Securing Freedom, What Tactics Should and Currently are Being Used to Combat Criminal Exploitation of the Internet, and is it Legal or Proportionate ?
A few recent broadcasts not too be missed..
Stephen Grey investigates the use of computer hacking by the police and security agencies to combat criminal exploitation of the internet and asks if it is legal.
“.. RIPA .. range of surveillance powers.. unspecified hardware/software, keyloggers..
software installed on suspect computers could be considered breaking section 3 of Computer Misuse Act, by altering data..
lack of clarity from authorities, Article 8 Human Rights Act, scope of states power must be disclosed and made clear what authorities will or won’t use ..
William Hague, who speaks for the government on computer security issues, said: “Any export of goods that could be used for internal repression is something we would want to stop” .. He also admitted the law governing software exports was a grey area ..”
UK firm denies ‘cyber-spy’ deal with Egypt
Stephen Grey, File on 4, BBC Radio 4, 20 September 2011
http://www.bbc.co.uk/news/technology-14981672 – (Full Broadcast) – last access 23 September 2011
Excellently delivered by Eliza, offering public insight into reasons behind securing freedom and perceived hypocrisy.
Her second Reith lecture of 2011, the former director-general of the British Security Service (MI5), Eliza Manningham-Buller, discusses policy priorities since 9/11. She reflects on the Arab Spring, and argues that the West’s support of authoritarian regimes did, to some extent, fuel the growth of al-Qaeda.
The Reith Lectures – Securing Freedom: 2011 : Freedom
Eliza Manningham-Buller, BBC Radio 4, 20 September 2011
http://www.bbc.co.uk/iplayer/episode/p00k4053/The_Reith_Lectures_Eliza_ManninghamBuller_Lecture_3_Freedom/ – (Full Broadcast) – last access 23 September 2011
Her first and the previous Reith Lecture:
The Reith Lectures – Securing Freedom: 2011 : Security
Eliza Manningham-Buller, BBC Radio 4, 13 September 2011
http://www.bbc.co.uk/iplayer/episode/b014fcyw/The_Reith_Lectures_Securing_Freedom_2011_Eliza_ManninghamBuller_Security/ – (Full Broadcast) – last access 23 September 2011
September 23, 2011 | Categories: Computer Misuse Act, Ethics, Eu Cybercrime Strategy, European Convention on Human Rights, FinSpy, Keyloggers, Legal, News, RIPA, Software, Standards and Procedure, Unauthorised Access | Tags: Cairo, Computer Forensics, Computer Misuse Act, Cyber Forensics, Digital Forensics, Email and IM Applications, Ethics, Eu Cybercrime Strategy, European Convention on Human Rights, Finfisher, FinSpy, Gamma International UK Limited, Keyloggers, Law, Legal, Malcious Software, Malware, Network Forensics, Privacy, RAM Acqusistion and Analysis, RATs, Remote Access Tools, RIPA, Skype, Trojan, Unauthorised Access, Video and Audio Applications, Wifi Snooping | Comments Off on Securing Freedom, What Tactics Should and Currently are Being Used to Combat Criminal Exploitation of the Internet, and is it Legal or Proportionate ?