GCHQ: Lawyers don’t undermine cyber capabilities, they underpin them

Avatar

Senior officials at Britain’s cyber and signals intelligence agency GCHQ published a rare article on Thursday defending the role of lawyers and legal frameworks for cyber operations amid an ongoing discussion about whether existing laws are providing an advantage to the West’s adversaries.

In particular, the article responds to an anonymous European intelligence official who argued in Binding Hook magazine that Western cyber capabilities are being constrained by stringent legal frameworks.

Specific operations aren’t detailed, but the author suggests how an agency focused on foreign intelligence might be prohibited from collecting “information from systems owned by the citizens of its country” as part of its normal course of duties.

“But what if, as Chinese and Russian cyber threat actors do, a system belonging to a citizen is being abused to route attack traffic through? Such an operational development is not foreseen, and thus not prescribed, by law. To collect information would then be illegal and require judicial overhaul – a process that can take years in a domain that can see modus operandi shift in a matter of days.”

The article cites numerous public complaints about a range of different kinds of oversight hampering the ability for security and intelligence agencies to be fully effective, including recently from two former heads of Germany’s foreign intelligence agency,

GCHQ’s response marks what has been a consistent argument by Britain’s cyber community — that cyber power can be exercised in a “responsible and democratic” way — and forms part of the agency’s growing efforts to contribute to public and academic discussions.

“We welcome this debate because, as the [anonymous European intelligence official] author points out, this view — or some version of it — has been expressed by various high-ranking officials over the years,” wrote GCHQ’s director of legal affairs, Shehzad Charania, and Neil M, one of the agency’s deputy directors.

These various high-ranking officials have included several from the United States, who, in the words of former NSA Director Michael Hayden, have “begged, cajoled, and pleaded” for the renewal of Section 702 of the U.S. Foreign Intelligence Surveillance Act (FISA) — a controversial electronic spying authority that the U.S. intelligence community says is vital for national security.

U.S. officials have warned that requiring additional oversight for FISA powers would undermine the capabilities it provides, but in their article the officials from GCHQ defend oversight as “a key part of what grants intelligence agencies their license to operate. It also provides the necessary confidence for operators to carry out their activities and is, therefore, far from an impediment.”

GovernmentNewsNation-state
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

US charges three Iranians allegedly behind Trump campaign hack

Next Post

Here’s what to expect from the Counter Ransomware Initiative meeting this week

Related Posts

New Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Framework

Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with the goal of facilitating unauthorized file uploads and code execution.  "The exploitation is likely tied to either a previously disclosed vulnerability like CVE-2017-9844 or an unreported remote file inclusion (RFI) issue," ReliaQuest said in a report published this week. The cybersecurity
Avatar
Read More

Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwide

Microsoft has disclosed details of a large-scale malvertising campaign that's estimated to have impacted over one million devices globally as part of what it said is an opportunistic attack designed to steal sensitive information. The tech giant, which detected the activity in early December 2024, is tracking it under the broader umbrella Storm-0408, a moniker used for a set of threat actors
Avatar
Read More