31.07.2014 Views

Privy Council Review of intercept as evidence: report - Official ...

Privy Council Review of intercept as evidence: report - Official ...

Privy Council Review of intercept as evidence: report - Official ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

telephone is being set up, any part <strong>of</strong> that circuit can be accessed and the<br />

whole contents <strong>of</strong> the call copied to the <strong>intercept</strong>ing agency. In times p<strong>as</strong>t<br />

that w<strong>as</strong> done by connecting a recording device direct to the wires the target<br />

w<strong>as</strong> using. Nowadays more sophisticated methods are used ***. But the<br />

principle is the same. ***<br />

115. This model breaks down when individual circuits are replaced by IP<br />

networks. *** some <strong>intercept</strong>ion will still be possible through the switch by<br />

which the particular target is connected to the IP network. But access even<br />

there will typically only allow <strong>intercept</strong>ion <strong>of</strong> the raw IP data going to that<br />

target’s location; subsequent processing is then required to interpret and<br />

separate specific communications, if the <strong>intercept</strong>or is to stand any chance <strong>of</strong><br />

making sense <strong>of</strong> them. ***<br />

116. The problem becomes all the harder when the predicted growth <strong>of</strong> the<br />

overall telecommunications business are taken into account. The needle the<br />

<strong>intercept</strong>or is searching for will be hidden in an ever larger haystack.<br />

117. There are no recognised standards for the services that will be <strong>of</strong>fered,<br />

so almost every different service will require its own bespoke processing<br />

capability. Resources will never be sufficient for this to be possible; instead<br />

the authorities will need to prioritise, and put in place processing for those<br />

services which their targets already use or are likely to use in the future. This<br />

necessary prioritisation makes the <strong>intercept</strong>ion system vulnerable to<br />

unforeseen changes in target behaviour. There will inevitably be gaps in<br />

capability; if targets become aware <strong>of</strong> them, it will be quick and e<strong>as</strong>y for them<br />

to move away from services that the system can process, and instead use<br />

services it cannot. Then for a period <strong>intercept</strong>ion will be unable to reach these<br />

targets, until new processing can be devised and put in place. At this point<br />

the cycle can start all over again.<br />

118. To meet this challenge the Home Office is leading a Government-wide<br />

Interception Modernisation Programme ***. The Programme h<strong>as</strong> been set up,<br />

and is beginning to design potential solutions, on the b<strong>as</strong>is <strong>of</strong> existing law,<br />

under which <strong>intercept</strong>ed material is not available for use in <strong>evidence</strong>. The<br />

scale <strong>of</strong> change required to make its product useable <strong>as</strong> <strong>evidence</strong> is not<br />

known, but delays, incre<strong>as</strong>ed risk and incre<strong>as</strong>ed cost seem likely.<br />

119. ***<br />

120. There are a number <strong>of</strong> practical difficulties with using Internet Protocol<br />

material <strong>as</strong> <strong>evidence</strong>.<br />

Putting multiple inputs together will demand a degree <strong>of</strong> sophisticated<br />

analysis by the <strong>intercept</strong>ing agency, which may not be e<strong>as</strong>y to explain<br />

to a jury. This will <strong>of</strong> course be over and above interpreting the targets’<br />

use <strong>of</strong> veiled and allusive speech, obscure dialects etc.<br />

If any one <strong>of</strong> those inputs is missing ***, it will be e<strong>as</strong>y for the defence<br />

to argue that the missing content would provide an innocent<br />

explanation <strong>of</strong> the apparently incriminating contents <strong>of</strong> the others.<br />

***<br />

Chapter VI<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!