31.07.2014 Views

Privy Council Review of intercept as evidence: report - Official ...

Privy Council Review of intercept as evidence: report - Official ...

Privy Council Review of intercept as evidence: report - Official ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

If it becomes known, from one criminal c<strong>as</strong>e, that a particular service<br />

can be exploited by the <strong>intercept</strong>ing agencies, other criminals will e<strong>as</strong>ily<br />

be able to move to different services (from the wide choice available<br />

through the Internet) which they believe are more secure. This will<br />

quickly result in the loss <strong>of</strong> useful <strong>intercept</strong> ***.<br />

In the same way, if it becomes apparent that a particular service cannot<br />

be exploited, it will be e<strong>as</strong>y for criminals and terrorists to make<br />

deliberate use <strong>of</strong> it. They will not need to know why that service is<br />

unexploitable.<br />

Some services will be (or will be alleged to be) vulnerable to hacking or<br />

spo<strong>of</strong>ing. It will be possible for the defence to argue that incriminating<br />

material w<strong>as</strong> falsified (whether by law enforcement or by third parties),<br />

and hard for the prosecution to rebut such arguments. While voice<br />

identification techniques (though far from infallible) can be used to<br />

prove that a telephone call w<strong>as</strong> indeed made by the target, it will be<br />

much harder to prove that an email or other non-voice communication<br />

w<strong>as</strong> from the purported sender.<br />

121. Recognising that this challenge is by no means limited to the UK<br />

(though it may happen sooner here), we have tried to establish how other<br />

countries plan to address it. We have found it hard to get accurate data. It<br />

appears that most countries plan to rely for law enforcement purposes on<br />

s<strong>of</strong>tware likely to be built into IP switches – even though such access will<br />

allow at best partial <strong>intercept</strong>ion <strong>of</strong> the many services which will be available<br />

to their targets, not all <strong>of</strong> them provided by domestic suppliers. We are<br />

confident that such a simplistic approach will be inadequate for the UK,<br />

whether or not <strong>intercept</strong> is used <strong>as</strong> <strong>evidence</strong>.<br />

122. To the extent that other countries have more sophisticated access<br />

(invariably through their intelligence agencies), we do not expect them to use<br />

the product evidentially. This distinction is already clear in the US ***.<br />

CONCLUSION<br />

123. The advent <strong>of</strong> new technology will require wide-ranging and very<br />

expensive changes to the UK’s <strong>intercept</strong>ion systems. All <strong>intercept</strong>ion, even <strong>of</strong><br />

seemingly simple telephone calls, will have to make use <strong>of</strong> the same<br />

advanced techniques. To protect these techniques and the strategic<br />

capabilities they bring, a significant proportion <strong>of</strong> IP <strong>intercept</strong> will not be<br />

available for use <strong>as</strong> <strong>evidence</strong>. This requirement h<strong>as</strong> influenced the legal<br />

models we have considered – see Chapter VIII.<br />

Chapter VI<br />

30

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!