- Require the authorization of a judge for all instances of interception, which pertains to circumstances in which law enforcement officials are empowered to read the communication of a suspect. This would theoretically help to limit the Home Secretary's power in this particular process.
- Reviewers should bring up to date the definition of "communications data," which currently refers to the who, when, and how but not the content of the actual information collected.
- "Strict additional safeguards" should be placed on security and intelligence agencies, though they should be allowed to continue to practice "bulk collection" of intercepted material.
- "No go areas" should be introduced with regards to encrypted communications, but a law-based system should be created to help manage the process of security forces requesting encryption keys.
"Modern communications can be used by the unscrupulous for purposes ranging from cyber-attack, terrorism and espionage to fraud, kidnap and child sexual exploitation. A successful response to these threats depends on entrusting public bodies with the powers they need to identify and follow suspects in a borderless online world. But trust requires verification."Anderson's recommendations follow on the heels of new legislation enacted by the United States government that will curtail somewhat the surveillance powers of the National Security Agency. Out of concern for the extent to which the U.S. government can access people's private information, Apple, Google, and other tech giants also wrote President Obama a letter earlier this week that urged him to not use national policies to weaken encryption technologies.