Anti-Terrorism Laws and Data
Retention: War is over?
by
Clive Walker*
and Yaman Akdeniz**
Copyright 2003 Walker and Akdeniz
Citation: (2003) Northern Ireland Legal
Quarterly, 54(2), Summer edition, pp 159-
182.
Contact: lawya@cyber-rights.org for further information
about this article.
NO permission is given for the reproduction or publication
of this article in any form or by any means, or storage in
any retrieval system of any nature without prior written
permission, except for permitted fair dealing under the
Copyright, Designs and Patents Act 1988.
This version is available through http://www.cyber-rights.org
*
Professor of Criminal Justice Studies, Department of Law, University of Leeds. An earlier version of this
paper was presented by to the South East Conference of the American Association of Law Schools,
Kiawah Island, South Carolina, July 2002 by invitation of Professor Russ Weaver, University of
Louisville.
**
Lecturer in Cyberlaw, Department of Law, University of Leeds.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
2
NILQ page 159
Abstract:
The Anti-Terrorism, Crime and Security Act 2001 signals a determined response to the attacks
of September 11th
. One aspect involves the facilitation of the use of electronic surveillance in
order to prevent, detect or prosecute the perpetrators of terrorism. The role of Part XI of the
2001 Act is to augment existing surveillance powers in the Regulation of Investigatory Powers
Act 2000. This papers plots the relationships between those two statutes and also their
relationship to data protection laws. Delays and difficulties in enforcement are noted and are
related to a process of return to greater normality after an initial period of panic.
Cyberspace under investigation
Several deeply-seated factors have tended to impel policing agencies in late modern
societies towards a focus on communications data. One concerns the reliance of society on
such technology and therefore its augmented vulnerability to attack. This feature is reflected in
changes to the definition of `terrorism'. Section 1 of the Terrorism Act 2000 explicitly
encompasses:1
`(2) Action ... if it ...
(e) is designed seriously to interfere with or seriously to disrupt an electronic system.'
The enhanced perception of the vulnerabilities of networks to terrorist attack has also resulted
in the appointment within the Cabinet Office of a Central Sponsor for Information Assurance
and Resilience2
and the creation of a National Infrastructure Security Co-ordination Centre
(NISCC), an interdepartmental organisation set up to co-ordinate and develop existing
NILQ page 160
work within Government departments and agencies and bodies in the private sector to defend
the Critical National Infrastructure against electronic attack.3
As well as a defensive stance, communications data also elicit an offensive disposition
in the form of techniques of surveillance. Reasons for this development include that
information technologies have developed enormously and pervade the economies and societies
in western states.4
Their uses are both for good and ill, the latter being the subject of policing.
1
For a discussion of the definition in section 1, see: C. Walker, The Anti-Terrorism Legislation (Oxford:
Oxford University Press, 2002).
2
Defence Committee, Defence and Security in the United Kingdom (2001-02 HC 518) para.125.
3
See further . Note also the activities of the Communications-Electronics
Security Group (CESG) at .
4
See Y. Akdeniz, C. Walker, and D. Wall, The Internet, Law and Society (London: Longman, 2000).
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
3
The technologies provide both a new site for policing5
and quasi-policing6
regulatory activity
and also furnish a variety of opportunities for surveillance which would not previously have
been feasible but which also raise significant privacy concerns.7
They may allow `investigators
for example to establish links between suspected conspirators (itemised bill) or to ascertain the
whereabouts of a given person at a given time, thereby confirming or disproving an alibi (cell
site analysis)'.8
The trend next represents part of a fundamental switch away from the reactive
and overt policing of incidents to the proactive and covert policing and management of risks,9
which may either take the form of people (such as `target criminals')10
or sites of activity such
as the perennial panics about internet chat rooms and their use by paedophiles.11
In line with these impulses towards greater police attention to information and
communications technologies, the National Hi-Tech Crime Unit (NHTCU) was launched
within the National Criminal Intelligence Service in April 2001.12
The NHTCU is tasked with
the key role in the response to cyber-crime, especially as practised by serious and organised
crime. The NHTCU comprises of four main divisions - Investigation, Intelligence, Support and
Forensic Retrieval.
NILQ page 161
Given the process of the `hollowing ouť of the late modern state,13
one cannot expect
that all the data of interest to the forces of law and order will conveniently be held by
compliant public authorities. Rather, a great deal of computer and communication data will be
in the clutches of the private Communications Service Providers (CSPs), who sign up
5
It is estimated that around 500,000 mobile phone records are checked by the police each year: The
Independent 21 December 2002 4; Philips, E., `Mobile phone friend or foe?' (2002) 42 Science &
Justice 225. The All Party Parliamentary Internet Group, Communications Data: Report of an Inquiry by
the All Party Internet Group (January 2003, , paras.9, 10)
suggests requests for communication data are closer to a million per year (mainly relating to subscriber
data) but emphasises that fewer requests by far are made to Internet Service Providers.
6
See especially the activities of the Internet Watch Foundation ().
7
See C. Dandeker, Surveillance, Power and Modernity (Cambridge: Polity Press, 1990); D. Lyon, The
Electronic Eye: The Rise of Surveillance Society (Cambridge: Polity Press, 1994); S. Davies, Big
Brother: Britain's Web of Surveillance and the New Technological Order (London: Pan, 1996); D.
Banisar, Privacy & Human Rights: An International Survey of Privacy Laws and Developments
(Washington DC: EPIC, 2000).
8
Home Office, Regulatory Impact Assessment: Anti-terrorism, Crime and Security Bill (London, 2001).
9
See R.V. Ericson, and K.D. Haggerty, Policing the Risk Society (Oxford: Clarendon Press, 1997).
10
See .
11
The issue was immediately raised, for example, in the case of the disappearance Jessica Chapman and
Holly Wells in Soham: The Times 10 August 2002 7.
12
See NCIS Press release 18/010.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
4
customers in return for communication services such as home phone and mobile phone
connection and related services such as Wireless Application Protocol (WAP) and General
Packet Radio Service (GPRS), e-mail and Internet access and facilities. At the same time as
this proliferation of communications access is viewed as a positive trend from the point of
view of the establishment of the information society,14
the abundance of nodes of entry can
become a negative trend from the law enforcement perspective. Not only may it result in
greater complexities in terms of locating the relevant network and database on which to track
down the desired information, but also it may mean that there is nothing to be discovered at the
end of the day because customer and financial pressures on fiercely competitive CSPs demand
that data be shed as soon as possible. According to the Home Office's Regulatory Impact
Assessment: Retention of Communications Data in 2001:15
`Changes to the business model are leading to a reduction in the amount of data which
is needed for billing purposes (e.g. pre-pay/ subscription/ "always on"). Combined with
pressure from the privacy lobby, this is leading to a decrease in data retention overall.'
Leading policing and security agencies have pondered for some time how to react to
the new challenges of cyberspace. The attacks of September 11th
2001 on the World Trade
Centre, New York and the Pentagon, Washington DC, reinforced by subsequent apprehensions
about assaults by anthrax and other horrifying weapons of mass destruction, constructed a
compelling trigger for action both by policy-makers and legislators. In the months that ensued,
there was a readiness to enact virtually any measure which was conceivably related to `the first
war of the twenty-first century'16
conjured by US President Bush against terrorism and many
which were not even claimed to be vaguely connected. However, it is the contention of this
article that the first phase of official reaction to September 11th
which afforded such indulgence
has passed and that there has been a partial re-establishment of earlier legal stances in relation
to terrorism, which emphasise the rule of law and policing models, rather than derogation and
military models, though without allaying concerns about privacy rights. This trend is
evidenced by the development of the law providing for the retention of communications data
both before and after September 11th
.
13
See B. Jessop, 'Post-Fordism and the State' in A. Amin, (ed.), Post-Fordism: A Reader (London:
Blackwell, 1994) 251.
14
See Y. Akdeniz, C. Walker, and D. Wall,, The Internet, Law and Society (Longman, London, 2000)
chap.1.
15
Loc. cit. para.6.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
5
NILQ page 162
The enactment of Part XI of the Anti-terrorism, Crime and Security Act
2001
Part XI of the Anti-terrorism, Crime and Security Act 2001 seeks to ensure that CSPs
will retain communications data for an investigatory rainy day.17
The data must be held for a
specified period. If access for investigatory purposes is actually required, attention must then
be turned to the Regulation of Investigatory Powers Act 2000 (`RIPA 2000'), since the Antiterrorism,
Crime and Security Act 2001 itself grants no further provisions about access,
disclosure or utilisation.
Despite this limit, Part XI was criticised as excessive during its passage. Whilst
confined to `communications data', the effect can be to provide a complete dossier on private
life - who you contact, what are your interests and habits and where you are and have been like
a CCTV inside your head, as one commentator put it.18
The measure suggests a certain
failure on the part of those authorities tasked to collect focused intelligence so as to combat
terrorism, with the result that the entire population must be treated as potentially suspect. Part
XI may have been easier to stomach if designed around the concept of `terrorist investigations'
under section 32, but the current text is explicitly wider and encourages mass snooping, and
like other parts of the Act,19
it betokens earlier and wider origins than the combating of
terrorism.
Taking up the last point, Part XI was not entirely devised after September 11th
. The idea
may probably be traced to lobbying from the National Criminal Intelligence Service (on behalf
of the police, HM Customs and Excise, the Security Service, Secret Intelligence Service and
GCHQ) as the next step on from the passage of the Regulation of Investigatory Powers Act
16
The Guardian 14 September 2001 5.
17
See generally House of Commons Research Paper on Communications Data: Access and Retention,
02/63, 21 November 2002.
18
C. Bowden, `CCTV for inside your heaď (2002) 8 Computer and Telecommunications Law Review 21.
Even the Home Office admits that `a detailed profile' can be compiled: Home Office, Consultation paper
on a code of practice for voluntary retention of communications data, at
http://www.homeoffice.gov.uk/docs/vol_retention.pdf, 2003, para.5.2.
19
The criticism was directed, for example at Parts III (relating to the disclosure of information held by
government department and agencies) and X (relating to extended powers granted to the Ministry of
Defence Police and British Transport Police). See: C. Walker, The Anti-Terrorism Legislation (Oxford:
Oxford University Press, 2002) chaps.4, 9; Northern Ireland Select Committee, The Financing of
Terrorism in Northern Ireland (2001-02 HC 978) para.119.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
6
200020
and to ensure that it will be effective in implementation. It is alleged that those agencies
called for communications data to be retained by CSPs for a minimum period of 12 months
and then to be archived, either in-house or by a Trusted Third Party agency or contractor, and
retained for a further six-year period.21
According to their Report, the retention of
communications data has great value to law enforcement:
NILQ page 163
`1.2.1 Communications data is crucial to the business of the Agencies. It is pivotal to
reactive investigations into serious crime and the development of proactive intelligence
on matters effecting not only organised criminal activity but also national security. At
the lower level, it provides considerable benefit to the detection of volume crime. ...
Short term retention and then deletion of data will have a disastrous impact on the
Agencies' intelligence and evidence gathering capabilities.
1.2.2 Communications data is becoming increasingly important to provide evidence to
establish innocence. Premature deletion will seriously compromise the interests of
justice. Communications data has a unique value to promoting a safe and free society.
This provides the overriding justification for longer-term retention.'
This progeny is officially denied.22
However, conspiracy theories seem to be abound in this
field, and a further allegation is that the retention of communications data was alleged to be
part of the demands for enhanced security written by the US President to the European
Commission President Romano Prodi on the 16 October 2001, including the call for the
moderation of data protection principles `in the context of law enforcement and counterterrorism
imperatives'.23
In detail, Part XI establishes that, under section 102, the Secretary of State can issue a
voluntary code of practice24
relating to the retention of `communications data' by
`communications providers' (by section 107, meaning a person who provides a postal service
or a telecommunications service). No distinction is made between public and private
20
See Y. Akdeniz, N. Taylor, and C. Walker, `Regulation of Investigatory Powers Act 2000:
Bigbrother.gov.uk' [2001] Criminal Law Review 73.
21
R. Gaspar, NCIS Submission to the Home Office; Looking to the Future: Clarity on Communications
Data Retention Law (see , 2000) para.6.
22
House of Lords Deb. vol.629 col.770 4 December 2001, Lord Rooker.
23
; W. Malcolm, and D. Barker, 'Privacy and
surveillance' (2002) 152 New Law Journal 80, 81.
24
A draft code has been published for consultation in March 2003: Home Office, Consultation paper on a
code of practice for voluntary retention of communications data, at
http://www.homeoffice.gov.uk/docs/vol_retention.pdf, 2003.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
7
communication service providers,25
such as the United Kingdom universities' JANET
network26
or the Parliamentary Data and Video Network,27
though one hopes that purely
domestic networks operated for personal, family or household affairs will be exempt.28
`Communications data' has the same interpretation as in section 21(4) in Chapter 2 of Part 1 of
the Regulation of Investigatory Powers Act 2000, which means it is data relating to the mode
and nature of telephone, Internet and postal communications (traffic, service, and subscriber
data), but it is not meant to include the contents of the
NILQ page 164
communications itself. This distinction is thought to be fallible in the case of Internet data:29
`Knowing the numbers dialled by an individual may yield useful information to the
authorities but does not, by itself, reveal the content of the conversations which took
place. However, if you have access to the clickstream, you can ascertain the content of
everything that the target has read, viewed or downloaded. And because everything is
in digital form, the whole process can be automated. The algorithm goes like this: read
the URL; fetch the page; parse the content; decide whether content matches certain
criteria; store decision; read next URL. A five-year-old could write the code to do it.'
The Telecommunications (Data Protection and Privacy) Regulations 199930
currently
regulate the retention of such data by communication service providers but do so from the
opposite, restrictive approach to Part XI. Such data can only be retained for certain specific
commercial purposes such as to send a bill to a customer and ensure legal enforcement where
necessary (regulation 7), otherwise it must be erased or made anonymous. Whilst the
Regulations (regulations 32 and 33) permit the retention of communications data on national
security and crime prevention grounds, there is currently no general guidance as to where these
25
House of Lords Deb. vol.629 col.756 4 December 2001, Lord Rooker.
26
.
27
.
28
This is the current intention: Home Office, Consultation paper on a code of practice for voluntary
retention of communications data, at http://www.homeoffice.gov.uk/docs/vol_retention.pdf, 2003, Annex
A, para.13.
29
J. Naughton, 'Take a tip m'lord - save cookie talk for teatime' (2000) The Observer 18 June
().
30
S.I. no.2093. These Regulations implement Directive 97/66/EC of the European Parliament and the
Council concerning the processing of personal data and privacy in the telecommunications sector. It is
intended to replace by 31 October 2003 this Directive by Directive 2002/58/EC of the European
Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the
protection of privacy in the electronic communications sector.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
8
might apply or for how long.31
Several Data Protection Principles in the Data Protection Act
1998, including the First (having a legitimate basis for processing), Third (to ensure that data
are relevant and not excessive in relation to the purpose for processing) and Fifth (a data
controller should not hold personal data for longer than necessary for its own purpose for
processing the data) would almost certainly forbid the blanket storage of logs recording such
details as web-sites browsed or e-mail addresses. Other data, such as the length of the link to
the CSP, may be kept so long as relevant to billing or fraud control, as permitted by the
Telecommunications Regulations of 1999. The need for retention of data would be judged
against the continued necessity for the business purposes of the CSP such as for sending out a
bill, dealing with a disputed matter or ensuring the security of its network. Whilst national
security or crime prevention purposes may empower the retention of data beyond these inhouse
purposes under sections 28 and 29 of the Data Protection Act 1998 under exceptional
circumstances, they certainly do not place the CSP under a duty to retain on the chance that
such a purpose will arise.32
In practice,
NILQ page 165
while some CSPs already keep data for a year or more (and have therefore expressed some
acceptance of these measures),33
others delete it just days after the traffic has occurred and so
would incur costs to adopt other practices for law enforcement purposes only.
31
In the case of national security requirements under regulation 32, there is also the difficulty that a
cumbersome Ministerial certificate has to be issued.
32
Applications for access under the Data Protection Act 1998 are also considered unsatisfactory since the
legislation grants a privilege against subject action for disclosure of their data, but it does not impose any
duty to comply with the requests of law enforcement agencies (see All Party Parliamentary Internet
Group, Communications Data: Report of an Inquiry by the All Party Internet Group, January 2003, at
http://www.apig.org.uk/APIGreport.pdf, para.59). There is the further problem that a request granted by
a compliant data user might then become disclosable to the data subject. The Regulation of Investigatory
Powers Act 2000 Chapter 1 Part II would provide for enforceable and secretive requests but is not yet in
force. It should be noted that access under compulsion may in the meantime be obtained under a variety
of legislation, the most notable of which is the Police and Criminal Evidence Act 1984 ss.8, 9, but which
also includes the Charities Commission Charities Act 1993, the Environment Agency Environmental
Protection Act 1990, the Health & Safety Executive Health & Safety at Work etc Act 1974, the Inland
Revenue Taxes Management Act 1970, the Radiocommunications Agency Wireless Telegraphy Act
1974, the Telecommunications Act 1974, the Serious Fraud Office Criminal Justice Act 1987, the Social
Security Investigators Social Security Administration Act 1992, and the Trading Standards Officials
Consumer Protection Act 1987 (see All Party Parliamentary Internet Group, Communications Data:
Report of an Inquiry by the All Party Internet Group, January 2003,
, para.104).
33
Internet Service Providers Association (ISPA) Council Statement,
, 26 October 2001.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
9
In the light of this varied practice, Part XI and the envisaged code of practice34
will
give guidance to CSPs as to the basis for retaining on national security and crime prevention
grounds communications data beyond the period that they require it for their own business
purposes. Once finalised, the code of practice will apply to communications data that the CSPs
have generated or otherwise possess. Further agreements35
with specific CSPs (especially those
with direct access to the Internet structure rather than those renting from the major half dozen
operators) will afford greater detail as to the type of data to be retained and the conditions of
retention and state subventions.36
This partnership approach followed a meeting, on 24 October
2001, involving representatives of the Home Office and the Department of Trade and Industry,
the Internet Services Providers Association (ISPA), the London Internet Exchange (LINX), the
CBI and telecommunications companies. The sector as a whole comprises around 280 public
telecommunications operators, 570 international simple voice resale providers and 300 Internet
Service Providers.37
The core measure of Part XI is in section 102(3), by which the code and any
agreements may contain provisions necessary to safeguard national security or for the purposes
of prevention or detection of crime or the prosecution of offenders which may relate directly or
indirectly to national security,
NILQ page 166
additional to, and without prejudice to, the communication provider's own business purposes.
The width of the purposes should be noted. It was said to be impractical to limit the measure to
terrorism data38
and a House of Lords amendment to this effect was reversed.39
An amendment
in the dying stages of the Parliamentary process, up against the deadline of the Christmas
recess and without time for full debate,40
added the words `which may relate directly or
indirectly to national security' to the purpose of prosecution, but the permissive `may' does not
absolutely delimit the purposes (albeit that the Government opposed the amendment). In
addition, the retention of data will only be accomplished on a blanket basis, so retained data
34
See Home Office, Consultation paper on a code of practice for voluntary retention of communications
data, at http://www.homeoffice.gov.uk/docs/vol_retention.pdf, 2003.
35
Ibid. Appendix B.
36
Ibid. Annex A para.20.
37
Home Office, Regulatory Impact Assessment: Retention of Communications Data (2001) paras.21-23.
38
House of Lords Deb. Vol.629 col.774 4 December 2001, Lord Rooker.
39
Ibid. col.981 6 December 2001, col.1479, 13 December 2001.
40
Ibid. col.1474 13 December 2001.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
10
will be available for access under the Data Protection Act (and other legislation already
described and under the Regulation of Investigatory Powers Act 2000 as described below).
With his customary charm, Home Secretary David Blunkett explained the governmenťs
insouciance as follows:41
`The amendment, in relation to part 11 therefore suggests that we should try to separate
out those parts of data. As I tried to explain on a number of occasions, including last
night, it is not possible to do that, but paradoxically, because it is not possible to do it, it
is not reasonable to suggest that we should not do it. I am therefore prepared to accept
the amendments that have been tabled. In order to be able to implement what they
want, we will have to retain the data, so that it can be accessed to test out whether the
intelligence services are right in believing that it is relevant in tackling terrorists. That
is how stupid the Liberal Democrats are.'
The Government may now seek to justify its stance by comparison with the recent
European Union Directive 2002/58/EC concerning the processing of personal data and the
protection of privacy in the electronic communications sector (Directive on privacy and
electronic communications).42
The relevant provision on data warehousing, article 15, allows
for (but does not require) the retention of data for a limited period to safeguard national
security, defence, public security or the prevention, investigation, detection and prosecution of
criminal offences or of unauthorised use of the
NILQ page 167
electronic communications system, as referred to in article 13(1) of Directive 95/46/EC. The
inclusion of such a provision within the Directive represents a sea-change in data retention
policy. It mainly follows the request of the Council of the European Union on 20 September,
2001 from the European Commission to submit proposals `for ensuring that law enforcement
authorities43
are able to investigate criminal acts involving the use of electronic
communications systems and to take legal measures against their perpetrators.'44
Only two
41
HC Debs. vol.376 col.1111, 13 December 2001.
42
EU Directive 2002/58/EC concerning the processing of personal data and the protection of privacy in the
electronic communications sector (Directive on privacy and electronic communications) of 12 July 2002,
Official Journal of the European Communities 31.7.2002, L 201 pp 37-47.
43
Note also Enfopol 55: Council Resolution on law enforcement operational needs with respect to public
telecommunication networks and services, 9194/1, Brussels 20 June, 2001.
44
Extraordinary Council meeting, Justice, Home Affairs and Civil Protection, Brussels, 20 September
2001, 12019/01 (Presse 327), para 4.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
11
weeks before this request, on 6 September, 2001, the European Parliament recommended in a
resolution that `a general data retention principle must be forbidden,'45
and that `any general
obligation concerning data retention' is contrary to the proportionality principle.46
It is also no
secret that the UK government strongly lobbied for the explicit reference to the scope for data
retention provisions during negotiations in Council.47
Despite strong criticism from civil
liberties organisations,48
the communications industry,49
and Radical Party MEPs,50
and
despite this being a third pillar issue under Title VI of the EU Treaty, a data retention provision
was included within article 15 of the new first pillar EU Directive on privacy and electronic
communications.
In devising the code under Part XI, there are three stages to be followed under section
103. First, there must be consultation with the CSPs and also with the Information
Commissioner (the successor to the Data Protection Commissioner under the Freedom of
Information Act 2000). In practice, the Internet Crime Forum,51
consisting of policing and
industry members, played a significant consultative role. Home Office ministers have met
twice with
NILQ page 168
45
Strategy for Creating a Safer Information Society (A5-0284/2001), text adopted by the European
parliament on 6 September, 2001: Recommendation of the European Parliament on the Strategy for
Creating a Safer Information Society by Improving the Security of Information Infrastructures and
Combating Computer-related Crime (2001/2070(COS)), C 72 E/323-329 Official Journal of the
European Communities, 21.3.2002.
46
Ibid, paragraph J.
47
See for example House of Commons European Scrutiny Committee Thirty-Second Report, HC 152xxxii,
Session 2001-02, July 2002 (19. DTI (23528) Personal data and privacy in telecommunications).
48
Global Internet Liberty Campaign (representing around 60 public interest organisations) letter dated 22
May, 2002 at .
49
EuroISPA, ETNO & ECPA, Joint Industry Memo in view of the 2nd Reading of the Cappato Report:
The Implications of `Data Retention' in Article 15.1 of the Common Position on the Electronic
Communications Data Protection Directive addressed to the Members of the Committee on Citizens'
Freedoms and Rights, Justice and Home Affairs. April 16, 2002, at
.
50
Open letter of Marco Cappato, Radical MEP and EP draftsman on privacy in electronic communications,
to the President of the EU Council and to the President of the EU Telecoms Council: the fight against
terrorism shall not hinder foundamental freedoms and rights such as the right to privacy, 5 December
2001, at . See further Committee on Citizens'
Freedoms and Rights, Justice and Home Affairs (Rapporteur: Marco Cappato), Recommendation For
Second Reading on the Council common position for adopting a European Parliament and Council
directive concerning the processing of personal data and the protection of privacy in the electronic
communications sector (15396/2/2001 C5- 0035/2002 2000/0189(COD)), A5-0130/2002, 22 April
2002.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
12
the Forum representatives, and on three occasions with the Office of the Information
Commissioner to discuss data retention policy between January and March 2002.52
Second, the
code must be published in draft, allowing for public representations; it has at last appeared in
this form in March 2003. Once the consultation on the draft is over, the final stage will involve
the authorisation of the code by a statutory instrument approved by Parliament.53
Under section 106, there may be government payments in order to compensate CSPs
(similar to the largesse distributed under the Regulation of Investigatory Powers Act 2000,
section 24). The ISPA has estimated costs at around 20m; the Government says at least
9m.54
Part of the discrepancy may arise because, according to the draft code of practice,
where the national security need for retaining data is not substantially different from the
business need, retention costs will continue to be borne by the CSPs.55
A reasonable proportion
of the marginal cost as appropriate would be provided by the government only when data
retention periods are significantly longer for national security purposes than for business
purposes.56
Phone companies keep detailed records of traffic data in order to calculate
customers' bills, and the main provider, BT, retains it for seven years. By contrast, Internet
Service Providers do not charge by traffic volume, and so do not need to keep the information
that long (AOL retains email traffic data for three months, Freeserve for 90 days and Claranet
for two weeks).57
In the light of this pattern, there is a worry that the burdens will fall upon
smaller or niche-market firms and will more widely affect international competitiveness.58
However, even a major CSP like AOL, which retains data as necessary for billing purposes,
fraud prevention or security, has argued at the European Commission level that `imposing
mandatory longer data retention period will not be proportionate, will impose vast costs which
will not be in line with business needs'.59
51
. See further its paper on data types: Home Office,
Consultation paper on a code of practice for voluntary retention of communications data, at
http://www.homeoffice.gov.uk/docs/vol_retention.pdf, 2003.
52
House of Lords Deb.vol.632 col.143wa 20 March, 2002, Lord Rooker.
53
House of Lords Deb. vol.629 col.1282 11 December 2001, Lord Rooker.
54
Home Office Regulatory Impact Assessment: Retention of Communications Data (2001) para.27.
55
Home Office, Consultation paper on a code of practice for voluntary retention of communications data,
at http://www.homeoffice.gov.uk/docs/vol_retention.pdf, 2003, Annex A para.23.
56
Marginal costs may include, for example, the design and production of additional storage and searching
facilities. See ibid, para 24.
57
(2001) The Guardian Online 15 November.
58
Home Office, Home Office Regulatory Impact Assessment: Retention of Communications Data (2001)
paras.9, 10.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
13
It is emphasised that the code will be voluntary, and there are no legal penalties in the
2001 Act for non-compliance, though the code or any specific agreement can be invoked in
legal proceedings brought against a communications provider by a person whose
communications data they hold. This proviso is intended to prevent a CSP incurring civil
liability for storing data in accordance with the code (though, as discussed below, it may not
overcome express restraints under data protection laws which may ultimately be interpreted
over the heads of UK legislatures and judiciary by the
NILQ page 169
European Court of Justice). Retention for a maximum period of 12 months for subscriber
information and telephony data60
will be required under the provisions of the draft code of
practice without prejudice to any longer retention period which may be justified by the
business practices of the communications provider.61
However, communications data may
eventually be subject to compulsory retention under European law for 12-24 months62
according to a draft EU Framework Decision on the retention of traffic data and access to this
data in connection with criminal investigations and prosecutions63
which was drafted by the
Belgium presidency and leaked to Statewatch.64
Under the draft Framework Decision, such
retention of traffic data would not be disproportionate in view of the needs of criminal
prosecutions as against the intrusion into privacy that such a retention would entail.65
Terrorism is just one of the possible crimes for which data retention would be required, and the
59
AOL and Data Retention, document presented at the EU Cybercrime Forum plenary meeting, 27
November, 2001. See generally .
60
A maximum period of 6 months is required for email data, ISP data, SMS, EMS, and MMS data. On the
other hand the draft code requires a maximum retention period of 4 days for web activitiy logs. See
Home Office, Consultation paper on a code of practice for voluntary retention of communications data,
at http://www.homeoffice.gov.uk/docs/vol_retention.pdf, 2003, Annex A, Appendix A for further
technical details.
61
Home Office, Draft Code of Practice on the Retention of Communication Data under Part XI of the AntiTerrorism
Crime & Security Act 2001, Pre Public Consultation Process Draft Document, August 2002,
para 15. See further Home Office Regulatory Impact Assessment: Retention of Communications Data
(2001) para.11.
62
Interpol also supports a retention period of 12-24 months for traffic data. Interpol Expert Statement,
Overview of vital traffic data necessary for investigations which the European Working on Information
Technology Crime asks the general retention by telecommunication operators and telecommunication
access and service providers, EU Cybercrime Forum plenary meeting, 27 November, 2001. See generally
.
63
Draft Framework Decision on the retention of traffic data and on access to this data in connection with
criminal investigations and prosecutions, Belgian proposal for Third Pillar legislation, at
.
64
Statewatch Analysis No 11: Surveillance of telecommunications: data retention to be `compulsory',
August 2002, at .
65
Draft Framework Decision on the retention of traffic data and on access to this data in connection with
criminal investigations and prosecutions, Belgian proposal for Third Pillar legislation, para 12.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
14
draft Framework Decision would extend data retention for any serious crime including rape,
arson, swindling, and offences under the Council of Europe CyberCrime Convention.66
One
EU member states' competent authority would also be able to access data retained in another
member state under the draft Framework decision.67
Returning to the 2001 Act, if, `after reviewing the operation of any requirements
contained in the code of practice and any agreements under section 102, it appears to the
Secretary of State that it is necessary to do so', then, by section 104, the Secretary of State can
issue compulsory directions.
NILQ page 170
So, compulsion can apply if the CSPs `don't volunteer enough'.68
Precise criteria on which to
judge success of failure are not set out in the Act but were expected to be detailed in the
voluntary code of practice (in fact, there is no mention as yet in the current draft).69
Mandatory
directions may apply to all CSPs, a particular type of CSPs, or one or several specific CSPs.
Some consultation is again required (including with the CSPs and the Information
Commissioner), as well as approval of a statutory instrument by Parliament. Compensation
may be payable under section 106. In the event of non-compliance by CSPs, the Secretary of
State may bring civil proceedings for an injunction or other appropriate relief.
The absence of criminal sanctions demonstrates how hesitant Parliament felt about the
grant of these powers. This apprehension is also evidenced by section 105, by which any
mandatory scheme under section 104 will itself lapse after two years (on the 14 December
2003) unless renewed (which can occur more than once) by affirmative order.
The implications of Part XI of the Anti-terrorism, Crime and Security Act
2001
One way or another, many more terabytes of data will have to be stored by CSPs as a
result of the threat or operation of Part XI. Yet, it may be doubted whether Part XI will achieve
66
ETS 185, 2001.
67
As far as the implementation of the draft Framework Decision is concerned, member states would be
required to comply by 31 December 2003.
68
`The neťs eyes are watching', Guardian Online, 15 November 2001.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
15
its ultimate objective of providing evidence against nefarious activities for at least two
practical reasons.
The first is the doubt whether it can provide convincing evidence of wrongdoing.
Though computer evidence is potentially admissible as evidence,70
traffic data cannot beyond
reasonable doubt link a technical occurrence recorded as data to personal identity. In other
words, the mobile phone or the e-mail message might be used by an identifiable username but
the person making the keystrokes may not necessarily be the username owner.71
This first
doubt is not, however, fatal to the enterprise. Just as with arrests under section 41 of the
Terrorism Act 2000 and its predecessors, few police interventions either result in court cases or
are intended to do so. The main point of anti-terrorism policing is preventing and countering
the threat rather than producing cases to be processed beyond reasonable doubt through courts
in the public domain.72
The second practical obstacle is that evasion is relatively simple. With standard e-mail
programs (such as Pegasus or Microsoft Outlook), the e-mail address and name of the person
being contacted is logged by the system and the potentially unique Internet Protocol (IP)
address73
of the sender is
NILQ page 171
revealed. Detection is thereby facilitated by the evidence chain so created. However, the task
of law enforcement becomes much more tricky if web-based e-mail systems, such Hotmail, are
used. For example, the FBI only discovered that Zacarias Moussaoui, charged as a conspirator
in the September 11th
attacks, had utilised three Hotmail accounts through his written pleadings
in July and August 2002. Amongst the challenges faced by investigators in that case are the
initial problem that the identities of account-holders are not verified by Microsoft, the owners
69
House of Lords Deb. Vol.629 col.800 4 December 2001, Lord Rooker.
70
P. Sommer, `Downloads, logs and captures: evidence from cyberspace' (2002) 8 Computer and
Telecommunications Law Review 21.
71
C. Bowden, `CCTV for inside your heaď (2002) 8 Computer and Telecommunications Law Review 21,
21.
72
See C. Walker, The Anti-Terrorism Legislation (Oxford: Oxford University Press, 2002) chap.5.
73
Every machine logged into the Internet uses a unique identifying 32-bit binary number, called an IP
Address (your own IP address can be readily found by logging into
). 'Dynamic' IP addresses are often assigned from a
pool by CSPs at the start of a customer's log-in, but this is less common with ADSL (cable) connections.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
16
of Hotmail. Provided the account-holder gives a false identity,74
does not use a traceable IP
address (which can be achieved by using an Internet terminal in a public library, Internet cafe75
or shopping mall) and does not download information to a traceable storage mechanism (a
hard-disk or floppy disk),76
then the usage can remain anonymous. Microsoft can in theory (but
refuses as a matter of policy) to trace messages by a combination of IP address and date/time
of the message, provided the information has not been erased from its records because an
account has been inactive for 30 days. But even that potential path to detection can be defeated
by the use of more sophisticated anonymised web browsing systems such as Anonymizer.com.
Although the draft Code of Practice will require CSPs to retain communication data that relates
to `subscribers resident in the UK or subscribing to or using a UK-based service.... whether
the data is generated or processed in the UK or abroad,'77
it is relatively easy to set up a
foreign POP3 or IMAP e-mail account and then access that account securely by using web
based systems like mail2web.com. In this way, the mail will always be stored and accessed in a
foreign system, circumventing not only the purpose of data retention but also any e-mail
interception power under RIPA 2000.78
In the main, Part XI is conceived with switched
telephony in mind, and it was forlornly admitted by one government minister that `e-mail is
more difficult... I do not fully understand the details of headers and so forth. I have never used
hotmail,
NILQ page 172
although I have used Internet and e-mail services.'.79
So much more likely is it that trained
terrorists will know how to cover their tracks. One is therefore left with the worry that the
74
Moussaoui's accounts were called xdesertman@hotmail.com, pilotz123@hotmail.com and
Olimahammed2@hotmail.com, with his registered name in one case as Zuluman Tangotango: US v
Zacarias Moussaoui, Crim. No. 01-455-A, US District Court for the Eastern District of Virginia
(Alexandria Division): Governmenťs Response to Courťs order on computer and email evidence,
, 2002.
75
Moussaoui was a customer of Kinko's (), a company which also strengthens
privacy by wiping the memory of their computers every 24 hours.
76
The http log of the computer used will only show that the site was visited and
not any e-mail details.
77
Home Office, Draft Code of Practice on the Retention of Communication Data under Part XI of the AntiTerrorism
Crime & Security Act 2001, Pre Public Consultation Process Draft Document, August 2002,
para 12.
78
Within this context see further I. Brown and B. Gladman, `The Regulation of Investigatory Powers Bill Technically
inept: ineffective against criminals while undermining the privacy, safety and security of
honest citizens and businesses', , 2000. The Home
Office, Consultation paper on a code of practice for voluntary retention of communications data, at
http://www.homeoffice.gov.uk/docs/vol_retention.pdf, 2003, Annex A para.13, accepts that CSPs who
store data abroad may not be able to comply with the Code.
79
House of Lords Deb. Vol.629 cols.757, 781 4 December 2001, Lord Rooker.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
17
government was as much engaged in an exercise of flexing muscles against the allegedly
anarchic Internet as in actually garnering useful information to combat terrorism.
In the process, and as a further more principled objection, one can expect damage to
individual rights, especially respect for individual privacy under article 8 of the European
Convention, which expressly applies to communications.80
In her comments on the Bill, the
then Information Commissioner, Elizabeth France, has stated that the proposed provisions
`could have a significant impact on the privacy of individuals whose data are retaineď and
suffer from a `lack of proportionality such as to render the prospective legislation incompatible
with Convention rights'.81
Alongside the ethical emphasis on individual autonomy must be set
democratic and legal accountability, not easy to square with private power-holders such as
CSPs.
Flowing from this principled problem, there are also troublesome legal implications.
There is the basic issue of compatibility with the Human Rights Act 1998, which reproduces
the requirements of Article 8 of the European Convention. It may be assumed at the outset that
CSPs will be treated as `public authorities' and are thereby within the duties of section 6 of the
Human Rights Act 1998 for these purposes. Just as in R (on the application of Ford) v Press
Complaints Commission,82
the PCC readily conceded that it was a public authority when
enforcing a code of practice recognised by statute (the Human Rights Act, section 12). At first
glance, CSPs look to be in a similar position in regard to the enforcement of any codes under
Part XI of the Anti-terrorism, Crime and Security Act 2001.83
Turning to the substantive legal issue of compatibility, the question is whether Part XI
can be justified under article 8(2) `as is in accordance with the law and is necessary in a
democratic society in the interests of national security, public safety or the economic wellbeing
of the country, for the prevention of disorder or crime, for the protection of health or
morals, or for the protection of the rights and freedoms of others'. One might concede that the
80
See E.A. Mohammed, `An examination of surveillance technology and their implications for privacy and
related issues' (1999) (2) Journal of Information, Law & Technology; P.M. Schwartz, `Privacy and
democracy in cyberspace' (1999) 52 Vanderbilt Law Review 1609.
81
Information Commissioner news release, Information Commissioner contributes to scrutiny of antiterrorism
bill, , 13 November 2001. See further
Information Commissioner's Office press release, Monitoring must be justified, 10 July, 2002.
82
[2001] EWHC Admin 683 para.11.
83
This point has also been raised by B. Emmerson, & H. Mountfield, Advice to the Information
Commissioner on ATCSA 2001 Retention and Disclosure of Communications Data, July 2002.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
18
purposes for which the Part XI powers are likely to be used will amount to a prima facie
legitimate purpose within Article 8(2). A more difficult hurdle is whether the interference will
be `in accordance with the law', given that the instrument for control is a voluntary code of
practice. Codes of
NILQ page 173
practice have been viewed in the past as insufficiently clear instruments to guide officials or
citizens, most notably in the case of Malone v United Kingdom.84
However, Part XI may be
distinguishable in that the code arises under a statutory requirement, and there are legal
enforcement powers if it fails.
Even more tricky is that the interference must be `necessary' and `proportionate'. The
Government could be criticised for promoting new legislation such as the Anti-Terrorism,
Crime, and Security Act 2001 and extending its powers before the inadequacy of its existing
measures has been established. These include such powers as the acquisition and disclosure of
communications data under Part I Chapter II as described above, and the investigation of
electronic data protected by encryption under Part III of the Act. While these are yet to be
implemented by the government, and their impact to be tested, even more new powers are
given to law enforcement agencies under the Anti-Terrorism, Crime, and Security Act 2001.
Whether more surveillance will necessarily result in detection and prevention of such terrible
crimes happening is debatable. As the Earl of Northesk stated in the House of Lords `there is
no evidence whatever that a lack of data retained has proved an impediment to the
investigation of the atrocities on 11th September.'85
The issue of the retention of data in another context is currently being litigated in the
case of the R (on application of S) v Chief Constable of South Yorkshire and R (on application
of M) v Chief Constable of South Yorkshire.86
The applicants sought judicial review of the
Chief Constable's decision to retain fingerprints and DNA samples taken in the course of a
criminal investigation in circumstances where there had been an acquittal or a discontinuance.
Though the governing legislation, the Police and Criminal Evidence Act 1984, section 64(1A),
as amended by the Criminal Justice and Police Act 2001, section 82, allows for indefinite
84
App.no. 8691/79, Ser A 82, (1984) 7 EHRR 14.
85
House of Lords Debates vol.629 col. 808 4 December 2001. But note the subsequent case of Moussaoui,
discussed above, where data retention was one of several issues of concern.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
19
retention even after an acquittal. The applicants argued this provision was incompatible with
the right to respect for private life under article 8(1). The Administrative Court rejected the
application, viewing section 64(1A) as compatible with article 8 (2) by addressing the pressing
social need of the prevention of disorder or crime in a way which was proportionate. The
actual retention of information (as opposed to accessing it) was not in any event considered an
interference to an individuaľs right to privacy. Later, the Court of Appeal (Civil Division) did
at least accept that the retention of fingerprints interfered with Article 8(1) rights but at the
same time concluded that the adverse consequences to the individual were proportionate to the
benefits to the public under Article 8(2). The Court also observed (Lord Justice Sedley
dissenting) that whilst all citizens were entitled to be regarded as innocent, the differential
treatment of those who had been the subject of an unproductive criminal investigation could be
consistent with rights against discrimination under Article 14.
NILQ page 174
These interpretations appear rather more grudging than the sweeping approach of the
European Court of Human Rights that87
`... states do not enjoy unlimited discretion to subject individuals to secret surveillance
or a system of secret files. The interest of a State in protecting its national security must
be balanced against the seriousness of the interference with an applicanťs right to
respect for his or her private life.'
So far as the activities of intelligence services are concerned, the Strasbourg court reiterates
that `powers of secret surveillance of citizens are tolerable under the Convention only in so far
as strictly necessary for safeguarding the democratic institutions.'88
Concerns for national
security do not provide a blanket right for secret surveillance of citizens by the state and89
`...in respect of national security as in respect of other purposes, there has to be at least
a reasonable and genuine link between the aim invoked and the measures interfering
with private life for the aim to be regarded as legitimate. To refer to the more or less
indiscriminate storing of information relating to the private lives of individuals in terms
of pursuing a legitimate national security concern is... evidently problematic.'
86
[2002] EWHC 478, [2002] EWCA Civ 1275.
87
Rotaru v Romania, App.no. 28341/95, judgment of 4 May, 2000, concurring opinion of Judge
Wildhaber, joined by judges Makarczyk, Türmen, Costa, Tulkens, Casadevall and Weber.
88
See Klass and Others v. Germany, App.no. 5029/71, Ser A 28, para.42.
89
Rotaru v Romania, loc. cit. concurring opinion.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
20
Although the retention of some data for national security purposes may well be justified
under article 8(2) for an extended period of time, that does not necessarily mean that blanket
retention is justified90
or that access to such data under section 22 of RIPA 2000 is justified for
any of the wider law enforcement purposes within that section. One may argue that access to
communications data retained longer than it is necessary for business purposes is
disproportionate and goes much further than pursuing a legitimate national security concern
especially for reasons other than national security such as for wider law enforcement purposes
under section 22(2) of RIPA 2000 (as described further below).91
Part XI of the 2001 Act and
section 102(3) in particular should have been narrowly tailored to address national security
concerns only without providing access to such data under section 22(2) of RIPA 2000 for
other law enforcement purposes. In fact, the draft Code of Practice encourages relevant public
authorities under Chapter II of Part I of RIPA 2000 by stating that `it is outside of the scope of
this code of practice to address the issue of acquisition of data after it has been
NILQ page 175
retaineď92
and `this code cannot itself place restrictions on the ability of these bodies or other
persons to acquire data retained under the code for other purposes through the exercise of any
statutory power' .93
Even more explicitly, the draft code of practice states that:94
`In particular, this code can not place any restrictions on the ability of the public
authorities listed in Chapter II of Part I of the Regulation of Investigatory Powers Act
2000 to acquire data retained under this code for any of the purposes set out in section
22 of that Act which do not relate to national security.'
The next legal difficulty is that it is left unspecified what is the relation between Part XI
and the Data Protection Act 1998. Part XI does not expressly amend or delimit the Data
Protection Act. Presumably, the latter Act will override any codes or even statutory regulations
which ask for retention of data on an excessive scale (by reference either to time length or
90
Compare the decision of the National Security Appeals Panel of the Information Tribunal in Norman
Baker v Secretary of State for the Home Department (, 2001).
An automatic blanket exemption from subject access under the Data Protection Act 1998 in respect of
personal data held by the Security Service was quashed.
91
See further B. Emmerson, & H. Mountfield, Advice to the Information Commissioner on ATCSA 2001
Retention and Disclosure of Communications Data, July 2002.
92
Home Office, Consultation paper on a code of practice for voluntary retention of communications data,
at http://www.homeoffice.gov.uk/docs/vol_retention.pdf, 2003, Annex A, para.25.
93
Ibid., Annex A, para 27.
94
Ibid.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
21
type).95
In contrast to the interpretation in R. (on the application of S) v Chief Constable of
South Yorkshire, it is clear that Data Protection Principles (Schedule 1, Principle 5) expressly
view the retention of data as affecting per se data privacy. But the government view, expressed
in the draft code, is that such retention of data for the specified period of time by the code is
`necessary for the purpose of national security'96
and accordingly `the national security
exemption in section 28 of the Data Protection Act 1998 could be relied on to exempt such
data from the fifth principle so enabling it to be retained in accordance with the code.'97
As mentioned before, if access to retained communications data for investigatory
purposes is then actually required, attention must be turned to the Regulation of Investigatory
Powers Act 2000, consideration of which throws up several legal problems in its intersection
with Part XI.98
Communications data can be accessed by a designated public authority under
Chapter II of Part I of RIPA. Chapter II is yet to come into force (though there has been
consultation on a draft code of practice).99
The fact that it is not in force suggests strongly
again that these measures in the 2001 Act were not as vital or as relevant to terrorism as
alleged. Under section 21 of RIPA, there is a distinction between (i) interceptions of
communications, including their contents, in the course of their transmission, which falls under
chapter 1
NILQ page 176
of Part I of RIPA,100
and (ii) conduct involving the obtaining or disclosure of `communications
data'. This term includes `traffic data' comprised in or attached to a communication (whether
by the sender or otherwise) for the purposes of any postal service or telecommunication system
by means of which it is being or may be transmitted or other information about the usage or
provision of telecommunications or postal services made by any person. Examples of
95
The draft code of practice states that `data retained under the code are subject to the data protection
principles found in the Data Protection Act 1998.' Ibid., page s20-21, para. 6-11.
96
Ibid., page 21, para 9.
97
Ibid.
98
See Y. Akdeniz, N. Taylor, and C. Walker, `Regulation of Investigatory Powers Act 2000:
Bigbrother.gov.uk' [2001] Criminal Law Review 73.
99
Home Office, Accessing Communications Data Draft Code of Practice,
, August 2001. The Regulation of Investigatory
Powers Act 2000 (Commencement No. 2) Order 2001 SI No.2727 allows for draft and final Codes to be
issued, but the consultation period on the draft code ended on 2 November 2001 and nothing has
appeared since that time.
100
Note the Interception of communications code of practice, August 2002, at
. This code of practice relates to the powers and duties
conferred or imposed under Chapter I of Part I of the Regulation of Investigatory Powers Act 2000.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
22
`communications data' include equipment and location details, telephone subscriber details,
itemised telephone bill logs, e-mail headers, Internet Protocol addresses, and information on
the outside of postal items. Criticisms of this purported distinction have already been related,
and the concern remains that far more detailed and intrusive records will be made available
about electronic communications than would be the case for postal messages.101
Data of these kinds may be obtained under section 22(2) where necessary, inter alia,
`(a) in the interests of national security; (b) for the purpose of preventing or detecting crime or
of preventing disorder; (c) in the interests of the economic well-being of the United Kingdom;
(d) in the interests of public safety; (e) for the purpose of protecting public health...' Any
action taken must be proportionate and necessary (section 23(8)). These purposes obviously go
beyond those specified in the Anti-terrorism, Crime and Security Act 2001, so there is a
potential not just for confusion but for the abuse of powers, when data retained for some
purposes is requested for others as mentioned above. The CSP may not realise that an abuse is
occurring since the reasons given by law enforcement agencies are unlikely to be very explicit.
The problem could be solved if the Secretary of State issued a direction under section 25 (3) of
RIPA, limiting further the purposes of requests for access to the data retained under the Part XI
Code. But this would still depend upon CSPs being able to distinguish between data normally
retained for business purposes, and therefore accessible under the wider objectives of RIPA,
and data specially retained for the purposes listed in Part XI. Furthermore, if the latter purposes
of Part XI are interpreted narrowly, and are confined essentially to security purposes, then
would it be lawful to act upon an application under Schedule 1 of the Police and Criminal
Evidence Act 1984 for the production of communications data which may relate to the
investigation of a serious arrestable offence which has been retained longer than the normal
business purpose period? Such potential confusions are of `real concern' to the Information
Commissioner.102
The decision in R. (on the application of NTL Group Ltd) v Ipswich Crown
Court 103
suggests that access to data (content data in this case) under section 9 and Schedule 1
of the PACE 1984 is a possibility to be borne in mind by a CSP. Therefore, pending the
making of an order under
NILQ page 177
101
All Party Parliamentary Internet Group, Communications Data: Report of an Inquiry by the All Party
Internet Group, January 2003, at http://www.apig.org.uk/APIGreport.pdf, para.39.
102
Information Commissioner, Annual Report 2001-02 (2001-02 HC 913) 18.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
23
paragraph 4 of Schedule 1 to the PACE 1984, the relevant material (or data) could be
preserved in accordance with the terms of paragraph 11 of Schedule 1. If and when an order is
made under paragraph 4, the CSPs would be required to disclose the data retained in their
system. According to the judgment, retention of such data by a CSP (NTL in this case), would
not amount to an offence under section 1 of RIPA 2000.
As already mentioned, the dangerous overlap of purposes is recognised by the Home
Office draft Code of Practice, but it offers no solutions. One suitably restrained approach
would be to adopt `data preservation' (storing only data of suspects identified to CSPs) rather
than blanket `data retention', thus providing clearer proportionality in balancing the law
enforcement needs with privacy concerns. Under a data preservation regime, upon the request
of appropriate authorities, data relating to named suspects could be ordered to be preserved for
possible later access following a further disclosure order. Such a case by case basis approach is
rejected as futile by the Home Office consultation paper on a Code of Practice for Voluntary
Retention of Communications Data, though the arguments about not being sure who might
become suspects and therefore not being sure about which data to retain for the future really
does sound like the pleadings of a paranoid police state.104
Even the strongly criticised Council
of Europe CyberCrime Convention does not include data retention provisions105
and instead
opted for measures involving data preservation.106
Though data preservation itself represents
an `entirely new legal power or procedure in domestic law'107
for most European countries,
nevertheless, these measures `do not mandate the collection and retention of all, or even some,
data collected by a service provider or other entity in the course of its activities.'108
They are
also limited `for the purpose of specific criminal investigations or proceedings'.109
Such data
would be preserved for a period of time as long as necessary, up to a maximum of 90 days.110
103
R v Ipswich Crown Court, ex parte NTL Group Ltd ([2002] EWHC 1585 (Admin).
104
Home Office, Consultation paper on a code of practice for voluntary retention of communications data,
at http://www.homeoffice.gov.uk/docs/vol_retention.pdf, 2003, para.12.4.
105
J. Fisher, 'The Draft Convention on Cybercrime: Potential Constitutional Conflicts' (2001) 32 U. West.
L.A. L. Rev. 339.
106
See further article 16 (Expedited preservation of stored computer data), and article 17 (Expedited
preservation and partial disclosure of traffic data) of the Council of Europe CyberCrime Convention,
ETS No 185, 2001.
107
See paragraph 155 of the Explanatory Report of the Council of Europe CyberCrime Convention,
, 2001. Data preservation as opposed to data
retention is also supported as a preferred option by the All Party Parliamentary Internet Group,
Communications Data: Report of an Inquiry by the All Party Internet Group, January 2003,
http://www.apig.org.uk/APIGreport.pdf, para. 189.
108
Ibid, at para 152.
109
See article 14(2) of the Council of Europe CyberCrime Convention, ETS No 185, 2001.
110
Ibid., article 16(2).
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
24
The Convention furthermore enables real-time collection of traffic data `associated with
specified communications'.111
But these powers do not intrude as far as Part XI:112
NILQ page 178
`... the Convention does not require or authorise the general or indiscriminate
surveillance and collection of large amounts of traffic data. It does not authorise the
situation of `fishing expeditions' where criminal activities are hopefully sought to be
discovered, as opposed to specific instances of criminality being investigated. The
judicial or other order authorising the collection must specify the communications to
which the collection of traffic data relates.'
Furthermore, while the Explanatory Report of the CyberCrime Convention claims the privacy
interests arising from the collection of traffic data are diminished compared to the interception
of content data, it nevertheless acknowledges that
`...a stronger privacy issue may exist in regard to data about the source or destination of
a communication (e.g. the visited websites). The collection of this data may, in some
situations, permit the compilation of a profile of a person's interests, associates and
social context.'113
CSPs already co-operate consensually with law enforcement agencies. However,
compelled access to traffic data stored for business purposes will become possible under RIPA
2000. Where authorisation is given under RIPA for obtaining and disclosing of the data, then
the operator can be compelled (if necessary by civil proceedings) to provide it (section 22(4),
though the issuing authority may decide (for example to maintain secrecy or because of
superior technical capabilities) to obtain the data itself (section 22(3)). Authorisation will be in
writing and must define the conduct authorised and the data to be obtained; the authorisation
remains valid for one month (section 23). The issuing authority under chapter 2 is not the
Secretary of State but will be an office-holder designated by statutory order within the police,
intelligence services, Customs and Excise, Inland Revenue, or any other public authority
specified by statutory order.
111
Ibid., article 20.
112
See para. 219 of the Explanatory Report of the Council of Europe CyberCrime Convention, 2001.
113
Ibid, at para 227.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
25
RIPA is an improvement on the previous free-for-all, but it potentially empowers an
alarmingly large range of public agencies to snoop and for a rambling array of reasons. And
most serious of all, it allows intervention on the basis of standards and procedures which are
intentionally lax on the specious grounds that interception of communications content is a
much greater intrusion than the collection of traffic data to such an extent that the latter seems
hardly to matter.114
So, speakers who avow the RIP Act as the `greatest safeguard that exists in
any democracy in the world.... for protecting our rights'115
are simply inaccurate. The Data
Protection Commissioner (now the Information Commissioner) was also critical of RIPA,
contending that `access to traffic and billing data should also be made
NILQ page 179
subject to prior judicial scrutiny'116
and feared that the lack of precision and foreseeability in
the legislation might not comply with Article 8 (privacy rights) under the European
Convention.117
The dilution in judicial oversight is also a feature of the US PATRIOT Act
2001118
in connection with a Pen Register/Trap Trace (PR/TT)119
authority for Internet data,
though even that process does require an application to a court (albeit that it cannot deny the
application) and a report back to a judge. PR/TT authority may be used to collect `addressing'
information on the Internet but not the content of communications. The PR/TT authority under
section 216 enables law enforcement agencies to install their own monitoring devices such as
the FBI's DCS1000, formerly known as Carnivore120
on computers belonging to a public
provider. Systems such as Carnivore are capable of intercepting content of communications
and accountability remains difficult with the use of such black-box technology. Moreover,
disclosures of either content or non-content customer records in emergencies involving an
immediate risk of death or serious physical injury to any person to law enforcement agencies
by CSPs is now possible under section 212 of the PATRIOT Act 2001.121
114
See Home Office, Interception of Communications in the United Kingdom (Cm.4368, London, 1999)
para.10.9.
115
Per David Blunkett, the Home Secretary, House of Commons Debates vol.372 col.935 15 October, 2001.
116
Data Protection Commissioner, Briefing For Parliamentarians on RIP,
, 2000.
117
News Release, 13 November 2001.
118
Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act ( Pub. L. No. 107-56, 115
Stat. 272 (2001), section 216
119
See 18 U.S.C. s.3122(b)(2).
120
IITRI, Independent Technical Review of the Carnivore System, Final Report, December 8, 2000, at
.
121
This voluntary disclosure, however, does not create an affirmative obligation to review customer
communications in search of such imminent dangers. See generally Computer Crime and Intellectual
Property Section (CCIPS), Field Guidance on New Authorities That Relate to Computer Crime and
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
26
War is over?
Returning to the thesis at the start of this article that `War is over', it may be indicative
that the legal crisis caused by September 11th
has been abating by the slow pace of
implementation of Part XI and of Part I, Chapter II of RIPA. As for the latter, when the Home
Office issued the draft secondary legislation in June 2002 under section 25 of RIPA, it raised a
storm of criticism and was withdrawn. The concern was that the (draft) Regulation of
Investigatory Powers (Communications Data: Additional Public Authorities) Order 2002
would afford powers to a very broad range of official bodies to access communications data, a
range well beyond those expressed in the body of the Act itself, such as the police, customs,
secret services and the Revenue, and including a wide range of Government departments, local
authorities, the NHS and other public authorities.122
However, the government backed down
NILQ page 180
after a week of vilification,123
having planned to put the changes for approval before a
delegated Legislation Select Committee (on the 19th
June 2002) after the Joint Committee on
Statutory Instruments had concluded that it was an Instrument to which the Committee did not
need to draw the special attention of both Houses.124
The governmenťs bona fides was
damaged by the contemporary revelation that a Department of Transport special adviser had
sought information about the political affiliation of certain members of the Paddington rail
crash survivor's group.125
The Home Secretary, David Blunkett, said defensively that `I have
no intention that we should be Big Brother'.126
Electronic Evidence Enacted in the USA Patriot Act of 2001, at
.
122
A total of 24 were listed, but only two (Scottish Drugs Enforcement Agency and UK Atomic Energy
Authority Constabulary) could be said to be primarily criminal justice related. The Government later
averred that the extension would have been less startling that first appeared because the rank of
authorising officer would have been set by a further draft statutory instrument (Regulation of
Investigatory Powers (Communications Data: Prescription of Officers, Ranks and Position) Order 2002)
at a level higher than attainable by some organisations - an example might be a parish council: All Party
Parliamentary Internet Group, Communications Data: Report of an Inquiry by the All Party Internet
Group, January 2003, , para.76. The variable authorisation
level might in turn create the need for one public agency acting for others: ibid. para.91.
123
The Times 18 June 2002 4, 19 June 4.
124
Thirty-First Report 2001-02 HL 128, HC 135-xxxi.
125
House of Commons Deb. vol.386 col.856 12 June 2002; P. Lewis, `Is big brother getting even bigger?'
(2002) The Times Law 18 June 3.
126
Daily Telegraph 19 June 2002 23.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
27
Admitting that they `got it wrong', the Home Office published a consultation paper
entitled Access to Communications Data: Respecting Privacy and Protecting the Public from
Crime in March 2003.127
The government accepted that there must be further limits as to the
range of empowered authorities and that the types of data which can be accessed must be
limited in most cases.128
Though some further safeguards are suggested especially prior
scrutiny by the Office of the Interception Commissioner129
- prior judicial authorisation, the
channelling of all access through the police, or the confinement of the empowered authorities
to a select handful are all rejected.130
Yet, even without the full activation of RIPA, Chapter 1 Part II, it should not be
assumed that the government has been wholly defeated in its intentions. The powers under
RIPA already require extensive data collection through `black boxes' to record internet traffic
data under RIPA section 12, which provides that:
`The Secretary of State may by order provide for the imposition...on persons who...are
providing...public telecommunications services...of such obligations as it
appears...reasonable to impose for the purpose of securing that it is and remains
practicable for requirements to provide assistance in relation to interception warrants to
be imposed and complied with'
NILQ page 181
For this purpose the Regulation of Investigatory Powers (Maintenance of Interception
Capability) Order came into force in August 2002.131
This order sets out the obligations which
it appears to the Secretary of State reasonable to impose on the CSPs for the purpose of
securing that it is and remains practicable for requirements to provide assistance in relation to
interception warrants to be imposed and complied with. The obligations include the provision
of `a mechanism for implementing interceptions within one working day of the service
provider being informed that the interception has been appropriately authorised,'132
and `to
enable the simultaneous interception of the communications of up to 1 in 10,000 of the persons
127
Home Office, Consultation paper on Access to Communications Data: Respecting Privacy and
Protecting the Public from Crime , March 2003, at < http://www.homeoffice.gov.uk/docs/consult.pdf>,
Foreword, para.5.
128
Ibid. para.3.22. For most of the relevant public authorities, there would be no access to traffic data:
para.3.46, 3.48.
129
Ibid., para.3.49.
130
Ibid. paras.3.32, 3.38, 3.44.
131
2002 SI no.1931.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
28
to whom the service provider provides the public telecommunications service, provided that
those persons number more than 10,000.'133
A necessary component of the surveillance network being created is the Government
National Technical Assistance Centre, a mass surveillance facility in the Security Services
London headquarters which it is hoped will become operational during 2002.134
Potentially all
United Kingdom internet traffic data could find its way to the Security Service, and it will in
particular perform decryption services for law enforcement.135
Beyond this facility there is the
even more uncontrolled UKUSA spy network known as ECHELON, based on the sharing of
signals intelligence between the United States, United Kingdom, Canada, Australia and New
Zealand.136
The implementation of Part XI of the Anti-Terrorism, Crime, and Security Act 2001 is
in much deeper trouble and progress has been remarkably slow. The draft code of practice was
published for consultation in March 2003, 15 months after the 2001 Act was enacted.
Important questions such as whether investigative work has improved, how many requests
have been made, whether a voluntary structure is sufficient, and market impacts will need to be
answered when the code will be reviewed within three months from the date it receives
parliamentary approval.137
Further details of the problems created by the measures within the 2001 Act and the
related draft code of practice were set out in a report by the All Party Parliamentary Internet
Group (APIG) in January 2003.138
Based especially upon concerns about the legality under
European Convention jurisprudence of acting under voluntary codes, APIG recommended that
the Home Office
132
Ibid. para 5.
133
Ibid, para 11.
134
.
135
See BBC News, Questions over net snooping centre, 6 June, 2002, at
.
136
See generally . Note the European Parliament resolutions on the
existence of a global system for the interception of private and commercial communications (ECHELON
interception system) (2001/2098(INI), dated 5 September 2001, and 7 November, 2002 (B5-0528/2002).
137
Home Office, Consultation paper on Access to Communications Data: Respecting Privacy and
Protecting the Public from Crime , March 2003, at < http://www.homeoffice.gov.uk/docs/consult.pdf>,
para.33.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
29
NILQ page 182
immediately drop their plans to introduce a voluntary scheme for data retention under AntiTerrorism,
Crime, and Security Act 2001.139
An even more stark verdict from APIG was that
the Government equally should not invoke its powers under section 104 to impose a mandatory
data retention scheme; the concerns include costs, incompatibility with data protection and
surveillance provisions as well as conflict with foreign regimes which have adopted different
stances and which would come into play when data is processed or warehoused abroad.140
Given the publication of the draft code of practice in March 2003, it now seems less likely that
the whole scheme will be allowed to lapse on 14 December 2003 without firing any legal shot
in anger. Nevertheless, instead of an oppressive scheme of blanket data retention,141
greater
attention should be paid to targeted data preservation, even if the target is at times defined in
rather wide and wooly terms.142
In conclusion, we are getting back to `normaľ by the standards of security laws in the
United Kingdom. On the surface, the normal decencies of debate and scrutiny are observed,
and the laws are maintained, subject to the blemish of a derogation under Article 15 of the
European Convention in respect of powers of detention of suspected foreign terrorists, though
even the validity of that notice has now been attacked by some judges.143
A move away from a
war model is to be welcomed, for, like the `war on drugs' or the `war on crime', that approach
is conducive to a lack of accountability and proportionality - the application of overwhelming
rather than sufficient force and finances - and it also threatens an endless departure from civil
society.144
But the shift is by no means secure - threatened armed action against those
governments which the President of the United States accuses of being part of an `axis of eviľ
Iraq can now be deleted from the list, but Iran and North Korea remain and Syria seems close
138
All Party Parliamentary Internet Group, Communications Data: Report of an Inquiry by the All Party
Internet Group, January 2003, at .
139
Ibid. para.141.
140
Ibid. para.178.
141
Of course, as pointed out earlier, regard must be had to the capabilities under RIPA s.12.
142
The preservation of all data for 'the period around the attacks' on September 11, which was undertaken
on a voluntary basis and resulted in data being preserved until February 2002, is so wide as to amount to
blanket retention. See All Party Parliamentary Internet Group, Communications Data: Report of an
Inquiry by the All Party Internet Group, January 2003, at
para.182
143
The discriminatory nature of Part IV of the Anti-terrorism, Crime and Security Act 2001 convinced Mr
Justice Collins in a Special Immigration Appeals Commission hearing to declare the derogation to be in
breach of Article 14 but the Court of Appeal reversed that judgment: A v Secretary of State for the Home
Department, [2002] EWCA Civ 1502.
144
See F.A. Allen, The Habits of Legality (Oxford University Press, New York, 1996) 37-40.
Walker and Akdeniz, (2003) Northern Ireland Legal Quarterly, 54(2), Summer edition, pp 159-182.
30
to candidate status - could quickly change the atmosphere.145
Furthermore, the alternative to
the war model is still an extensive security state. `War is over', but state surveillance is
gathering pace.
Terrbook\ptIX\nilq04
145
, 2001.