31.07.2014 Views

Privy Council Review of intercept as evidence: report - Official ...

Privy Council Review of intercept as evidence: report - Official ...

Privy Council Review of intercept as evidence: report - Official ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER II - CURRENT USE OF INTERCEPT<br />

INTERCEPTION IN THE UK<br />

15. Interception <strong>of</strong> communications in the UK is governed by the<br />

Regulation <strong>of</strong> Investigatory Powers Act 2000 (RIPA), which provides various<br />

grounds on which <strong>intercept</strong>ion will have “lawful authority”, including when<br />

conducted under warrant. The term ‘<strong>intercept</strong>ion’ covers a wide variety <strong>of</strong><br />

related techniques, which can give legally authorised access to<br />

communications ranging in sophistication from an ordinary call between two<br />

fixed telephones in the UK to a complex multi-media session *** running<br />

across broadband connections *** (for more detail see Chapter VI). In the<br />

future even more sophisticated media will come onto the market, and<br />

<strong>intercept</strong>ion will have to provide access to <strong>as</strong> many <strong>of</strong> them <strong>as</strong> its targets<br />

choose to use. Interception covers the post <strong>as</strong> well <strong>as</strong> electronic media.<br />

16. Interception in accordance with the UK’s legal framework under RIPA<br />

provides both tactical and strategic information for the intelligence and law<br />

enforcement agencies. Tactical <strong>intercept</strong>ion provides real time intelligence on<br />

the plans and actions <strong>of</strong> individual terrorists, criminals and other targets,<br />

which allows the agencies to disrupt their plans and frustrate their actions. It<br />

can identify <strong>evidence</strong> against the targets and facilitate their arrest. Strategic<br />

<strong>intercept</strong>ion can reveal the existence <strong>of</strong> new targets, <strong>as</strong> well <strong>as</strong> the<br />

significance, long term plans, international connections and modus operandi<br />

<strong>of</strong> existing targets, from which (with intelligence from other sources) a broad<br />

understanding <strong>of</strong> the terrorist and criminal threat facing the UK can be derived<br />

and preventive strategies developed.<br />

THE CURRENT LAW<br />

17. RIPA permits specified intelligence and law enforcement agencies to<br />

<strong>intercept</strong> all forms <strong>of</strong> communications (by post <strong>as</strong> well <strong>as</strong> electronically) on the<br />

authority <strong>of</strong> a warrant given by the Secretary <strong>of</strong> State. A warrant can be given<br />

for any <strong>of</strong> three purposes<br />

In the interests <strong>of</strong> national security<br />

<br />

<br />

For the purpose <strong>of</strong> preventing or detecting serious crime<br />

For the purpose <strong>of</strong> safeguarding the economic well-being <strong>of</strong> the United<br />

Kingdom.<br />

In Scotland, warrants for the purpose <strong>of</strong> preventing and detecting serious<br />

crime are given by Ministers in the Scottish Executive.<br />

18. Before giving a warrant, the Secretary <strong>of</strong> State or Scottish Minister<br />

must be satisfied that <strong>intercept</strong>ion is necessary to obtain the information<br />

required; that the information could not re<strong>as</strong>onably be obtained by other<br />

means; and the <strong>intercept</strong>ion is proportionate to what it seeks to achieve.<br />

Warrants l<strong>as</strong>t for three or six months depending on purpose, but can be<br />

renewed by the Secretary <strong>of</strong> State or Scottish Minister. Warrants covering<br />

<strong>intercept</strong>ion <strong>of</strong> communications or post within the UK can cover only one<br />

person or premises; different telephone numbers etc. used by the same target<br />

Chapter II<br />

8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!