SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Gareth
Niblett,
BCS
ISSG
Legal
Day,
22nd
January
2010

I
am
not
a
lawyer,
but
I
know
enough
to
want
to

cover
myself…

Any
information
provided
is
simply
my
view,
which

comes
from
many
years
experience
with
RIPA
and

related
areas,
from
the
original
draft
Bill
through
to

being
being
responsible
for
lawful
intercept,
data

retention
and
disclosure
for
voice
&
data
services.

It
may
differ
from
the
views
and
experience
of

others.
A
lot
of
information
has
been
left
out.

Figures
are
from
many
sources,
may
be
out
of
date,

rounded,
deliberately
imprecise,
or
simply
wrong.

  Part
I,
Chapter
I

     Intelligence
Agencies,
with
NTAC
as
central
focus

  Part
I,
Chapter
II

     Around
650
Public
Authorities

     Largest
contingent
is
Police
&
Intelligence

    ▪  80
Forces,
Law
Enforcement
&
Intelligence
Agencies

      ▪ From
Avon
&
Somerset
to
Wiltshire;

      ▪ SOCA,
CEOP,
PeCU,
SO15,
SFO,
HMRC,
RAF,
MoD

    ▪  Police
SPoCs
–
600
(500
Internet
trained)

    ▪  ABC
SPoCs
–
20

  Part
I,
Chapter
I

    Raw
voice
or
data
in
real‐time

  Part
I,
Chapter
II

  Have
                      Want
                     Amount

  Phone
Number
              Name
&
Address
           80%

  Address
                   Name
&
Number

  IP
/
Email
Address
        Name,
Address
&
Number

                                                       20%

  Name
&
Address
/
Number
   Itemised
Billing

  Name
&
Address
/
Number
   Miscellaneous


    Split
80
/
20
–
Telephony
vs
Internet

  Part
I,
Chapter
I

    ▪  Interests
of
National
Security

    ▪  Prevention
or
detection
of
serious
crime

    ▪  Safeguard
the
economic
wellbeing
of
the
UK

  Part
I,
Chapter
II

          RIPA
    Purpose
                         Amount

          22(2)a
 Interests
of
National
Security
   40%

          22(2)b
 Preventing
/
Detecting
Crime
     50%

          22(2)c
 Interests
of
UK
Economy
          <1%

          22(2)d
 Interests
of
Public
Safety
       <1%

          22(2)e
 Protecting
Public
Health
         <1%

          22(2)f
 Assessing
or
Collecting
Tax
      7%

          22(2)g
 Preventing
Death
or
Injury
       2%

          22(2)h
 Order
by
Secretary
of
State
      <1%

  Part
I,
Chapter
I

     Warrant
signed
by
Home
Secretary,
or
designate,

    is
served
on
a
Communications
Service
Provider

    (CSP);
advance
notice
&
feasibility
check
usual.

    ▪  Can
utilise
a
standing
capability
or
require
recipient
to

       co‐operate
in
deploying
intercept
in
a
timely
fashion.

  Part
I,
Chapter
II

     A
RIPA
Notice
authorised
by
a
Designated
Person

    is
sent
by
an
Accredited
Single
Point
of
Contact

    (SPoC)
to
the
CSP;
except
for
Grade
1
(verbal).

  Part
I,
Chapter
II

         80%

         70%

         60%

         50%

          40%

          30%

          20%

          10%

           0%


                 Grade
1

                            Grade
2

                                       Grade
3

  Part
I,
Chapter
II

  Intelligence
use
of
RIPA

  Part
I,
Chapter
II

  Questions
welcome,
either
now
or
later.





  More
of
me:

   ▪  Blog
–
www.infosecmaven.org

   ▪  Twitter
–
www.twitter.com/INFOSEC_Maven

   ▪  LinkedIn
–
uk.linkedin.com/in/garethniblett

   ▪  If
you
want
direct
contact
details,
please
ask…


Mais conteúdo relacionado

Semelhante a RIPA: Perception and Practice

Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 

Semelhante a RIPA: Perception and Practice (14)

2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
 
Unit 6 IT and RTI Act.pptx
 Unit 6 IT and RTI Act.pptx Unit 6 IT and RTI Act.pptx
Unit 6 IT and RTI Act.pptx
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
How to file a RTI (HINDI)
How to file a RTI (HINDI)How to file a RTI (HINDI)
How to file a RTI (HINDI)
 
GDPR Information
GDPR InformationGDPR Information
GDPR Information
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
 
Hacking presentation BASIC
Hacking presentation BASICHacking presentation BASIC
Hacking presentation BASIC
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
37coins: Hubba Bitcoin Intro, Jonathan Zobro
37coins: Hubba Bitcoin Intro, Jonathan Zobro37coins: Hubba Bitcoin Intro, Jonathan Zobro
37coins: Hubba Bitcoin Intro, Jonathan Zobro
 
Government Contracting- The Dawn of the CMMC - Win Federal Contracts
Government Contracting- The Dawn of the CMMC - Win Federal ContractsGovernment Contracting- The Dawn of the CMMC - Win Federal Contracts
Government Contracting- The Dawn of the CMMC - Win Federal Contracts
 
Ivanti threat thursday deck july final - read-only
Ivanti threat thursday deck july final  -  read-onlyIvanti threat thursday deck july final  -  read-only
Ivanti threat thursday deck july final - read-only
 
RTI Basics
RTI BasicsRTI Basics
RTI Basics
 

Mais de Gareth Niblett

Mais de Gareth Niblett (16)

Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)
 
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsBCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest Threats
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider Threats
 
BCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber ResponseBCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber Response
 
BCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureBCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, Secure
 
BCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share SecurelyBCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share Securely
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic Security
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 Threats
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
 
BCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessBCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk Business
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going On
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay Alert
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver Bullet
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber Innovation
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber Defence
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

RIPA: Perception and Practice