{"id":32945,"date":"2020-01-23T15:31:29","date_gmt":"2020-01-23T15:31:29","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/"},"modified":"2020-01-23T15:31:29","modified_gmt":"2020-01-23T15:31:29","slug":"we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/","title":{"rendered":"We need to make it even easier for UK terror cops to rummage about in folks&#8217; phones, says govt lawyer"},"content":{"rendered":"<div readability=\"30.285714285714\">\n<h2>Don&#8217;t want to incriminate yourself? Tough luck, you terrorist<\/h2>\n<p> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/01\/26\/shutterstock_illuminati.jpg?x=442&amp;y=293&amp;crop=1\" alt=\"black robed individuals in a circle... scary! Photo by shutterstock\" width=\"442\" height=\"293\" class=\"article_img\"><\/p>\n<p>The British government&#8217;s view of people who encrypt their communications<\/p>\n<\/div>\n<div id=\"body\" readability=\"115.85098438561\">\n<p>The Government Reviewer of Terrorism Laws has declared that safeguards protecting Britons from police workers demanding passwords for their devices must be watered down.<\/p>\n<p>In a speech delivered to conservative think tank the Henry Jackson Society yesterday, Jonathan Hall QC, the &#8220;Independent Reviewer of Terrorism Legislation&#8221;* said <a target=\"_blank\" href=\"http:\/\/www.legislation.gov.uk\/ukpga\/2000\/23\/section\/49\" rel=\"noopener noreferrer\">section 49 of the Regulation of Investigatory Powers Act (RIPA) 2000<\/a> is too &#8220;difficult&#8221; for police and others to work with.<\/p>\n<p>Section 49 of RIPA is the part of UK law that lets police and others legally order suspects to hand over passwords for encrypted information.<\/p>\n<p>There are two safeguards: one is subsection (3), which says the state can only demand your password if it is &#8220;in the interests of national security&#8221;, for &#8220;preventing or detecting crime&#8221; or for the &#8220;economic well-being of the United Kingdom&#8221;.<\/p>\n<p>The other safeguard, identified by Hall, is subsection (2)(d), which says password demands can only be made by the state if it is &#8220;not reasonably practicable&#8221; to get at the encrypted information without demanding the password. Failure to obey is a crime punishable with <a target=\"_blank\" href=\"http:\/\/www.legislation.gov.uk\/ukpga\/2000\/23\/section\/53\" rel=\"noopener noreferrer\">up to five years in prison<\/a>.<\/p>\n<p>Even these sweeping permissions and slim safeguards are too narrow, in Hall&#8217;s view. In his speech he said:<\/p>\n<blockquote class=\"centredquote\" readability=\"10\">\n<p>The truth is that these preconditions may be difficult to establish, especially when counter-terrorism police are working against the clock in relation to multiple individuals and multiple devices, where those individuals are in precharge detention and must be either charged or released unconditionally&#8230;<\/p>\n<\/blockquote>\n<p>Pre-charge detention \u2013 arrest and incarceration without being charged \u2013 for people apprehended under terrorism powers lasts for up to a fortnight. After 14 days police must ask a judge&#8217;s permission to carry on jailing a suspect without setting out a case against them.<\/p>\n<p>Hall went on to call for the creation of a new offence of failing to hand over a password during a terrorism investigation. It was unclear whether the barrister was calling for the word &#8220;terrorism&#8221; to be inserted alongside &#8220;child indecency&#8221; and &#8220;national security&#8221; in RIPA section 53(5A)(a), which sets longer sentences for refusals to decrypt in certain types of case.<\/p>\n<p>In a coded warning, Hall appeared to suggest that opposing an expansion of forced-decryption powers could lead to &#8220;longer and longer periods of pre-trial detention being sought&#8221; by police, spies and the like.<\/p>\n<p>Lest all this is thought to be an edge case that only applies to nasty people who had it coming to them anyway, British police abused their Terrorism Act powers to target a journalist&#8217;s courier who was changing flights at Heathrow while carrying encrypted material from Edward Snowden. In an act of great national shame, a senior judge <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2016\/01\/19\/court_of_appeal_dismisses_david_miranda_appeal_greenwald_snowden_echr\/\" rel=\"noopener noreferrer\">decided this was perfectly legal<\/a>.<\/p>\n<p>Hall&#8217;s proposal would see people in similar circumstances \u2013 journalists, your lawyer, your family members \u2013 facing a potential five-year prison term for quite reasonably refusing to incriminate themselves or others. Such abuses, and potential abuses, must be confronted and taken outside the range of lawful options open to police and others.<\/p>\n<p>Hall&#8217;s full speech is available <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/terrorismlegislationreviewer.independent.gov.uk\/wp-content\/uploads\/2020\/01\/200122-HJS-speech-.pdf\">as a PDF on the government website<\/a>, gov.uk. \u00ae<\/p>\n<h3 class=\"crosshead\"><span>Bootnote<\/span><\/h3>\n<p>* The Independent Reviewer of Terrorism Legislation&#8217;s official name is deliberately misleading: the post is now used by the government of the day for prominent barristers to prove their political loyalty before promotion into senior politico-legal posts.<\/p>\n<p>Hall&#8217;s immediate predecessor, Max Hill QC, echoed then-Home Secretary Amber Rudd&#8217;s demands for <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/09\/01\/max_hill_qc_deny_encryption_anonymous_users\/\" rel=\"noopener noreferrer\">encryption and online anonymity to be outlawed<\/a>, something that did not in any way slow down his <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.gov.uk\/government\/news\/next-director-of-the-cps-announced\">promotion to Director of Public Prosecutions<\/a> \u2013 top job in the criminal legal world \u2013 10 months later.<\/p>\n<p>Before Hill came David Anderson QC, who was widely accepted to have been as neutral as is possible in the post; nonetheless, this didn&#8217;t stop his elevation to the House of Lords as a crossbench peer after he stepped down in 2017.<\/p>\n<p>The first permanent reviewer and Anderson&#8217;s predecessor was Lord (Alex) Carlile QC, who, though nominally a Lib Dem, took a post in 2001 in Tony Blair&#8217;s Labour government. He spent the next nine years overseeing the introduction of intrusive legal powers for police, spies, local councils and <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2008\/06\/23\/councils_ripa_warning\/\" rel=\"noopener noreferrer\">anyone else in the public sector who fancied themselves as James Bond<\/a>.<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1889\/-8120\/detecting-cyber-attacks-as-a-small-to-medium-business?td=wptl1889\">Detecting cyber attacks as a small to medium business<\/a><\/p>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/01\/23\/weaken_forced_decryption_safeguards_govt_lawyer_says\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Don&#8217;t want to incriminate yourself? Tough luck, you terrorist The Government Reviewer of Terrorism Laws has declared that safeguards protecting Britons from police workers demanding passwords for their devices must be watered down.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":32946,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-32945","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>We need to make it even easier for UK terror cops to rummage about in folks&#039; phones, says govt lawyer 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"We need to make it even easier for UK terror cops to rummage about in folks&#039; phones, says govt lawyer 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-23T15:31:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"442\" \/>\n\t<meta property=\"og:image:height\" content=\"293\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"We need to make it even easier for UK terror cops to rummage about in folks&#8217; phones, says govt lawyer\",\"datePublished\":\"2020-01-23T15:31:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/\"},\"wordCount\":749,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/\",\"name\":\"We need to make it even easier for UK terror cops to rummage about in folks' phones, says govt lawyer 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer.jpg\",\"datePublished\":\"2020-01-23T15:31:29+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer.jpg\",\"width\":442,\"height\":293},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"We need to make it even easier for UK terror cops to rummage about in folks&#8217; phones, says govt lawyer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"We need to make it even easier for UK terror cops to rummage about in folks' phones, says govt lawyer 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/","og_locale":"en_US","og_type":"article","og_title":"We need to make it even easier for UK terror cops to rummage about in folks' phones, says govt lawyer 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-01-23T15:31:29+00:00","og_image":[{"width":442,"height":293,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"We need to make it even easier for UK terror cops to rummage about in folks&#8217; phones, says govt lawyer","datePublished":"2020-01-23T15:31:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/"},"wordCount":749,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/","url":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/","name":"We need to make it even easier for UK terror cops to rummage about in folks' phones, says govt lawyer 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer.jpg","datePublished":"2020-01-23T15:31:29+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/01\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer.jpg","width":442,"height":293},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/we-need-to-make-it-even-easier-for-uk-terror-cops-to-rummage-about-in-folks-phones-says-govt-lawyer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"We need to make it even easier for UK terror cops to rummage about in folks&#8217; phones, says govt lawyer"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=32945"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/32945\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/32946"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=32945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=32945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=32945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}