Skip to main content
Mallory
Mallory

Ireland Proposes Communications Bill to Legalize Police Spyware and Expand Interception Powers

communications (interception and lawful access) billlawful interceptioncommunications billirelandpostal packets and telecommunications messages (regulation) act 1993lawful accessinterceptionspywarelegislationlaw enforcementcellebritepolicesafeguardsdevice compromiseeu commission
Updated January 23, 2026 at 01:00 AM4 sources
Ireland Proposes Communications Bill to Legalize Police Spyware and Expand Interception Powers

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Ireland’s government announced plans to introduce the Communications (Interception and Lawful Access) Bill, a legislative overhaul intended to modernize the country’s lawful interception framework and explicitly provide a legal basis for law enforcement use of spyware. Officials said the existing Postal Packets and Telecommunications Messages (Regulation) Act 1993 predates modern communications, particularly end-to-end encrypted messaging, and argued a new framework is needed to address serious crime and security threats while adding “robust” safeguards to ensure powers are necessary and proportionate.

The proposed bill is described as covering “all forms of communications, whether encrypted or not,” and enabling access to both content and metadata, expanding scope to services and device categories such as electronic messaging platforms, email, and IoT communications. While the announcement emphasizes privacy/security safeguards and increased technical cooperation between state agencies and service providers, reporting notes it does not clearly explain the technical mechanism for accessing encrypted communications—an outcome that in practice often requires device compromise (e.g., government-grade spyware) or local forensic extraction tools (e.g., Cellebrite). The government also indicated alignment with the EU Commission’s roadmap on lawful access and encryption-related interception issues.

Related Stories

Irish and UK Government Digital Policy Moves: Expanded Surveillance Powers and In-House Digital ID Build

Irish and UK Government Digital Policy Moves: Expanded Surveillance Powers and In-House Digital ID Build

Ireland is considering legislation to expand law enforcement digital surveillance authorities, including stronger powers to intercept communications (explicitly including **encrypted messages**) and to create a clearer legal basis for police use of **spyware**. The proposal signals a shift toward more formalized state capabilities for communications interception and device compromise, with direct implications for privacy, lawful access, and the security expectations of end-to-end encrypted services. In the UK, the government indicated that a new **digital identity** program is expected to be **designed, built, and run by in-house government teams** rather than outsourced to external suppliers, while declining to provide firm cost estimates ahead of a planned consultation. Ministers stated costs would be met within existing spending settlements, and the government pushed back on an external estimate (reported as **£1.8B**) pending consultation outcomes—raising governance, delivery-risk, and security-assurance questions for a large-scale identity platform even as detailed technical and budgetary specifics remain limited.

1 months ago

Signal Threatens EU Exit Over Proposed Chat Control Law Mandating Message Scanning

Signal, a leading provider of end-to-end encrypted messaging services, has publicly stated it will withdraw from the European Union market if the proposed Chat Control legislation is enacted. The Chat Control proposal, currently under consideration by the European Union and spearheaded by the Danish Presidency, would require all messaging platforms, including those offering end-to-end encryption, to scan user communications and files for abusive or illegal material before messages are sent. This measure is intended to combat child exploitation and other criminal activities, but has raised significant concerns among privacy advocates, technology experts, and encrypted messaging providers. Signal Foundation President Meredith Whittaker has argued that the legislation would effectively mandate mass surveillance, undermining the privacy and security of all users, including government officials, journalists, activists, and vulnerable populations. The proposed law would require service providers to implement scanning mechanisms that could potentially be exploited by hackers or nation-state adversaries, thereby increasing the risk of unauthorized access to sensitive communications. Privacy experts warn that the requirement to scan messages before encryption would fundamentally break the security model of end-to-end encrypted services, exposing all users to potential surveillance and data breaches. The pending vote, scheduled for October 14, has become a focal point of debate, with Germany holding a pivotal swing vote that could determine the law's fate. Historically, Germany has opposed such measures, but recent political developments have cast uncertainty on its position. Denmark, currently presiding over the Council of the European Union, has been a strong proponent of the legislation and is pushing for its adoption. The controversy highlights the ongoing tension between law enforcement objectives and the protection of digital privacy in Europe. Signal's threat to exit the EU market underscores the potential impact on both users and the broader technology ecosystem if the law is passed. Other encrypted messaging platforms, such as Telegram, WhatsApp, and Threema, are also likely to be affected by the proposed requirements. The debate has drawn international attention, with privacy advocates warning that the law could set a precedent for similar measures in other jurisdictions. The outcome of the EU vote will have significant implications for the future of encrypted communications and digital privacy rights across Europe. If enacted, the law could force major changes in how messaging services operate, potentially leading to reduced privacy protections for millions of users. The situation remains fluid as stakeholders on all sides lobby for their positions ahead of the critical vote.

5 months ago
ICE Expands Use of Commercial and Technical Surveillance Data for Immigration Enforcement

ICE Expands Use of Commercial and Technical Surveillance Data for Immigration Enforcement

U.S. Immigration and Customs Enforcement (**ICE**) is exploring expanded access to commercially available data from online advertising and technology brokers to support investigations, issuing a **Request for Information (RFI)** to understand the availability of personal, financial, location, and health data and how it could be provided to federal investigative entities. The effort is framed as market research rather than a direct procurement, and follows an earlier RFI seeking open-source intelligence and social media data to improve targeting for ICE’s Enforcement and Removal Operations. Privacy and civil liberties advocates warn that purchasing brokered data can function as a workaround to traditional warrant requirements, and point to proposed legislation such as the **Fourth Amendment Is Not For Sale Act** as a potential constraint on government acquisition of data that would otherwise require judicial authorization. Reporting on ICE’s broader deportation and enforcement posture describes the agency’s reliance on multiple surveillance technologies to identify and track individuals, including **cell-site simulators** (also known as *stingrays* / **IMSI catchers**) that impersonate cellular towers to locate and potentially identify nearby phones. The coverage also highlights legal controversy around enforcement tactics, including allegations of warrantless home entry that legal experts argue conflicts with **Fourth Amendment** protections. Separately, European policymakers are described as reassessing dependence on U.S. technology amid geopolitical tensions and sanctions risk, but that discussion is not specific to ICE’s surveillance or data-broker acquisition activity.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.