When you’re designing an IT system, you don’t necessarily know where the vulnerabilities are. That’s why you need to carry out some solid risk assessment as part of the design process. That’s why you pen test before it rolls out.
The current controversy about the activities of the Government Security Communications Bureau (GCSB) is inescapably about privacy. As such I, like my colleague the Inspector-General of Security and Intelligence, want to outline my role.
Some privacy commentators consider ‘big data’ to be a newspeak phrase that attempts to repackage older familiar terms like ‘personal information’ in a way that reframes the concept and limits the way people think about the privacy issues.
I had to buy a car for the teenager. OK, I didn’t have to but I wanted to. He could have bought himself a bomb but mother didn’t fancy the loss of sleep. It had to be something small and zippy (but not too zippy), and safe (like a zillion air bags safe).