Publisher: The Guardian Essays Examples

Type of paper: Essay

Topic: Security, Business, Services, Computers, Intelligence, England, Internet, Cyber Crimes

Pages: 1

Words: 275

Published: 2020/11/17

Introduction to Security: Chapter 8

The security services of Britain acknowledged they can bypass the use of encryptions by hacking computers themselves. This is reflected in the speech of David Cameron, wherein he insists that “there was no safe space for terrorists or serious criminals which could not be monitored online by the security services” (Travis, 2015, p.1). This makes use of the “power of intelligence” services, which would gather the content of the computer, or heed phone calls and track the locations of the device users. It can also record conversations, snap pictures, or switch on the cameras and/or microphones within the devices. This would enable the security services to facilitate surveillance, including the devices that already been hacked. This ability for intelligence collection is one of the technique of the security force, in safeguarding the computer network and keeping the users protected and safe from hackers. In spite of the exploitation of the computer network, they will have the capacity to collect confidential data, which is vital to the police department and the intelligence agencies that serve the government. However, this security force technique should be made open to the public, for people to understand well the processing and trends of cyber networking.

Concept / Terminology:

There are a number of security services techniques that are being used nowadays, and among these is the use of a bypassing device to hack the computers of the attackers. As stated by Brokenshire in the article, this act of interfering with the privacy of a computer user are among “the most important, sensitive, and closely scrutinized powers available to the state” (Travis, 2015, p.1). However, it is also important to track them, to be able to prevent them from creating threats and disruption. They should be identified and pursued that, in spite of the laws of confidentiality, would trail sensitive security circumstances, to prevent the attack of millions of devices around the globe, by a malicious software set to hacking these devices.


Travis, A. (2015, February 6). Security services capable of bypassing encryption, draft code reveals. Retrieved February 18, 2015, from

Cite this page
Choose cite format:
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Chicago
  • ASA
  • IEEE
  • AMA
WePapers. (2020, November, 17) Publisher: The Guardian Essays Examples. Retrieved January 20, 2021, from
"Publisher: The Guardian Essays Examples." WePapers, 17 Nov. 2020, Accessed 20 January 2021.
WePapers. 2020. Publisher: The Guardian Essays Examples., viewed January 20 2021, <>
WePapers. Publisher: The Guardian Essays Examples. [Internet]. November 2020. [Accessed January 20, 2021]. Available from:
"Publisher: The Guardian Essays Examples." WePapers, Nov 17, 2020. Accessed January 20, 2021.
WePapers. 2020. "Publisher: The Guardian Essays Examples." Free Essay Examples - Retrieved January 20, 2021. (
"Publisher: The Guardian Essays Examples," Free Essay Examples -, 17-Nov-2020. [Online]. Available: [Accessed: 20-Jan-2021].
Publisher: The Guardian Essays Examples. Free Essay Examples - Published Nov 17, 2020. Accessed January 20, 2021.

Share with friends using:

Please remember that this paper is open-access and other students can use it too.

If you need an original paper created exclusively for you, hire one of our brilliant writers!

Contact us
Chat now