Unfocused draining cable goes to the government annually 35 million cost

Apr

30

2016

A calculation made by the government to increase the cost of massive interception of cable connections to 35 million per year. There are a total of four major drain locations. This managed to trace the Volkskrant in the bill for the intelligence and security services.

Internet providers were afraid to pay the costs of self-draining, but the bill makes it clear that the government will reimburse them. This involves the “investment, operating and maintenance costs for the technical provisions that have been or are made in order to fulfill the contract, as well as the administrative and personnel costs incurred by the provider directly resulting from the fulfillment of the contract ‘ .

Also, the cost for long-term intercepting the government takes on its behalf. “This could involve investment costs for duplication of a data stream to facilitate for a long time,” according to the proposal, also said that costs for power and cooling equipment installed by the intelligence services are reimbursed.

2017 2018 2019 2020 2021
15 25 35 35 35
Annual costs for cable interception, in millions of euros

The costs of non-targeted cable interception devises the government in 2017 to 15 million, but this increases to 35 million per year in 2019 and beyond. In 2017 targeting intelligence namely one “access-location ‘, but every year thereafter until 2020 following the addition of a new drain location, bringing the total to four. “Thus, the services do incrementally experience with deployment and use of this agent.” Where the drain locations are the government does not report, “The threat is a deciding factor: consider is will have to be shackled at which point the Dutch infrastructure to intercept the necessary data.”

That the government wants to implement the ISS Act 2002 changes without major changes, the Council of Ministers had itself mid-April already hinted . When the Ministers stressed in particular the addition of some safeguards, such as setting up a committee of judges. Which precedes the deployment of unfocused draining the cable, the interception of telephone and computer hacking by assessing the GISS and DISS. The government used to that message even though the wording ‘research engagement interception’, where she previously ‘non-targeted interception “used.

According to the Times makes the final text of the bill, as it now is to advise the Council of State, seeing that the Council of Ministers takes no notice of the widespread criticism that comes from many different angles. This criticism is partly out of the corner of large companies, both domestic and foreign, different organizations and even of bodies set up by the government itself. In total there were 1100 responses to the law through an Internet consultation.

The various organizations mainly adopt the “indiscriminate nature” of the law down, something that nothing has changed. It’s services allowed to drain for a year unfocused. Commenting says Ton Siedsma Bits of Freedom that the proposal “to trawl content, except for the addition of the word” research project focused, “nothing has changed”. The organization calls on Minister Plasterk to the trawl “that collects lots of data of innocent citizens,” yet to withdraw.

The government believes that the powers are necessary because “cyber threats” and “terrorist threats” would not be recognized in time. The would remain hidden “real intentions of countries at risk” and “high technology knowledge and state secrets” would be unnoticed stolen. Also, the government thinks it would not keep pace without law with foreign intelligence services, which will be placed international cooperation under pressure.

The proposal is added that there should be an independent Review Committee. The government admits that it was necessitated by rulings of the European Court. Comes the government regulator accommodate CTIVD. The Supervisory Committee on the Intelligence and Security will provide “binding opinion” on complaints addressed to the secret services. The CTIVD voiced last September its displeasure about the law.

The services are also entitled to turn to third parties to obtain information or other systems to hack a system of a suspect, such as a router of a suspect breaking into his computer.

One point that “various (critical) comments” constituted by various organizations was that the powers go far beyond when the current ISS Act 2002 was introduced. The organizations are thinking also of the Internet-of-things and the significance of the powers that. Thus, the use of malware and exploiting vulnerabilities in other devices may lead to “far-reaching consequences that can not be foreseen in advance and check.

Viewing:-151

In: Technology & Gadgets Asked By: [15764 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »