Publisher: The Guardian Essays Examples

Type of paper: Essay

Topic: Security, Services, Business, Computers, Intelligence, Encryption, Track, Cryptography

Pages: 1

Words: 275

Published: 2020/11/17

Introduction to Security: Chapter 8

The security services of Britain acknowledged they can bypass the use of encryptions by hacking computers themselves. This is reflected in the speech of David Cameron, wherein he insists that “there was no safe space for terrorists or serious criminals which could not be monitored online by the security services” (Travis, 2015, p.1). This makes use of the “power of intelligence” services, which would gather the content of the computer, or heed phone calls and track the locations of the device users. It can also record conversations, snap pictures, or switch on the cameras and/or microphones within the devices. This would enable the security services to facilitate surveillance, including the devices that already been hacked. This ability for intelligence collection is one of the technique of the security force, in safeguarding the computer network and keeping the users protected and safe from hackers. In spite of the exploitation of the computer network, they will have the capacity to collect confidential data, which is vital to the police department and the intelligence agencies that serve the government. However, this security force technique should be made open to the public, for people to understand well the processing and trends of cyber networking.

Concept / Terminology:

There are a number of security services techniques that are being used nowadays, and among these is the use of a bypassing device to hack the computers of the attackers. As stated by Brokenshire in the article, this act of interfering with the privacy of a computer user are among “the most important, sensitive, and closely scrutinized powers available to the state” (Travis, 2015, p.1). However, it is also important to track them, to be able to prevent them from creating threats and disruption. They should be identified and pursued that, in spite of the laws of confidentiality, would trail sensitive security circumstances, to prevent the attack of millions of devices around the globe, by a malicious software set to hacking these devices.


Travis, A. (2015, February 6). Security services capable of bypassing encryption, draft code reveals. Retrieved February 18, 2015, from

Cite this page
Choose cite format:
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Chicago
  • ASA
  • IEEE
  • AMA
WePapers. (2020, November, 17) Publisher: The Guardian Essays Examples. Retrieved March 03, 2024, from
"Publisher: The Guardian Essays Examples." WePapers, 17 Nov. 2020, Accessed 03 March 2024.
WePapers. 2020. Publisher: The Guardian Essays Examples., viewed March 03 2024, <>
WePapers. Publisher: The Guardian Essays Examples. [Internet]. November 2020. [Accessed March 03, 2024]. Available from:
"Publisher: The Guardian Essays Examples." WePapers, Nov 17, 2020. Accessed March 03, 2024.
WePapers. 2020. "Publisher: The Guardian Essays Examples." Free Essay Examples - Retrieved March 03, 2024. (
"Publisher: The Guardian Essays Examples," Free Essay Examples -, 17-Nov-2020. [Online]. Available: [Accessed: 03-Mar-2024].
Publisher: The Guardian Essays Examples. Free Essay Examples - Published Nov 17, 2020. Accessed March 03, 2024.

Share with friends using:

Related Premium Essays
Other Pages
Contact us
Chat now