bray, founder and chief executive of Pryvate encryption app, said the government had ignored the UK cyber security industry's stance, which has stated that any weakening of encryption would stand to dramatically affect its ability to do business on a global scale.

Advertisement
Advertisement - Article continues below

Yet, he acknowledges, such a weakening would be necessary to undertake the level of bulk data harvesting the intelligence services are demanding.

"The important thing to underline is that a balance needs to be struck here, the Government does need tools to fight cybercrime and criminals who use mobile devices to communicate in the digital age and normal citizens and businesses have the right to private communications," he said.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/security/privacy/355155/zoom-kills-facebook-integration-after-data-transfer-backlash
privacy

Zoom kills Facebook integration after data transfer backlash

30 Mar 2020
Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

26 Mar 2020