Ireland Plans Legislation to Permit Law Enforcement Use of Spyware With Court Authorization

Related

Cybersecurity Leaders to Watch in Australian Financial Services

Australia’s financial services sector sits at the epicenter of...

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

What happened Microsoft has developed a lightweight scanner designed to...

EDR-Killer Malware Abuse via SonicWall SSLVPN Exploit Chain

What happened Security researchers have detailed a malware campaign in...

Cisco Meeting Management Vulnerability Lets Remote Attackers Upload Arbitrary Files

What happened A high-severity vulnerability in Cisco Meeting Management was...

Share

What happened

Ireland plans law allowing law enforcement to use spyware, with the Irish government preparing legislation to create a legal basis for “covert surveillance software,” according to statements from Jim O’Callaghan, minister of justice for home affairs and migration. The proposal is framed as strengthening “lawful interception powers” to address serious crime and security threats, and would require interception requests to be authorized by a court. The planned framework also includes provisions for electronic scanning equipment that can pinpoint and record identifier data from mobile devices for location tracking in specific areas. The Department of Justice said it would work with the Irish Attorney General’s Office and other state agencies to develop the legal framework, and described safeguards intended to ensure use is necessary and proportionate.

Who is affected

Irish organizations and residents could be indirectly affected through broader lawful intercept capabilities and potential device identifier collection under court-authorized processes. Providers operating communications, mobile, or digital services in Ireland may be directly affected by compliance and lawful request handling obligations.

Why CISOs should care

Changes to lawful intercept authority can affect data governance, incident handling, and transparency obligations for service providers. Expanded surveillance tooling also increases the importance of strong internal controls, request validation, and auditability to prevent misuse, improper access, or reputational fallout tied to sensitive customer data.

3 practical actions

  • Review lawful request handling processes: Ensure procedures for court-authorized interception or identifier requests include verification, logging, and escalation controls.

  • Assess data retention and access controls: Validate who can access sensitive identifiers and how access is audited across systems likely to receive requests.

  • Update stakeholder communications playbooks: Prepare policy-aligned messaging and legal/security coordination for high-sensitivity government requests.