BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?
No donation is too small. If every visitor before 31 December gives just ÂŁ1, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!
[Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback] | ||
England and Wales High Court (Administrative Court) Decisions |
||
You are here: BAILII >> Databases >> England and Wales High Court (Administrative Court) Decisions >> National Council for Civil Liberties (Liberty), R (On the Application Of) v Secretary of State for the Home Department & Anor [2019] EWHC 2057 (Admin) (29 July 2019) URL: http://www.bailii.org/ew/cases/EWHC/Admin/2019/2057.html Cite as: [2019] WLR(D) 443, [2020] 1 WLR 243, [2020] WLR 243, [2019] EWHC 2057 (Admin) |
[New search] [Printable PDF version] [View ICLR summary: [2019] WLR(D) 443] [Buy ICLR report: [2020] 1 WLR 243] [Help]
QUEEN'S BENCH DIVISION
DIVISIONAL COURT
Strand, London, WC2A 2LL |
||
B e f o r e :
and
MR JUSTICE HOLGATE
____________________
The Queen (on the Application of National Council for Civil Liberties (Liberty)) |
Claimant |
|
- and - |
||
Secretary of State for the Home Department Secretary of State for Foreign and Commonwealth Affairs |
1st Defendant 2nd Defendant |
|
- and - |
||
National Union of Journalists |
Intervener |
____________________
Sir James Eadie QC, Gerry Facenna QC, Julian Milford and Michael Armitage (instructed by the Government Legal Department) for the Defendants
Angus McCullough QC and Rachel Toney (instructed by SASO) as Special Advocates
Jude Bunting (instructed by Bindmans) for the Intervener
Hearing dates: 17-21 June 2019
____________________
Crown Copyright ©
Lord Justice Singh and Mr Justice Holgate:
Introduction 1 Procedural matters 11 Background to the 2016 Act 18 The legislative scheme of the 2016 Act 34 The Human Rights Act 1998 63 Caselaw of the European Court of Human Rights on "in accordance with the law" 76 Guidance from the Supreme Court on "in accordance with the law" 83 The importance of the nature of the alleged incompatibility 87 Use of Hansard in cases concerning the compatibility of primary legislation under the HRA 91 The jurisdiction of the Investigatory Powers Tribunal 99 The decision of the First Section in Big Brother Watch 113 The challenge to the regime for bulk interception warrants 142 The challenge in respect of bulk and thematic equipment interference warrants 179 Non-protected material 202 Thematic equipment interference warrants under Part 5 204 The challenge in respect of bulk personal datasets 210 The challenge in respect of bulk acquisition warrants 241 The challenge to Parts 3 and 4 of the 2016 Act 265 Lawyer-client communications 271 The challenge in respect of confidential journalistic material 293 MI 5's handling arrangements 353 Conclusion 393 Annex: Overview of relevant legislation Annex
Introduction
(1) Part 6, Chapter 1, which relates to bulk interception warrants.
(2) Part 6, Chapter 3, and Part 5: these concern warrants for bulk and thematic "equipment interference". The Claimant has described this in its submissions as "hacking" but we think it preferable to use the term used in the IPA itself, namely "equipment interference".
(3) Part 7, which relates to warrants for bulk personal datasets ("BPD").
(4) Part 6, Chapter 2, and Parts 3-4: respectively warrants for bulk acquisition of "communications data" and retention notices for, and acquisition of, communications data. "Communications data" is not the "content" of communications but other matters such as "where, when and who".
(1) The provisions of the 2016 Act under challenge are incompatible with Article 8 (the right to respect for private life and correspondence) and Article 10 (the right to freedom of expression) of the European Convention on Human Rights ("ECHR") because they are too wide. They lack the "minimum safeguards" established by the European Court of Human Rights for secret surveillance regimes. They are neither necessary in a democratic society nor proportionate.
(2) Further or alternatively, the powers lack sufficient safeguards to comply with the "minimum requirements" taken together. For this reason they are said not to be "in accordance with the law" (the phrase used in Article 8) or "prescribed by law" (that used in Article 10). This was the main focus of the Claimant's submissions before us.
(3) The powers lack sufficient safeguards for lawyer-client communications and journalistic material, including the confidential sources of a journalist's information.
(4) The continued operation of Part 1, Chapter 2, of the Regulation of Investigatory Powers Act 2000 ("RIPA"), which concerns the acquisition of communications data, is not in accordance with law because it does not comply with EU law. This follows, it is said, from this Court's judgment in 2018, to which we have referred above. The Claimant submits that, although amendments were made to Parts 3-4 of the IPA in accordance with the declaration granted by this Court, the previous regime has not been repealed. The Claimant submits that that regime is not in accordance with law for the reasons identified in this Court's previous judgment.
Procedural matters
Background to the 2016 Act
"The investigatory powers under challenge in this claim make a very significant contribution to tackling the kind of threats set out above: indeed, they are essential for doing so."
At para. 28 he tells this Court that the use of bulk data is among the few effective methods to counter the illicit use of the dark web. Further, as he points out at para. 29, in certain parts of the world the UK has no physical presence, so there are often no initial intelligence leads on emerging threats, whether from terrorists, serious criminals or state-based threats:
"Bulk powers allow security and intelligence agencies to identify and map out known and evolving networks, in turn enabling further intelligence gathering on likely threats. …"
"… Bulk powers also allow the security and intelligence agencies to respond at pace, quickly identifying threats and ruling individuals in or out of investigations. Bulk powers are made more important by the fact that terrorist threats are increasingly diverse in nature and can escalate with increasing speed through the use of the internet to radicalise supporters and plan and execute attacks."
"… Bulk data analysis has played a significant part in every major counter terrorism investigation over the last decade, including in each of the seven terrorist attack plots disrupted between 2014 and the publication of the Operational Case in 2016. …"
(That is a reference to the Government's operational case for bulk powers, which was published during the passage of the Investigatory Powers Bill.)
(1) Powers to intercept communications, including in bulk, were provided for in Part 1, Chapter I of RIPA.
(2) Equipment interference was provided for in powers contained in the Intelligence Services Act 1994 and the Police Act 1997.
(3) Bulk personal datasets could be acquired using information gathering powers in the Intelligence Services Act 1994 ("ISA") and the Security Services Act 1989; and processes for their retention and examination were set out in published agency handling arrangements.
(4) Retention of communications data was provided for in the Data Retention and Investigatory Powers Act 2014 (as amended by the Counter-terrorism and Security Act 2015) and the Anti-terrorism, Crime and Security Act 2001.
(5) The targeted acquisition of communications data was primarily provided for in Part 1, Chapter II, of RIPA.
(6) Bulk acquisition of communications data was provided for in the Telecommunications Act 1984.
"A comprehensive and comprehensible new law should be drafted from scratch, replacing the multitude of current powers and providing for clear limits and safeguards on any intrusive powers that it may be necessary for the public authorities to use." (Executive summary, para. 10)
The legislative scheme of the 2016 Act
"intercepted content may not at any time be selected for examination if –
(a) any criteria used for the selection of the intercepted content for examination are referable to an individual known to be in the British Islands at that time, and
(b) the purpose of using those criteria is to identify the content of communications sent by, or intended for, that individual."
"(b) whether the level of protection to be applied in relation to any obtaining of information by virtue of the warrant, authorisation or notice is higher because of the particular sensitivity of that information". (Emphasis added)
The Human Rights Act 1998
"(1) Everyone has the right to respect for his private and family life, his home and his correspondence.
(2) There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others." (Emphasis added)
"(1) Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers. This Article shall not prevent States from requiring the licensing of broadcasting, television or cinema enterprises.
(2) The exercise of these freedoms, since it carries with it duties and responsibilities, may be subject to such formalities, conditions, restrictions or penalties as are prescribed by law and are necessary in a democratic society, in the interests of national security, territorial integrity or public safety, for the prevention of disorder or crime, for the protection of heath and morals, for the protection of the reputation or rights of others, for preventing the disclosure of information received in confidence, or for maintaining the authority and impartiality of the judiciary." (Emphasis added)
"(a) as the result of one or more provisions of primary legislation, the authority could not have acted differently …"
"So far as it is possible to do so, primary legislation … must be read and given effect in a way which is compatible with the Convention rights."
"A declaration under this section ('a declaration of incompatibility') –
(a) does not affect the validity, continuing operation or enforcement of the provision in respect of which it is given; and
(b) is not binding on the parties to the proceedings in which it is made."
Caselaw of the European Court of Human Rights on "in accordance with the law"
(1) The interference must be authorised by domestic law. This is a necessary condition for compatibility with the Convention but it is not a sufficient condition.
(2) The domestic law must have a certain "quality". In particular it must be accessible.
(3) The quality of law also entails that it must be reasonably foreseeable.
"93. As to the third requirement, the law's foreseeability, the Court reiterates that foreseeability in the special context of secret measures of surveillance, such as the interception of communications, cannot mean that an individual should be able to foresee when the authorities are likely to intercept his communications so that he can adapt his conduct accordingly … However, especially where a power vested in the executive is exercised in secret, the risks of arbitrariness are evident … It is therefore essential to have clear, detailed rules on interception of telephone conversations, especially as the technology available for use is continually becoming more sophisticated … The domestic law must be sufficiently clear in its terms to give citizens an adequate indication as to the circumstances in which and the conditions on which public authorities are empowered to resort to any such measures …
94. Moreover, since the implementation in practice of measures of secret surveillance of communications is not open to scrutiny by the individuals concerned or the public at large, it would be contrary to the rule of law for the legal discretion granted to the executive or to a judge to be expressed in terms of an unfettered power. Consequently, the law must indicate the scope of any such discretion conferred on the competent authorities and the manner of its exercise with sufficient clarity to give the individual adequate protection against arbitrary interference …
95. In its case law on secret measures of surveillance, the Court has developed the following minimum safeguards that should be set out in statute law in order to avoid abuses of power: the nature of the offences which may give rise to an interception order; a definition of the categories of people liable to have their telephones tapped; a limit on the duration of the telephone tapping; the procedure to be followed for examining, using and storing the data obtained; the precautions to be taken when communicating the data to other parties; and the circumstances in which recordings may or must be erased or the tapes destroyed …" (Emphasis added)
"The Court reiterates that when balancing the interest of the respondent State in protecting its national security through secret surveillance measures against the seriousness of the interference with an applicant's right to respect for his or her private life, it has consistently recognised that the national authorities enjoy a fairly wide margin of appreciation in choosing the means for achieving the legitimate aim of protecting national security … Nevertheless, in view of the risk that a system of secret surveillance for the protection of national security may undermine or even destroy democracy under the cloak of defending it, the Court must be satisfied that there exist adequate and effective guarantees against abuse … This assessment depends on all the circumstances of the case, such as the nature, scope and duration of the possible measures, the grounds required for ordering them, the authorities competent to authorise, carry out and supervise them, and the kind of remedy provided by the national law …" (emphasis added)
"233. Review and supervision of secret surveillance measures may come into play at three stages: when the surveillance is first ordered, while it is being carried out, or after it has been terminated. As regards the first two stages, the very nature and logic of secret surveillance dictate that not only the surveillance itself but also the accompanying review should be effected without the individual's knowledge. Consequently, since the individual will necessarily be prevented from seeking an effective remedy of his or her own accord or from taking a direct part in any review proceedings, it is essential that the procedures established should themselves provide adequate and equivalent guarantees safeguarding his or her rights. In addition, the values of a democratic society must be followed as faithfully as possible in supervisory procedures if the bounds of necessity, within the meaning of Article 8(2), are not to be exceeded. In a field where abuse is potentially so easy in individual cases and could have such harmful consequences for democratic society as a whole, it is in principle desirable to entrust supervisory control to a judge, judicial control offering the best guarantees of independence, impartiality and a proper procedure.
234. As regards the third stage, after the surveillance has been terminated, the question of subsequent notification of surveillance measures is inextricably linked to the effectiveness of remedies before the courts and hence to the existence of effective safeguards against the abuse of monitoring powers. There is in principle little scope for recourse to the courts by the individual concerned unless the latter is advised of the measures taken without his or her knowledge and thus able to challenge their legality retrospectively or, in the alternative, unless any person who suspects that his or her communications are being or have been intercepted can apply to courts, so that the courts' jurisdiction does not depend on notification to the interception subject that there has been an interception of his communications."
Guidance from the Supreme Court on "in accordance with the law"
"… An excessively broad discretion in the application of a measure infringing the right of privacy is likely to amount to an exercise of power unconstrained by law. It cannot therefore be in accordance with law unless there are sufficient safeguards, exercised on known legal principles, against the arbitrary exercise of that discretion, so as to make its application reasonably foreseeable."
"… A measure is not 'in accordance with the law' if it purports to authorise an exercise of power unconstrained by law. The measure must not therefore confer a discretion so broad that its scope is in practice dependent on the will of those who apply it, rather than on the law itself. Nor should it be couched in terms so vague or so general as to produce substantially the same effect in practice. The breadth of a measure and the absence of safeguards for the rights of individuals are relevant to its quality as law where the measure confers discretion, in terms or in practice, which make its effects insufficiently foreseeable. Thus a power whose exercise is dependent on the judgment of an official as to when, in what circumstances or against whom to apply it, must be sufficiently constrained by some legal rule governing the principles on which that decision is to be made. But a legal rule imposing a duty to take some action in every case to which the rule applies does not necessarily give rise to the same problem. It may give rise to a different problem when it comes to necessity and proportionality, but that is another issue. If the question is how much discretion is too much, the only legal tool available for resolving it is a proportionality test which, unlike the test of legality, is a question of degree."
The importance of the nature of the alleged incompatibility
Use of Hansard in cases concerning the compatibility of primary legislation under the HRA
"… The courts and Parliament are both astute to recognise their constitutional roles … These distinct roles reflect one aspect of the separation of powers under this country's constitution."
A particular manifestation of that wider constitutional principle is Article 9 of the Bill of Rights 1689, which provides, in modern spelling, that:
"The freedom of speech and debates or proceedings in Parliament ought not to be impeached or questioned in any court or place out of Parliament."
"… This new role is fundamentally different from interpreting and applying legislation. The courts are now required to evaluate the effect of primary legislation in terms of Convention rights and, where appropriate, make a formal declaration of incompatibility. In carrying out this evaluation the court has to compare the effect of the legislation with the Convention right. If the legislation impinges upon a Convention right the court must then compare the policy objective of the legislation with the policy objective which under the Convention may justify a prima facie infringement of the Convention right. When making these two comparisons the court will look primarily at the legislation, but not exclusively so. Convention rights are concerned with practicalities. When identifying the practical effect of an impugned statutory provision the court may need to look outside the statute in order to see the complete picture … As to the objective of the statute, at one level this will be coincident with its effect. … But that is not the relevant level for Convention purposes. What is relevant is the underlying social purpose sought to be achieved by the statutory provision. Frequently that purpose will be self-evident, but this will not always be so."
"The court must decide whether the means employed by the statute to achieve the policy objective is appropriate and not disproportionate in its adverse effect. This involves a 'value judgment' by the court, made by reference to the circumstances prevailing when the issue has to be decided. …"
"will often speak for themselves. But sometimes the court may need additional background information tending to show, for instance, the likely practical impact of the statutory measure and why the course adopted by the legislature is or is not appropriate. Moreover, as when interpreting a statute, so when identifying the policy objective of a statutory provision or assessing the 'proportionality' of a statutory provision, the court may need enlightenment on the nature and extent of the social problem (the 'mischief') at which the legislation is aimed. This may throw light on the rationale underlying the legislation."
"The court would merely be placing itself in a better position to understand the legislation."
"it is difficult to see how there could be any objection to the court taking account of something said in Parliament when there is no suggestion the statement was inspired by improper motives or was untrue or misleading and there is no question of legal liability."
"the content of parliamentary debates has no direct relevance to the issues the court is called upon to decide in compatibility cases and, hence, these debates are not a proper matter for investigation or consideration by the courts."
He continued:
"In particular, it is a cardinal constitutional principle that the will of Parliament is expressed in the language used by it in its enactments. The proportionality of legislation is to be judged on that basis. The courts are to have due regard to the legislation as an expression of the will of Parliament. The proportionality of a statutory measure is not to be judged by the quality of the reasons advanced in support of it in the course of parliamentary debate, or by the subjective state of mind of individual ministers or other members. … Lack of cogent justification in the course of parliamentary debate is not a matter which 'counts against' the legislation on issues of proportionality. The court is called upon to evaluate the proportionality of the legislation, not the adequacy of the minister's exploration of the policy options or of his explanations to Parliament. The latter would contravene article 9 of the Bill of Rights. The court would then be presuming to evaluate the sufficiency of the legislative process leading up to the enactment of the statute. …"
The jurisdiction of the Investigatory Powers Tribunal
"the extensive jurisdiction of the IPT to examine any complaint of unlawful interception. Unlike in many other domestic systems, any person who suspects that his communications have been or are being intercepted may apply to the IPT. The jurisdiction of the IPT does not, therefore, depend on notification to the interception subject that there has been an interception of his communications. …"
"In particular, a complainant did not have to overcome any evidential burden to apply to the IPT and any legal issues could be determined in a public judgment after an inter partes hearing. Further, the IPT had full powers to obtain any material it considered necessary from relevant bodies and could call upon the assistance of the Commissioner [the predecessor to the IPC]. It could appoint an advocate to assist it at closed hearings. Finally, in the event that the complainant was successful, a reasoned decision would be provided. …"
"We are satisfied that the appropriate test for us to operate, which would accord with Zakharov and our obligations under RIPA, is whether in respect of the asserted belief that any conduct falling within subsection s.68(5) of RIPA has been carried out by or on behalf of any of the Intelligence Services, there is any basis for such belief; such that the 'individual may claim to be a victim of a violation occasioned by the mere existence of secret measures or legislation permitting secret measures only if he is able to show that due to his personal situation, he is potentially at risk of being subjected to such measures.' (Zakharov at 171). This continues to be the low hurdle for a claimant that this Tribunal has traditionally operated." (Emphasis added)
"By contrast, if the national system provides for effective remedies, a widespread suspicion of abuse is more difficult to justify. In such cases, the individual may claim to be a victim of a violation occasioned by the mere existence of secret measures or of legislation permitting secret measures only if he is able to show that, due to his personal situation, he is potentially at risk of being subjected to such measures."
The decision of the First Section in Big Brother Watch
"… The law must indicate the scope of any discretion conferred on the competent authorities and the manner of its exercise with sufficient clarity to give the individual adequate protection against arbitrary interference …"
"… while the Court does not doubt the impact of modern technology on the intrusiveness of interception, and has indeed emphasised this point in its caselaw, it would be wrong automatically to assume that bulk interception constitutes a greater intrusion into the private life of an individual than targeted interception, which by its very nature is more likely to result in the acquisition and examination of a large volume of his or her communications. In any event, although the Court would agree that the additional requirements proposed by the applicants might constitute important safeguards in some case, for the reasons set out below it does not consider it appropriate to add them to the list of minimum requirements in the case at hand."
"… Requiring objective evidence of reasonable suspicion in relation to the persons for whom data is being sought and the subsequent notification of the surveillance subject would be inconsistent with the Court's acknowledgement that the operation of a bulk interception regime in principle falls within a State's margin of appreciation. Bulk interception is by definition untargeted, and to require 'reasonable suspicion' would render the operation of such a scheme impossible. Similarly, the requirement of 'subsequent notification' assumes the existence of clearly defined surveillance targets, which is simply not the case in a bulk interception regime."
"Rather, regard must be had to the actual operation of the system of interception, including the checks and balances on the exercise of power, and the existence or absence of any evidence of actual abuse …"
The Court therefore proceeded to examine the justification for any interference before it by reference to the six minimum requirements and it also had regard to the additional relevant factors which it had identified in Zakharov but did not classify as minimum requirements (see our consideration of Zakharov above).
(1) The interception of a small percentage of internet "bearers", selected as being those most likely to carry external communications of intelligence value. Bearers are in effect communications links in an electronic "pipeline" which enable traffic to flow through the internet.
(2) The filtering and automatic discarding (in near real-time) of a significant percentage of intercepted communications, being the traffic least likely to be of intelligence value.
(3) The application of simple and complex search criteria (by computer) to the remaining communications, with those that match the relevant "selectors" being retained and those that do not being discarded.
(4) The examination of some (if not all) of the retained material by an analyst.
"… While anyone could potentially have their communications intercepted under the section 8(4) regime, it is clear that the intelligence services are neither intercepting everyone's communications, nor exercising an unfettered discretion to intercept whatever communications they wish. … "
"it does not consider this fact alone to be fatal to the Article 8 compliance of the section 8(4) regime. While the discretion to intercept should not be unfettered … more rigorous safeguards will be required at the third and fourth stages identified in paragraph 329 above, as any interference in such cases will be significantly greater."
"… Nevertheless, the search criteria and selectors used to filter intercepted communications should be subject to independent oversight; a safeguard which appears to be absent in the section 8(4) regime. …"
"… On the other hand, the exclusion of communications of individuals known currently to be in the British Islands is, in the opinion of the Court, an important safeguard, since persons of interest to the intelligence services who are known to be in the British Islands could be subject to a targeted warrant under section 8(1) of RIPA. The intelligence services should not be permitted to obtain via a bulk warrant what they could obtain via a targeted warrant."
"On balance, the Court agrees that it would be preferable for the selection of material by analysts to be subject at the very least to pre-authorisation by a senior operational manager. However, given that analysts are carefully trained and vetted, records are kept and those records are subject to independent oversight and audit …, the absence of pre-authorisation would not, in and of itself, amount to a failure to provide adequate safeguards against abuse."
"… In a bulk interception regime, where the discretion to intercept is not significantly curtailed by the terms of the warrant, the safeguards applicable to the filtering and selecting for examination stage must necessarily be more robust."
"Therefore, while there is no evidence to suggest that the intelligence services are abusing their powers … the Court is not persuaded that the safeguards governing the selection of bearers for interception and selection of intercepted material for examination are sufficiently robust to provide adequate guarantees against abuse. Of greatest concern, however, is the absence of robust independent oversight of the selectors and search criteria used to filter intercepted communications."
"The first violation identified by the Court, summarised at paragraph 347 of the judgment, relates to concerns that there should be more robust independent oversight of the selectors (search terms) that are used by analysts to examine material that has been collected under a bulk interception warrant. This finding, of course, relates to the previous regime and the IP Act has now introduced significantly heightened safeguards relating to the selection for examination of data collected under any bulk warrant. These additional safeguards include the introduction of operational purposes, which limit the purposes for which bulk data may be examined. Those purposes must be set out on every bulk warrant so that it is foreseeable to the Secretary of State, and Judicial Commissioner, how the data collected under the warrant may be used. In addition, the Act introduces new criminal offences for the breach of examination safeguards, which will act as a strong deterrent to prevent abuse of bulk powers. In relation to the oversight of selectors specifically, this now sits within scope of your main oversight functions in the IP Act: as part of the requirement that you keep under review the exercise by public authorities of statutory functions relating to the interception of communications. Furthermore, the investigation and information powers that you have been granted under the IP Act enable you to require the provision of any information from public authorities that you may require in exercising your functions, including in relation to selectors.
These factors, taken together, respond substantively to this violation. Nevertheless, in order to assist your oversight in this area our officials and those from the intelligence services, GCHQ in particular, have committed to work with your office to establish how the oversight of selectors could be enhanced and how this would be best taken forward in practice."
The challenge to the regime for bulk interception warrants
The challenge in respect of bulk and thematic equipment interference warrants
(1) The 2016 Act contains insufficient safeguards against the risk of abuse of discretionary power and therefore does not comply with the Convention concept of "in accordance with the law".
(2) Further and in any event, the scope of application of the bulk equipment interference power is too wide to be compatible with Articles 8 and 10. It is not necessary in a democratic society because it does not comply with the principle of proportionality.
"the Part 6 Chapter 3 power does not have a sufficiently clear scope of application: it fails sufficiently to limit those who are affected or the basis for the interference. That being so, the power cannot be strictly necessary in a democratic society, even if (contrary to the fact) adequate safeguards were attached to it."
However, at the hearing before this Court, Mr Chamberlain disavowed any such submission. He submitted, as we understood it, that it is because the Act does not contain adequate safeguards that it also fails the test of proportionality.
(1) The fact that the operational case for equipment interference ("EI") lies in the context of diminishing returns from interception owing to developments including end-to-end encryption (100% of emails from major email providers and 50% of internet traffic being encrypted by the time of the Bulk Powers Review) and the increasing anonymisation of network devices, making it harder to distinguish between target and non-target devices with at least some initial analysis of the data held on them.
(2) The fact that bulk EI operations will be designed to bring back the minimum amount of information required to rule out devices not of intelligence interest, which would often imply a "light touch" operation targeted in the first instance on equipment data. It is observed that this is required under section 2 of the 2016 Act, which sets out the general duties in relation to privacy.
(3) The fact that a targeted equipment interference warrant may not be feasible because of the trend towards anonymisation of devices.
(4) The non-viability of covert human intelligence sources ("CHIS") as an alternative in certain scenarios.
(5) Lord Anderson's conclusion, at para. 36, that "an operational case for bulk EI has been made out in principle, and there are likely to be real-world instances in which no effective alternative is available".
"The fact that an intrusive power can be successfully used to avert threats and reduce crime does not of course mean that it should automatically be passed into law: that way lies a police state."
"Our cases have recognised that the Fourth Amendment was the founding generation's response to the reviled 'general warrants' and 'writs of assistance' of the colonial era, which allowed British officers to rummage through homes in an unrestrained search for criminal activity. Opposition to such searches was in fact one of the driving forces behind the Revolution itself."
"Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple – get a warrant." (p.28).
In other words Riley was a case about searches without any warrant at all. In the present context Parliament has created a scheme for the grant of warrants in prescribed circumstances which are carefully regulated by the 2016 Act and the codes of practice made under it as well as the supervision of the office of the IPC.
"Cell phones differ in both a quantitative and a qualitative sense from other objects that might be kept on an arrestee's person. The term 'cell phone' is itself misleading shorthand; many of these devices are in fact mini computers that also happen to have the capacity to be used as a telephone. They could just as easily be called cameras, video players, rolodexes, calendars, tape recorders, libraries, diaries, albums, televisions, maps, or newspapers."
He continued, at p.18:
"The storage capacity of cell phones has several interrelated consequences for privacy. First, a cell phone collects in one place many distinct types of information – an address, a note, a prescription, a bank statement, a video – that reveal much more in combination than any isolated record. Second, a cell phone's capacity allows just even one type of information to convey far more than previously possible. The sum of an individual's private life can be reconstructed through a thousand photographs labelled with dates, locations, and descriptions; the same cannot be said of a photograph or two of loved ones tucked into a wallet. Third, the data on a phone can date back to the purchase of the phone, or even earlier."
"An Internet search and browsing history, for example, can be found on an Internet-enabled phone and could reveal an individual's private interests or concerns – perhaps a search for certain symptoms of disease … Data on a cell phone can also reveal where a person has been. Historic location information is a standard feature on many smart phones and can reconstruct someone's specific movements down to the minute, not only around town but also within a particular building."
Non-protected material
Thematic equipment interference warrants under Part 5
"The Act requires that certain additional details must be included in the warrant dependent on the subject-matter(s) of the warrant. For example, a thematic warrant that relates to equipment used by a group which shares a common purpose must include a description of that purpose as well as the name or description of as many of the persons who form that group as it is reasonably practicable to name or describe. An equipment interference authority must, when section 115 requires, name or describe as many of the persons, organisations or locations as is reasonably practicable. The description of persons, organisations or locations must be as granular as reasonably practicable in order to sufficiently enable proper assessment of the proportionality and intrusion involved in the interference."
The challenge in respect of bulk personal datasets
The challenge in respect of bulk acquisition warrants
a) requiring a telecommunications operator specified in the warrant (i) to disclose to a person specified in the warrant any CD which is specified in the warrant and is in the possession of the operator, (ii) to obtain any CD specified in the warrant which is not in the operator's possession but which the operator is capable of obtaining, or (iii) to disclose to a person specified in the warrant any data so obtained;
b) the selection for examination, in any manner described in the warrant, of CD obtained under the warrant;
c) the disclosure, in any manner described in the warrant, of CD obtained under the warrant to the person to whom the warrant is addressed or to any person acting on that person's behalf.
a) held, or capable of being held or obtained by, a telecommunications operator and relates to the provision of a telecommunications service to an entity, or is comprised in or associated with a communication for the purposes of the system by which that communication is sent, or otherwise relates to the use of a telecommunications service or system; or
b) comprised in or associated with a communication for the purposes of the telecommunications system by which it is sent and is available directly from that system; or
c) is about the architecture of the telecommunication system, but is not about a specific person.
The challenge to Parts 3 and 4 of the 2016 Act
Lawyer-client communications
The challenge in respect of confidential journalistic material
(1) The decision to intercept and use intercepted material should be made by a judge or another independent and impartial decision-making body. The body must be separate from the executive and other interested parties. He relies in particular on the decisions of the European Court of Human Rights in Sanoma Uitgevers BV v Netherlands [2011] EMLR 4; Telegraaf Media Nederland Landelijke Media BV v Netherlands (Application No 39315/06, judgment of Third Section, 22 November 2012); and Nagla v Latvia (Application No 72469/10, judgment of Fourth Section, 16 July 2013). He also relies on the decision of the Court of Appeal in R (Miranda) v Secretary of State for the Home Department [2016] EWCA Civ 6; [2016] 1 WLR 1505.
(2) This independent decision must take place before interception occurs or (if it occurs urgently) before any use is made of the intercepted material; and the reviewing body must have the power to prevent interception or use of it. This is because the exercise of any independent review which only takes place subsequently to the handing over of material capable of revealing the journalist's confidential source would undermine the very essence of the right to confidentiality.
(3) There must be an overriding public interest to justify such interception and use of the intercepted materials. The independent body must therefore be invested with the power to determine whether a requirement in the public interest overriding the principle of protection of journalistic sources exists prior to the handing over of such material and to prevent unnecessary access to information capable of disclosing the source's identity if it does not; and it must be in a position to carry out this weighing of the potential risks and respective interests prior to any disclosure and with reference to the material which it is sought to have disclosed so that the arguments of the authorities seeking disclosure can be properly assessed.
(4) The decision to be taken should be governed by clear criteria, including whether a less intrusive measure would suffice to serve the overriding public interest established. The independent body must have power to refuse to make a disclosure order or to make a limited or qualified order so as to protect sources from being revealed, whether or not they are specifically named in the withheld material.
(1) The state has an intention of selecting, examining, or searching material to identify a journalistic source or to obtain journalistic materials.
(2) State searches are likely to, or even simply "could", reveal the identity of a source or journalistic material.
(3) It is realised that material being examined is journalistic material.
"It is clear enough that the Strasbourg jurisprudence requires prior, or (in an urgent case) immediate post factum, judicial oversight of interferences with Article 10 rights where journalists are required to reveal their sources. In such cases, lack of such oversight means that there are no safeguards sufficient to make the interference with the right 'prescribed by law'. This is not surprising in view of the importance to press freedom of the protection of journalistic sources …"
"… the central concern is that disclosure of journalistic material (whether or not it involves the identification of a journalist's source) undermines the confidentiality that is inherent in such material and which is necessary to avoid the chilling effect of disclosure and to protect Article 10 rights. If journalists and their sources can have no expectation of confidentiality, they may decide against providing information on sensitive matters of public interest. That is why the confidentiality of such information is so important. It is, therefore, of little or no relevance that the Schedule 7 powers may only be exercised in a confined geographical area or that a person may not be detained for longer than nine hours. I accept that the fact that the powers must be exercised rationally, proportionately and in good faith provides a degree of protection. But the only safeguard against the powers not being so exercised is the possibility of judicial review proceedings. In my view, the possibility of such proceedings provides little protection against the damage that is done if journalistic material is disclosed and used in circumstances where this should not happen. An important rationale for the principle of legal certainty that underpins the concept of 'prescribed by law' is that there should be adequate safeguards against arbitrary decision-making. Unlike the position in relation to Article 5 and 9, the possibility of judicial review proceedings to challenge the rationality, proportionality and good faith of a decision to interfere with freedom of expression in cases involving journalistic material cases does not afford an adequate safeguard." (Emphasis in original)
"Laws LJ may be right in saying that the European Court of Human Rights has not developed an 'absolute' rule of judicial scrutiny for cases involving state interference with journalistic freedom. But prior judicial or other independent and impartial oversight (or immediate post factum oversight in urgent cases) is the natural and obvious adequate safeguard against the unlawful exercise of the Schedule 7 powers in cases involving journalistic freedom. …"
"96. In Weber and Saravia, the interference with the applicants' rights under Articles 8 and 10 consisted of the interception of telecommunications in order to identify and avert dangers in advance, or 'strategic monitoring' as it is also called. The first applicant in that case being a journalist, the Court found that her right to protect her journalistic sources was in issue … However, the aim of strategic monitoring was not to identify journalists' sources. Generally the authorities would know only when examining the intercepted telecommunications if at all, that a journalist's conversation had been monitored. Surveillance measures were, in particular, not directed at uncovering journalistic sources. The interference with freedom of expression by means of strategic monitoring could not, therefore, be characterised as particularly serious … Although admittedly there was no special provision for the protection of freedom of the press and, in particular, the non-disclosure of sources once the authorities had become aware that they had intercepted a journalist's conversation, the safeguards in place, which had been found to satisfy the requirements of Article 8, were considered adequate and effective for keeping the disclosure of journalistic sources to an unavoidable minimum …
97. The present case is characterised precisely by the targeted surveillance of journalists in order to determine from whence they have obtained their information. It is therefore not possible to apply the same reasoning as in Weber and Saravia."
"The Court has recognised that there is 'a fundamental difference' between the authorities ordering a journalist to reveal the identity of his or her sources, and the authorities carrying out searches at a journalist's home and workplace with a view to uncovering his or her sources … The Court considers that the latter, even if unproductive, constituted a more drastic measure than an order to divulge the source's identity, since investigators who raid a journalist's workplace have access to all documentation held by the journalist … However, the Court has also drawn a distinction between searches carried out on journalists' homes and workplaces 'with a view to uncovering their sources', and searches carried out for other reasons, such as the obtaining of evidence of an offence committed by a person other than in his or her capacity as a journalist … Similarly, in Weber and Saravia, the only case in which the Court has considered, in abstracto, the Article 10 compliance of a secret surveillance regime on account of the potential for interference with confidential journalistic material, it considered it decisive that the surveillance measures were not aimed monitoring journalists or uncovering journalistic sources. As such it found that the interference with freedom of expression could not be characterised as particularly serious …"
"… Generally the authorities would only know when examining the intercepted communications if a journalist's communications had been intercepted. Consequently, it confirms that the interception of such communications could not by itself, be characterised as a particularly serious interference with freedom of expression … However, the interference will be greater should these communications be selected for examination and, in the Court's view, will only be 'justified by an overriding requirement in the public interest' if accompanied by sufficient safeguards relating both to the circumstances in which they may be selected intentionally for examination, and to the protection of confidentiality where they have been selected, either intentionally or otherwise, for examination."
"of particular concern that there are no requirements – at least, no 'above the waterline' requirements – either circumscribing the intelligence services' power to search for confidential or other material (for example by using a journalist's email address as a selector), or requiring analysts, in selecting material for examination, to give any particular consideration to whether such material is or maybe involved. Consequently, it would appear that analysts could search and examine without restriction both the content and the related communications data of these intercepted communications."
"Nevertheless, in view of the potential chilling effect that any perceived interference with the confidentiality of their communications and, in particular, their sources might have on the freedom of the press and, in the absence of any 'above the waterline' arrangements limiting the intelligence services' ability to search and examine such material other than where 'it is justified by an overriding requirement in the public interest', the Court finds that there has also been a violation of Article 10 of the Convention."
"… These provisions only apply where the purpose of the application is to determine a source; they do not, therefore, apply in every case where there is a request for the communications data of a journalist, or where such collateral intrusion is likely. Furthermore, in cases concerning access to a journalist's communications data there are no special provisions restricting access to the purpose of combatting 'serious crime'. Consequently, the Court considers that the regime cannot be 'in accordance with the law' for the purpose of the Article 10 complaint."
"… It is of course open to member states to provide for rights more generous than those guaranteed by the Convention, but such provision should not be the product of interpretation of the Convention by national courts, since the meaning of the Convention should be uniform throughout the states party to it. The duty of national courts is to keep pace with the Strasbourg jurisprudence as it evolves over time: no more, but certainly no less."
"I would respectfully suggest that last sentence could as well have ended: 'no less, but certainly no more.' There seems to me, indeed, a greater danger in the national court construing the Convention too generously in favour of an applicant than in construing it too narrowly. In the former event the mistake will necessarily stand: the member state cannot itself go to Strasbourg to have it corrected; in the latter event, however, where Convention rights have been denied by too narrow a construction, the aggrieved individual can have the decision corrected in Strasbourg". (Emphasis in original)
"In earlier case-law the Court has considered the extent to which the acts of compulsion resulted in the actual disclosure or prosecution of journalistic sources irrelevant for the purposes of determining whether there has been an interference with the right of journalists to protect them. In the case of Roemen and Schmit, the information sought was not obtained as a result of the execution of the order for search and seizure in the journalist's workplace. This order was considered 'a more drastic measure than an order to divulge the source's identity ... because investigators who raid a journalist's workplace unannounced and armed with search warrants have very wide investigative powers, as, by definition, they have access to all the documentation held by the journalist. It thus considers that the searches of the first applicant's home and workplace undermined the protection of sources to an even greater extent than the measures in issue in Goodwin' (loc. cit., § 57)."
"the Court is of the view that although the question has been the subject of much debate between the parties, it is not necessary to determine whether there actually existed an agreement binding the applicant company to confidentiality. The Court agrees with the applicant company that there is no need to require evidence of the existence of a confidentiality agreement beyond their claim that such an agreement existed." (Emphasis added)
MI5's handling arrangements
(1) The caselaw on the ECHR makes it clear that not only must there be sufficient safeguards in place against the risk of abuse of discretionary powers in the sensitive area of secret surveillance, those safeguards must be effective in practice rather than merely theoretical.
(2) The recent disclosure shows that there have for several years been serious failures on the part of MI5 in relation to its handling arrangements, particularly in respect of the retention of data collected pursuant to warrants. These failures have caused such concern to the IPC that he has described MI5 as being in effect in "special measures."
(3) In consequence, the Court cannot be satisfied that the arrangements for safeguarding material obtained under the 2016 Act are effective in practice and therefore the Court should make a declaration of incompatibility in respect of that Act, in particular the safeguards relating to retention, examination, use, destruction and oversight.
(1) the number of persons, extent of any disclosure, extent of any copying and number of copies made are kept to the minimum necessary;
(2) the material must be stored in a secure manner; and
(3) each copy made of any material or data must be destroyed as soon as its retention is no longer necessary.
The effect is said to be that, subject to the power to retain data under Part 7, it is usually only retained for a short period and then permanently deleted.
(1) A letter from MI5's Director of Policy, Compliance, Security and Information to the IPC dated 11 March 2019, which summarised a briefing which had been given by MI5 to the IPC on 27 February 2019. That was the first time, it appears, that the IPC was made aware of the problems which have been identified on the part of MI5.
(2) The IPC's first inspection report issued on 29 March 2019.
(3) A new Annex H – Section II to the MI5 Handbook for Judicial Commissioners issued on 1 April 2019.
(4) The Generic Decision on warrants by the IPC dated 5 April 2019.
(5) A letter from Sir Andrew Parker, Director General of MI5, to the Home Secretary dated 24 April 2019 and a letter from Sir Andrew Parker to the IPC dated 26 April 2019.
(6) The IPC's second inspection report of MI5 dated 26 April 2019.
"46. … I do not intend in this Decision to set out the precise nature of the inspection regime and the various forms of monitoring that will need to take place, but I want there to be no doubt as to the gravity of the situation and the need for IPCO to be reassured that breaches of the legislation are not ongoing. This will involve frequent inspections by IPCO, beginning on 15 April 2019, and I expect the inspectors to be afforded direct access to members of staff. It will be unacceptable for the inspectors to be asked to rely on hearsay accounts of internal conversations between members of MI5. I am confident that a method of undertaking this form of inspection can be secured without causing undue anxiety for members of MI5. …
49. This is a serious and inherently fragile situation. The future will entirely depend on compliance by MI5 with the legislation and the adequacy of the internal and external inspection regimes. IPCO will need to be reassured on a continuing basis that new warranted material is being handled lawfully. In the absence of this reassurance, it is likely that future warrant applications for data held in [TE] will not be approved by the Judicial Commissioners, and I will expect that the proposed mitigations are progressed at pace. The weaknesses outlined above are of sufficient magnitude to mean that the immediate mitigatory steps, which will be sufficient for the short term, cannot be expected to provide a long term solution, and the proposals made by MI5 in part II must be implemented in their entirety in the shortest reasonable timeframe. Without seeking to be emotive, I consider that MI5's use of warranted data in [TE] is currently, in effect, in 'special measures' and the historical lack of compliance with the law is of such gravity that IPCO will need to be satisfied to a greater degree than usual that it is 'fit for purpose'. It is of importance to add by way of postscript that now this problem has been ventilated, MI5 appear to be using every endeavour to correct the failings of the past and to secure compliance. The organisation has cooperated in every way with the inspection we recently conducted and the questions that I posed."
"44. Albeit not strictly relevant to the present application, it is clear that for warranted material in [TE] there has been an unquantifiable but serious failure to handle warranted data in compliance with the IPA for a considerable period of time, and probably since IPCO first became operational. Assurances that have been made to the Secretary of State and the Judicial Commissioners of such compliance were, in hindsight, wrong and should never have been made. Warrants have been granted and judicially approved on an incomplete understanding of the true factual position. Indeed, I am concerned that on this important subject we were incompletely briefed during the Commissioners' induction programme, including that most recently provided to Lord Hughes and Sir Colman Treacy. To date, therefore, MI5's retention of the warranted material in [TE] cannot be shown to have been held lawfully and the failure to report these matters timeously to IPCO is a matter of grave concern which I will be addressing separately. The critical question, however, on this application is whether the data to be covered by the present warrant will be appropriately safeguarded.
45. On the basis of the mitigations set out in Section II, combined with the answers to the questions that I have received, subject to certain critical caveats, I am satisfied that MI5 have the capability henceforth to handle warranted data in a way which is compliant with the IPA. … The key caveat is that all the relevant activities must be susceptible to inspection and audit – in other words, MI5 and IPCO must be able to check in sufficient detail that there has been compliance with the legislation."
"In addition, [REDACTED], it is unlikely MI5 could give complete assurance it had complied with any conditions imposed by a JC as to the use or retention of legally privileged items."
"From the limited information so far provided it seems highly likely that this is the case, but I would welcome the earliest information on this point from MI5's perspective. If that assumption is correct, this raises the question as to whether MI5 has the capability to handle warranted data in an IPA-compliant fashion."
"'Annex H' set out that, by 12 April, all business areas would have new processes in place, enabling them to 'account for the handling and management of warranted data'. These processes had not all been implemented fully at the time of the inspection. In order to ensure MI5 complies with the IPA's safeguards, their implementation must be completed urgently."
The IPC noted that, despite some progress:
"Much remains to be done and further, detailed inspections are necessary before I can be assured sufficiently about the lawfulness of MI5's use of [TE] on an ongoing basis."
"… I am satisfied that MI5's Handling Arrangements, taken together with the range of internal handling arrangements and policies referred to therein and the information provided in each warrant application, comply with the requirements of the Act. …"
"When a relevant error has occurred, the public authority that made the error must notify the [IPC] as soon as reasonably practicable, and no later than 10 working days after it has been established by appropriate internal governance processes that a relevant error has occurred. Such internal governance processes are subject to review by the [IPC]. Where the full facts of the error cannot be ascertained within that time, an initial notification must be sent with an estimated timescale for the error being reported in full and an explanation of the steps being undertaken to establish the full facts of the error."
Conclusion