The Legality of State Surveillance Under European Convention On Human Rights and United Kingdom Law
The Legality of State Surveillance Under European Convention On Human Rights and United Kingdom Law
                                      1 / 48
Table of Contents
Introduction ............................................................................................................................................ 5
Privacy ..................................................................................................................................................... 6
Privacy in Britain before the time of Human Rights Act 1998 ............................................................ 7
Privilege........................................................................................................................................... 7
Home ............................................................................................................................................... 9
European Convention for the Protection of Human Rights and Fundamental Freedoms (ECHR) ... 12
The Right of Privacy after Human Rights Act 1998 (HRA) ................................................................. 14
Surveillance ....................................................................................................................................... 15
Klass v Germany – The First State Surveillance Case before ECtHR ................................................. 18
                                                                           2 / 48
       Untargeted monitoring ................................................................................................................. 28
Regulation Investigatory Powers Act 2000 – Obscure Power for Mass Surveillance ....................... 35
The Liberty and Big Brother Watch Cases – Mass Surveillance Challenged ..................................... 38
Regulation Investigatory Powers Act 2016 (RIPA 2016) – “Legal footing” to Mass Surveillance ..... 42
Bibliography .......................................................................................................................................... 45
                                                                         3 / 48
Acknowledgement
I would like to thank my dissertation supervisor Dr Makeen F Makeen for the patient guidance,
advice and tolerance.
I would also like to thank my family and friends who have supported me to pursue a second master’s
degree in the UK.
                                              4 / 48
Introduction
Technological development is driving people’s need for and awareness of privacy. Technical
development gave the state great capabilities to monitor and control the population. The people’s
interest in privacy and the state’s interest in surveillance unavoidably come into conflict. The United
Kingdom (UK) law protects some private interests but has declined to introduce a generalised right
of privacy. The introduction of European Convention on Human Rights (ECHR), which includes
protection of the right to private life, into the legal order to the UK has shaped the development of
The UK government has a long history of intercepting communications. UK’s adoption of new
technology to build its surveillance capabilities often outpaces the development of the law. The
legality of many aspects of state surveillance has constantly been challenged in courts. This
dissertation will cover privacy in UK law, the European Court of Human Rights (ECtHR) jurisprudence
on state surveillance and the UK surveillance regime. It focuses on justifications for interference in
private life provided by Article 8(2) of the ECHR and the aspect of interception of communications
                                                 5 / 48
Privacy
The “right to privacy” is, in fact, ill-defined.1 Many legal systems share the problem of delineating
specific legal interests under the concept of “privacy”.2 The discussion of “privacy” as a legal right
can be traced to an article by Samuel Warren and Louis Brandeis published in Harvard Law Review in
the United States (US) in 1890.3 Warren and Brandeis foresaw the impact of technological
inventions on the people’s desire “to be let alone”.4 In particular, they pointed to the development
Warren and Brandeis saw that in the course of history, the definitions of some legal rights have
expanded to afford new protections.6 They thought that the English courts had likewise applied the
ideas of the breach of confidence and property rights to protect one’s “privacy”.7 Based on this
assumption, they argued that the common law would protect individuals’ right to prevent facts
about private life from being made public.8 However, scholars suggest that Warren and Brandeis
misinterpreted the English precedents.9 The legal reasoning in the cases mentioned in Warren and
Brandeis’ article did not provide strong support for an emergence of the right for an individual to
1
  Walter F Pratt, Privacy in Britain (Bucknell University Press 1979) 1.
2
  Ronald J Krotoszynski, Privacy Revisited: A Global Perspective on the Right to Be Left Alone (Oxford University
Press 2016) 1.
3
  ibid 16.
4
  Samuel D Warren and Louis D Brandeis, ‘Right to Privacy’ (1890) 4 Harvard L Rev 193, 195.
5
  ibid.
6
  ibid 194.
7
  ibid 207.
8
  ibid 205.
9
  Pratt (n 1) 19.
10
   ibid 34.
                                                      6 / 48
Privacy in Britain before the time of Human Rights Act 1998
There has not been a general “right of privacy” in English law.11 Also, the courts have consistently
rejected the right to privacy in English law as well as remedies for injury to one’s privacy. The
difficulty in defining privacy right may lie in the “emotive content”12 of privacy. The feelings about
Despite the absence of a general privacy right, some aspects of the law could protect people’s
privacy interests in specific relationships or specific circumstances. These protections are scattered
in different areas of statute law and case law which are not intended to protect privacy.14
Privilege
Solicitors have the privilege not to disclose facts about their clients.15 A privilege here means that
solicitors must not be compelled to reveal the information by the court.16 The purpose of the
privilege is to ensure that solicitors could provide the best possible legal assistance to a client on the
basis of a defendant’s need to obtain the best possible advice from legal advisors.17 Privilege
protects against self-incrimination rather than for privacy.18 However, the privilege applies only to
the information that a solicitor gains in the process of advising his client.19 A solicitor could be
compelled to give evidence about facts that he learns about his client outside the solicitor-client
relationship.20
Attorney-client is the only type of relationship that qualifies for a “privilege” not to disclose facts
about individuals.21 There are other relationships, such as medical doctors-patient and religious
11
   ‘Report of the Committee on Privacy’ para 83.
12
   ibid 57.
13
   ibid.
14
   ibid 83.
15
   Berd v Lovelace (1603) Cary 62, 21 ER 33.
16
   ibid; Pratt (n 1) 38.
17
   Pratt (n 1) 42.
18
   ibid 43.
19
   ibid 42.
20
   ibid 41.
21
   ibid.
                                                   7 / 48
advisor-church goer, that people would believe the existence of such privilege. However, they do
For priest-penitent, although a judge advised that a spiritual advisor “ought not to” give evidence in
185323, other cases tend to show that communications between a penitent and a priest in
confessions do not enjoy the privilege24. In 1860, a priest who refused to give evidence in court was
guilty of contempt of court.25 For medical doctor-patient, generally, there is also no privilege for
medical doctors not to reveal information about their patients26, except in the case of assisting in
Breach of confidence
English courts see that there is a special right or duty for people in certain relationships to treat
information about another party confidential on the basis of trust or contract.28 In certain types of
relationships, a party may seek a claim for damages arising from, or an injunction against, another
For customer-service provider, service providers have a duty not to exploit their access to the
customers’ private property for other purposes. Prince Albert v Strange is a case cited by Warren
and Brandeis to justify the emergence of the right of privacy.29 Prince Albert filed an injunction
against the publication of a catalogue that contained his etchings about his private life with Queen
Victoria.30 His etchings were not intended for publication, however, were obtained by a worker at
the printer without authorisation for the purpose of publication.31 The court considered that privacy
22
   Greenlaw v King (1838) 1 Beavan 137, 145; 48 ER 891.
23
   R v Griffin (1853) 6 Cox CC 219.
24
   Greenlaw v King (n 22).
25
   R v Hay (1860) 2 Foster and Finlason 4, 9; 175 ER 933.
26
   Greenlaw v King (n 22).
27
   Pratt (n 1) 47.
28
   ibid 40.
29
   Warren and Brandeis (n 4) 202.
30
   Prince Albert v Strange 64 ER 293, 293.
31
   ibid 295.
                                                     8 / 48
is an attribute of property.32 The court saw that there had been an invasion into the domestic life of
the plaintiff.33 However, the injunction was granted on the basis of invasion of property right rather
For employer-employee, employees have a duty not to disclose confidential information of the
business. In 1843, a bank employee was prevented from revealing his employer’s accounts for “an
implied contract” that an employee would not make public what “he learns in the execution of his
duty as a clerk”.35 However, the protection of knowledge gained during employment is not
For banker-client, a jury concluded that a banker has a duty “in no way to disclose” the information
about a client’s account to a third party, a creditor in the case, without obtaining the client’s
consent.37
Home
Despite the famous statement from Coke “[t]he house of every one is his castle”, the court
recognises that the privilege is not absolute and does not apply to “any person who flies to his
house” and “the goods of any other […] brought there”.38 Also, sheriffs may be authorised by the
Although a warrant is required for the police to enter and search private premises, the court tended
to relax the rigidity of the search warrant in favour of the need to discover facts about a crime.40 In
32
   ibid 301.
33
   ibid 313.
34
   ibid 319.
35
   Tipping v Clarke (1843) 2 Hare 383, 393; 67 ER 157, 161.
36
   Gartside v Outram (1857) 26 LJ Ch 113.
37
   Foster v The Bank of London (1862) 3 Foster and Finlason 214, 217; 176 ER 96, 98.
38
   Semayne’s Case 5 Coke Rep 91 a.
39
   ibid.
40
   Pratt (n 1) 56.
                                                    9 / 48
1867 the court allowed the police to inspect items not listed in the warrant during the search as long
For the interference in the privacy of the home by private entities, in general, the court would not
recognise “a mere invasion of privacy [as] injury”42 and would not grant award damages for injury to
merely feelings about an invasion of privacy43. However, in cases where there is a nexus with
property, the courts might sometimes grant the damages.44 In 1867, a person successfully
complained to the court about a business run by his neighbour conducive to the gathering of a lot of
people in the vicinity of his home.45 The plaintiff used the destruction of “privacy” in his argument
albeit not discussed by the court in the judgement. The court awarded an injunction based on a
Unwanted publicity
The clash between the freedom of press and privacy became a major topic in the discourse of
privacy since the early 20th century.46 The news media has been a source of concern for publicising
gossips about celebrities and public figures. In the advent of photo camera, newspapers could
Libel might apply to the press in cases where there is an unauthorised representation of individuals.
In 1931, damages were granted for unauthorised use of a golfer’s name in an advertisement of
chocolate bars.48 Other than libel, there seemed no effective legal remedies against the invasion of
41
   Pringle v Bremner and Stirling (1867) 5 M (HL) 55.
42
   Jones v Tapling (1862) 12 Common Bench Rep (New Series) 826, 845; 142 ER 1367, 1374.
43
   Pratt (n 1) 50.
44
   ibid.
45
   Walker v Brewster (1867-68) LR 5 Eq 25.
46
   Pratt (n 1) 73.
47
   ibid 77.
48
   Tolley Appellant v JS Fry and Sons, Limited Respondents [1931] AC 333 (House of Lords).
49
   Pratt (n 1) 61.
                                                   10 / 48
The General Council of the Press (the Press Council) - a voluntary organisation represented by 25
full-time newspaper workers - was established50 to receive complaints about “the transgression of
reasonable standards” by newspapers and reporters.51 Regarding complaints against the press’
invasion of privacy, the Press Council, in 1953, after carrying out its first investigation, openly
criticised the Daily Mirror’s reports and national polls on the future husband for Princess Margaret.52
In 1972, the government made a conclusion that a reform of the Press Council would be needed as
its non-statutory status did not have the power to impose fines on newspapers.53 However, no
future action was taken by the British government to regulate the press.
The British government has refused on multiple occasions to introduce the right of privacy into
law.54 Krotoszynski commented that the British parliament was unwilling to create the privacy right
because the creation of the privacy rights would “run against the state itself”.55 In 1972, the
Committee on Privacy published a report on whether the parliament should make such a law. The
report touched on a range of subjects concerning privacy. In its conclusion, the Committee
maintained that there would be no need for a law on privacy. However, the Committee on Privacy
individuals.57 The same approach was followed in 1990 by the Committee on Privacy and Related
Matters, which concluded that there would not be need of a generalised privacy right.
50
   ibid 101.
51
   ‘Report of the Committee on Privacy’ (n 11) 37.
52
   Pratt (n 1) 104.
53
   ‘Report of the Committee on Privacy’ (n 11) para 192.
54
   Krotoszynski (n 2) 121.
55
   ibid 123.
56
   ‘Report of the Committee on Privacy’ (n 11) para 505.
57
   ibid 563.
                                                    11 / 48
European Convention for the Protection of Human Rights and Fundamental Freedoms
(ECHR)
The United Kingdom ratified the ECHR in 1951.58 Article 8 of the EHCR concerns the right to privacy
Article 8 (1): Everyone has the right to respect for his private and family life, his home and his
correspondence.
Article 8 (2): There shall be no interference by a public authority with the exercise of this right
except such as is in accordance with the law and is necessary in a democratic society in the
interests of national security, public safety or the economic well-being of the country, for the
prevention of disorder or crime, for the protection of health or morals, or for the protection
Article 8 extends beyond the traditional private law conceptions of privacy.59 In the jurisprudence of
ECtHR, private life in Article 8 is a broad concept that encompasses a wide range of interests.60
“Private life” in Article 8 is not limited to one’s “inner circle” but also one’s choice to exclude the
outside world.61
According to Moreham, there are the five subcategories of private life interests under Article 8 in
which three are “freedoms from” and two are “freedoms to”.62 The “freedoms from” are
58
   Stephanie Palmer, ‘Human Rights Act 1998: Bringing Rights Home, The’ (1998) 1 CYELS 125, 126.
59
   Nicole Moreham, ‘The Right to Respect for Private Life in the European Convention on Human Rights: A Re-
Examination’ [2008] Eur Human Rights L Rev 20, 79.
60
   Council of Europe, ‘Guide on Article 8 of the European Convention on Human Rights - Right to Respect for
Private and Family Life’ para 46.
61
   ibid 48.
62
   Moreham (n 59) 46.
                                                  12 / 48
“environmental pollution”.63 The “freedoms to” are the development of one’s identity and personal
autonomy.64
The ECtHR considers that the purpose of Article 8 is to ensure the development of one’s personality
without outside interference in relation to other human beings.65 Therefore, the concept of private
life in Article 8 extends to aspects of “personality identity”, namely an individual’s name, photos, and
The control of the data of and about an individual is a recurring theme in the aspect of privacy to
Article 8. Article 8 concerns not only the right to remain in solitude but also the development of
one’s personality “in relations with other human beings”.67 The ECtHR considers that one’s private
life takes places not only at home or on private premises but also in public places.68 The collection,
use, storage, confidentiality, access to and disclosure of personal information fall within Article 8 of
ECHR. The ECtHR ruled that Article 8 applies to the states’ establishment of databases of sex
offenders and criminal suspects. In the absence of regulation and safeguards against abuse,
indiscriminate collection of data in the name of public security does not comply with Article 8.69
One’s caution data which have a long-lasting impact on one’s employment prospects, may not be
retained indefinitely and subsequently be disclosed.70 An individual has the right to have access to
Although Article 8 is worded like a negative obligation for the state, the ECtHR notes the aspect of
positive obligations to Article 8 for the state to protect individuals from interference in Article 8
63
   ibid.
64
   ibid.
65
   Council of Europe (n 60) para 101.
66
   ibid.
67
   ibid.
68
   ibid 102.
69
   ibid 121.
70
   ibid 125.
71
   ibid 3.
                                                  13 / 48
The Right of Privacy after Human Rights Act 1998 (HRA)
Before the enactment of HRA, the application of ECHR in the UK was indirect. Individuals could not
argue for their rights under the ECHR in the courts of the UK.72 Those who need to claim a right
under ECHR must bring the case to the ECtHR.73 The HRA partially incorporated the ECHR into the
The HRA requires primary legislation and subordinate legislation of the UK to be interpreted as
possible as compatible with ECHR rights.75 Also, the HRA requires UK courts to consider the legal
authority of “judgment, decision, declaration or advisory opinion” of the ECtHR.76 However, HRA
does not empower courts to invalidate a domestic law in conflict with the ECHR.77 A court may
declarations do not affect the validity and enforcement of the disputed domestic law.79 The
declaration serves to facilitate legislative consideration to revise the law to remove the
incompatibility.80
Through the HRA, the privacy rights under ECHR are incorporated into UK law.81 However, the
courts still do not see there is a tort of invasion of privacy.82 In Wainwright v Home Office, the
plaintiff sought damages for strip search that she and her son had endured during a visit to prison.
Her counsel argued that Article 8 of ECHR would require the extension of the law of tort to giving
remedies for “any kind of distress caused by an infringement of the right of privacy.”83 The court
rejected this argument for two main reasons. First, the judge warned against the “high-level
72
   Palmer (n 58) 125.
73
   ibid 126.
74
   ibid 128.
75
   Human Rights Act 1998 s 3.
76
   ibid 2.
77
   European Convention on Human Rights s 4.
78
   ibid.
79
   ibid.
80
   Krotoszynski (n 2) 124.
81
   ibid 141.
82
   Wainwright v Home Office [2004] 2 AC 406 [35].
83
   ibid 11.
                                                    14 / 48
generalisation” of the right of privacy as the idea of “invasion of privacy” had to be broken down
into many “loosely-linked torts” in the US.84 English law is unwilling to formulate high-level
principles like privacy in fear of introducing uncertainty into the law.85 Second, the jurisprudence of
the ECtHR does not show that a state party must introduce “some high level principle of privacy” to
comply with Article 8 of the EHCR.86 The court argued that the “adequate remedy” exists in English
law in specific cases for the violation of the rights guaranteed under Article 8(1) of the ECHR.87
Moreover, the Wainwright case and the HRA concern public authorities’ obligations.88 If a general
privacy tort were created, the tort would be applicable to infringements by private individuals.89
Despite the non-recognition of a general privacy tort, HRA aided the development of “a tort of
misuse of private information” and “reasonable expectation of privacy”.90 In the landmark case of
Campbell v MGN Limited, a model successfully sought damages for Daily Mirror’s publication of
photos of her receiving treatment for narcotic addiction.91 The court expanded the breach of
confidence, without relying so much on the relationship between the subject and the publisher92, to
Surveillance
Surveillance is defined as the collection of data for the purpose of exerting control.94 The wish “to
control the thoughts, behaviours and actions” of other people can be traced to “the dawn of
humanity”.95 Surveillance is often misunderstood as “new”.96 There are “high-tech” as well as “low-
84
   ibid 18.
85
   ibid 27.
86
   ibid 32.
87
   ibid.
88
   ibid 34.
89
   ibid.
90
   Krotoszynski (n 2) 128.
91
   Campbell v MGN Ltd (No 2) [2005] 1 WLR 3394, 3395.
92
   Campbell v MGN Ltd [2004] 2 AC 457 [147].
93
   ibid 166.
94
   Kees Boersma and others, Histories of State Surveillance in Europe and Beyond (Routledge 2014) 2.
95
   Marie D Jones and Larry Flaxman, Mind Wars: A History of Mind Control, Surveillance, and Social Engineering
by the Government, Media, and Secret Societies (Red Wheel/Weiser 2015) 17.
96
   Boersma and others (n 94) 33.
                                                   15 / 48
tech” means to achieve surveillance.97 In the past, governments did not have the means to
“penetrate into citizens’ private lives very deeply”.98 Technological development is closely linked to
Alan Westin identified three forms of surveillance conducted by public authorities: physical,
psychological and data.100 Physical and psychological surveillance methods are active approaches.
Deploying active watchers are expensive and can only apply to a limited number of targets.101 On
the other hand, data surveillance is a passive approach but is very scalable. Accumulating data
about individuals may inform watchers of many things about those individuals.
In the early 20th century, British companies controlled telecommunication infrastructures in many
parts of the world.102 These companies gave the British government access to the communications
transmitted on their cables to gain intelligence and exercise censorship for the protection of the
interests of the British Empire.103 Today, the UK government openly acknowledges that the
intelligence agencies to fight crimes and protect national security in the UK.104
As technology advances, people’s lives are going digital. This development also means an
unprecedented chance for governments to monitor the lives of the population at greater depth.
Some of the governments’ technical capabilities to intrude into the private lives of the people have
raised serious concern. In 2013, former US National Security Agency (NSA) contractor Edward
Snowden revealed a series of documents about the surveillance capabilities of the US and UK
97
   ibid 35.
98
   ibid 4.
99
   ibid.
100
    Ian J Lloyd, Information Technology Law (Oxford University Press 2017) 19.
101
    ibid.
102
    Gordon Corera, Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage (Pegasus
Books 2016) 202.
103
    ibid.
104
    The Home Department, ‘INTERCEPTION OF COMMUNICATIONS IN THE UNITED KINGDOM - A
CONSULTATION PAPER’ (1999) 1.
                                                    16 / 48
governments.105 The Guardian - the newspaper that worked with Snowden to disclose the NSA
materials - reported that the Government Communications Headquarters (GCHQ) “tapped into”
more than 200 Internet fibre-optic cables in the UK to collect “recordings of phone calls, the content
of email messages, entries on Facebook and the history of any internet user's access to websites” in
an operation codenamed “Tempora”.106 The GCHQ used “innovative” technology to store a very
high volume of data syphoned from the cables for up to 30 days for analysis. The “PRISM” system
of the US gave the NSA access to the servers of popular US-based online service providers, namely,
Google, Apple, Facebook, Skype and Microsoft.107 The NSA could use PRISM to search stored
communications and intercept real-time communications. The Guardian reported that the GCHQ
also had access to the US’ PRISM system since 2010 and had obtained intelligence materials through
that system.108 The Guardian immediately raised concern that “PRISM would […] allow GCHQ to
circumvent the formal legal process [in the UK] required to seek personal material from an internet
company […]”.109
105
    Ewen MacAskill and Gabriel Dance, ‘NSA Files: Decoded’ The Guardian (2013)
<https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-
decoded>.
106
    Ewen MacAskill and others, ‘GCHQ Taps Fibre-Optic Cables for Secret Access to World’s Communications’
The Guardian (21 June 2013) <https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-
communications-nsa>.
107
    The Guardian, ‘NSA Prism Program Slides’ The Guardian (1 November 2013)
<https://www.theguardian.com/world/interactive/2013/nov/01/prism-slides-nsa-document>.
108
    Nick Hopkins, ‘UK Gathering Secret Intelligence via Covert NSA Operation’ The Guardian (7 June 2013)
<https://www.theguardian.com/technology/2013/jun/07/uk-gathering-secret-intelligence-nsa-prism>.
109
    ibid.
                                                  17 / 48
European Convention on Human Rights and State Surveillance
Since the late 1970s, the European Court of Human Rights (ECtHR) has dealt with cases in which
state surveillance measures – whether administrative or legislative – are challenged for breach of
Article 8 of European Convention for the Protection of Human Rights and Fundamental (ECHR). The
right set forth in Article 8 of ECHR is not absolute. Public authorities may interfere with one’s
exercise of Article 8 right in certain exceptional circumstances. Paragraph 2 of Article 8 of the ECHR
“in accordance with the law and is necessary in a democratic society in the interests of
national security;
Klass v Germany is a landmark case on state surveillance decided by ECtHR in 1978. The ECtHR
addressed some important questions about state surveillance in relation to Article 8 of ECHR.110
Paragraph 1 of Article 1 of the German Act of 13 August 1968 on Restrictions on the Secrecy of the
Mail, Post and Telecommunications111 (also referred to as “G-10”) provided that public authorities
were entitled to open the mail, post and telecommunications to safeguard against “imminent
dangers” threatening “the free and democratic constitutional order or the existence or security of”
the Federal Republic of Germany. Paragraph 5 of the same article provided that “the person
110
    Ilina Georgieva, ‘The Right to Privacy under Fire Foreign Surveillance under the NSA and the GCHQ and Its
Compatibility with Art. 17 ICCPR and Art. 8 ECHR’ (2015) 31 Utrecht J Intl & Eur L 104, 116.
111
    Gesetz zur Beschränkung des Brief-, Post- und Fernmeldegeheimnisses (Gesetz zu Artikel 10 Grundgesetz)
(G 10) Vom 13. August 1968.
                                                    18 / 48
concerned is not to be informed about restrictive measures”112. Five German lawyers complained
without notifying the persons affected was against Articles 6, 8 and 13 of ECHR.
The German government contested that the applicants, who were lawyers themselves, were not
“victims” within the meaning of Article 25 of the ECHR of 1950 because they had not established “an
individual violation”.113 The German government insisted that no surveillance measure under the
impugned law had been applied on the applicants.114 However, both the EComHR and the ECtHR
accepted that the applicants were “victims” in the context of “secret measures”.115 The character of
secret measures made it impossible for individuals to prove the existence of such measures.116 The
decision on victimhood is important because, in principle, the ECtHR does not accept actio popularis
litigation117. Generally speaking, individuals cannot claim to be victims of violation of ECHR rights by
virtue of “the mere existence of a law”.118 This decision made it possible for individuals to challenge
the “the mere existence of secret measures” or “legislation permitting secret measures” before the
ECtHR.119
Despite the applicants’ allegation of violation of multiple ECHR articles, the ECtHR considered that
Article 8 was central in this case.120 The ECtHR recognised that the surveillance measures permitted
by G-10 amounted to an interference with an individual’s right to “respect for private life” and
“[respect for] correspondence” in paragraph 1 of Article 8 of the ECHR.121 Then, the ECtHR
112
    “über Beschränkungsmaßnahmen ist der Betroffene nicht zu unterrichten”
113
    Klass and others v Germany (1979-80) 2 EHRR 214 [30].
114
    ibid 37.
115
    ibid 34.
116
    ibid.
117
    Council of Europe, ‘National Security and European Case-Law’ (2013) para 8.
118
    Klass and others v Germany (n 113) para 33.
119
    ibid 34.
120
    ibid 35.
121
    ibid 41.
                                                   19 / 48
considered whether the interference was justified on the grounds provided by Article 8(2).122 Firstly,
the ECtHR observed that G-10 fulfilled the “in accordance with the law” requirement as it had been
enacted by the German parliament. Secondly, the ECtHR found that the aim of G-10 was to
“safeguard national security and/or to prevent disorder”.123 Thirdly, the ECtHR observed that states
may have to resort to secret surveillance to effectively counter the threats posed to “democratic
societies” by “highly sophisticated forms of espionage and by terrorism”.124 “The means” provided
by G-10 were “within the bounds of what is necessary in a democratic society”.125 Fourthly, the
ECtHR stressed that a state’s discretion to subject an individual to secret surveillance is not
The ECtHR recognised the dangers inherent in state surveillance. 128 A law made on the ground of
defending democracy may end up “undermining or even destroying democracy”.129 Therefore, the
ECtHR had to examine whether the G-10 had sufficient safeguards against abuse. The G-10 laid
down a procedure for an authority to apply for secret surveillance orders with the approval of
officials of higher ranks.130 Also, an order would only be approved in limited circumstances such as
investigations into “serious criminal acts” or other investigative methods “without prospects of
success”.131 Despite the exclusion of the judiciary organ from the process, officials “qualified for
judicial office” would do the “initial control”.132 The bodies tasked with subsequent control and
122
    ibid 42.
123
    ibid 46.
124
    ibid 48.
125
    ibid 46.
126
    ibid 49.
127
    ibid 50.
128
    ibid 49.
129
    ibid.
130
    ibid 51.
131
    ibid.
132
    ibid 52.
133
    ibid 53.
                                                 20 / 48
The ECtHR admitted that the possibility of abuse by dishonest officials could not be eliminated
entirely. The purpose of ECtHR was to review the likelihood of abuse and the safeguards against
such abuse.134
The ECtHR recalled that it was the affordance of the social background that enabled the states to
provide protection of human rights through the conclusion and ratification of the ECHR, as in the
“Belgian Linguistic” case.135 The protection of individual rights relied on not only the contracting
states’ will but also the “social and technical developments in our age” that offered “possibilities for
regulating the exercise of these rights”.136 The ECtHR saw that the ECHR “implies a just balance”
between the respect for fundamental human rights and “the general interest of the Community”.137
So, there is a need to strike a balance between individual rights and the interest of a democratic
society.138
The ECtHR agreed with the German government that subsequent notification to the persons under
surveillance is unnecessary if the notification would jeopardise the “efficacy” and “long-term
The ECtHR found interference with the people’s right under Article 8(1) of the EHCR caused by G-10
fell within the exceptions of “in accordance with the law and [being] necessary in a democratic
society in the interests of national security” in Article 8(2) of the ECHR. 140 The ECtHR found no
134
    ibid 59.
135
    ‘RELATING TO CERTAIN ASPECTS OF THE LAWS ON THE USE OF LANGUAGES IN EDUCATION IN BELGIUM’ v
BELGIUM (1968) 1 EHRR 252 [5].
136
    ibid.
137
    ibid.
138
    Klass and others v Germany (n 113) para 59.
139
    ibid 58.
140
    ibid 43, 60.
141
    ibid 60.
                                                 21 / 48
The ECtHR settled some important questions about state surveillance in relation to the ECHR.
Firstly, the “mere existence of legislation” that presents a “menace of surveillance” affecting users’
free interaction using communication services constitutes an interference with the right to “private
life” and “correspondence” in Article 8(1) of ECHR.142 Secondly, measures of secret surveillance
carried out states to protect democratic societies fall under exceptional conditions of “necessary in a
democratic society in the interests of national security” and “for the prevention of disorder or
crime” in Article 8(2) of ECHR.143 Thirdly, for a state surveillance regime to comply with Article 8(2)
The UK government’s practice of opening postal correspondence for inspection has been publicly
known “from early times”.146 The origin of such authority is “obscure”.147 By the 1980s, there had
not been clear statutory provisions in the UK law governing the interception of postal and telephone
communications.148 To intercept communications, the police would have to apply for a warrant
issued by the Home Department. However, the procedure is “a practice” prevailed at the time
rather than expressly codified in law.149 The interception of the content of telephone calls by the
British police for the purpose of criminal investigation was challenged before the ECtHR in the case
of Malone v UK. 150 The applicant, who was a defendant in a criminal case, noticed that the details
of one of his telephone calls had appeared in the notebook of the police officer in charge of the
142
    Georgieva (n 110) 116; Klass and others v Germany (n 113) para 37.
143
    Klass and others v Germany (n 113) para 48.
144
    ibid 50.
145
    ibid 68.
146
    Malone v the United Kingdom (1991) 13 EHRR 448 [24].
147
    ibid.
148
    ibid 20.
149
    ibid 24; ibid 73.
150
    Malone v the United Kingdom (n 146) para 13.
                                                   22 / 48
investigation.151 The police had obtained a warrant for the interception of the applicant’s phone
calls.152
The UK government argued that the executive power to intercept communications was vested in
section 80 of Post Office Act 1969 (POA 1969) which imposed an obligation on the Post Office. The
“A requirement to […] inform designated persons holding office under the Crown concerning
Moreover, section 58 (1) of the Post Office Act 1953 (POA 1953), which was still in force, provided
that Post Office workers who delay or detain postal package would commit a criminal offence unless
At the time POA 1969 was passed, the Post Office was a governmental body providing postal and
telecommunication services.154 Later, in the early 1980s, through the British Telecommunications
Act 1981, the Post Office was detached from the government and was divided into two separate
entities responsible for mail and telecommunication services respectively.155 The British
Telecommunications Act 1981 did not alter the effect of provisions of POA 1969 concerning
interceptions.156
On the matter of the government’s use of executive power to intercept communications, the UK
Parliament published a “report” with some recommendations on the procedures in 1957. The then
government “accepted” the recommendations and made some change to the procedure.157
151
    ibid 14.
152
    ibid.
153
    ibid 25.
154
    ibid 23.
155
    ibid.
156
    ibid.
157
    ibid 21.
                                                   23 / 48
The notion of “law”
The ECtHR examined whether the interference was “in accordance with the law” and “necessary in a
democratic law” under Article 8(2) of ECHR. The ECtHR discussed the notion of “law”. The ECtHR
recalled its judgement in Sunday Times v the UK in which the word “law” in “prescribed by law”
“covers not only statute [law] but also unwritten law”.158 The drafters of ECHR did not intend to
exclude the rules created under English common law from the idea of “law” in the clause
“prescribed by law”.159
The expression “prescribed by law” exists in Articles 9(2), 10(2) and 11(2) of the ECHR. The exact
expression in Article 8(2) is “in accordance with the law” but not “prescribed by law”. The ECtHR
noted that the expressions of “in accordance with the law” and “prescribed by law” in the English
text shared the same expression “prévues par la loi” in the French text of ECHR.160 Since English and
French texts are equally authentic, the ECtHR must adopt an interpretation which reconciles “as far
as possible” to achieve the object of the ECHR.161 So, the interpretation of the word “law” in
“prescribed by law” in other articles of ECHR also applies to “in accordance with the law” in Article
8(2) of ECHR.162
In Sunday Times v the UK, the ECtHR listed two requirements for the expression “prescribed by law”
163
      as follows.
“Firstly, the law must be adequately accessible: the citizen must be able to have an
[adequate] indication [of] […] the legal rules applicable to a given case.
158
    The Sunday Times v the United Kingdom (1979-80) 2 EHRR 245 [47]; Malone v the United Kingdom (n 146)
para 66.
159
    The Sunday Times v the United Kingdom (n 158) para 47.
160
    ibid 48.
161
    ibid.
162
    Malone v the United Kingdom (n 146) para 66.
163
    The Sunday Times v the United Kingdom (n 158) para 49.
                                                    24 / 48
        Secondly, a norm cannot be regarded as a "law" unless it is formulated with sufficient
precision to enable the citizen to regulate his conduct […] to foresee […] the consequences
The ECtHR nonetheless recognised that “absolute certainty” about consequences is “unattainable”
as “excessive rigidity” of the law would hold the law back from adapting to “changing
The ECtHR accepted that there was legal basis for “the settled practice” of intercepting of postal and
Foreseeability of law
The ECtHR emphasised that the purpose of intercepting communications is not to control the
conduct of individuals.166 In the special contest of secret surveillance, the foreseeability of law
should not enable individuals to change their conduct to frustrate police investigation efforts.167 The
ECtHR examined whether the domestic law on interception of communication had “reasonable
precision in accessible legal rules” that define the scope of the discretionary power granted to the
authorities.168
There were two questions about the “precision”. First, the ECtHR wanted to ascertain whether
interception of communications by the Post Office for the police could only be done through a
warrant.169 The applicant contended that the use of word “requirement” in section 80 of POA 1969
meant that the Post Office might also intercept mail and telephone calls voluntarily for the police in
the absence of a warrant.170 The applicant argued that “a requirement” did not in itself make
164
    ibid.
165
    Malone v the United Kingdom (n 146) para 69.
166
    ibid 67.
167
    ibid.
168
    ibid 70.
169
    ibid.
170
    ibid 71.
                                                   25 / 48
warrantless interception “illegal”.171 However, the ECtHR agreed with the UK government that the
criminal offence created in section 58 (1) of the POA 1953 for detaining or delaying a mail parcel
effectively made warrantless interception illegal.172 Second, the ECtHR wanted to know under what
circumstances a warrant might be issued and executed.173 The UK government submitted that a
warrant issued pursuant to section 80 of POA 1969 must be addressed to the Post Office and must
contain the name, the address, the telephone number and a time-limit for the interception.174 A
warrant would only be issued if the alleged offence was “really serious”.175 Also, the UK government
argued that detailed procedures governing interception of communications were in place.176 The
public had access to the procedures through the reports published by the UK parliament.177
The ECtHR observed that the arrangements for the issue of warrants are largely “administrative
practice”. The “purpose and manner” of interception were “matters of administrative discretion”
without any statutory restriction on them.178 The ECtHR pointed out a piece of evidence suggesting
that the UK government knowingly kept these arrangements not incorporate in legislation.179 The
ECtHR observed that the procedures concerning interception of communications were “obscure”
and open to varied interceptions.180 Nonetheless, the ECtHR challenged the concept of “serious
crime” for the purpose of issuing an interception warrant. The scope of “serious crime” was
expanded since the passage of POA 1969 without going through the UK parliament.181
171
    ibid.
172
    ibid.
173
    ibid 70.
174
    ibid 73.
175
    ibid 42.
176
    ibid 79.
177
    ibid.
178
    ibid 75.
179
    ibid 78.
180
    ibid 79.
181
    ibid 76.
                                                26 / 48
Illegality of interception of communications as an administrative practice
The ECtHR concluded that the practice of intercepting communications by the UK government and
the release of metering data to the police were not “in accordance with law” under Article 8(2) of
ECHR. Surveillance procedures that primarily rest on administrative practice without limit set by the
law are incompatible with ECHR. Since secret surveillance measures are hidden from the sight of
individuals in question or the public, the law that grants “unfettered power” to the executive would
“Metering data”
The ECtHR also discussed the surveillance practice known as “metering”. “Metering” refers to the
use of devices to record the telephone numbers dialled and the times and durations of telephone
calls but not including the content of the conversations.183 The ECtHR considered that “metering is
[…] distinguished from the interception of communications”.184 However, the ECtHR saw that the
disclosure of data obtained from metering by the service providers to the authorities would
constitute an interference with Article 8 right.185 Although the police did not have the power to
compel Post Office to provide such data, in practice, the Post Office “voluntarily” provided metering
The “distinction” between acquisition of metering data and interception of communications implied
that metering data would not need the same level of safeguards as those for communications.187
However, control of the release of metering data should be put in place to comply with Article 8 of
ECHR.188
182
    ibid 68.
183
    ibid 83.
184
    ibid 33.
185
    ibid 84.
186
    ibid 87.
187
    Ian J Lloyd, ‘The Interception of Communications Act 1985’ (1986) 49 The Modern L Rev 86, 92.
188
    ibid.
                                                   27 / 48
Weber v Germany – Bulk Interception of Communications
Untargeted monitoring
The new version of the G-10 law was challenged again before ECtHR in the case of Weber v
Germany. The G-10 law was amended189 by Federal Law of 28 October 1984 on Fight Against Crime
telephone calls.191 The applicants complained that the amend G-10 law violated Article 8 of the
ECHR.192 They alleged that the amended G-10 law would entitle the German intelligence service to
“monitor all telecommunications within its reach without any reason or previous suspicion”.193 The
applicants also pointed out that the technical advancement, in particular, the “automatic
surveillance” technology, had made it possible for the authorities to identify the persons on
The ECtHR recognised that monitoring the phone calls of persons without prior suspicion constituted
“a fairly serious interference” with ECHR Article 8(1) right.195 However, the ECtHR noted the
purposes of the data obtained through strategic monitoring were the prevention and prosecution of
“serious criminal offences” enumerated in section 3(3) of the amended G-10 law.196 The ECtHR was
189
    Weber and Saravia v Germany (2008) 46 EHRR SE5 [18].
190
    Vera Rusinova, ‘A EUROPEAN PERSPECTIVE ON PRIVACY AND MASS SURVEILLANCE AT THE CROSSROADS’
[2019] National Research University Higher School of Economics Working Papers 3.
191
    Weber and Saravia v Germany (n 189) para 32.
192
    ibid 63.
193
    ibid 111.
194
    ibid.
195
    ibid 125.
196
    ibid 126.
197
    ibid.
                                                28 / 48
Margin of appreciation in national security matters
The ECtHR recognised that the contracting states have a “fairly wide margin of appreciation” in
deciding the means to protect the interests of national security.198 Nonetheless, as similar as in Klass
v Germany, the ECtHR was satisfied that strategic monitoring measures had adequate safeguards
against abuse and thus fulfilled the exception of being “necessary in a democratic society in the
interests of national security and/or for the prevention of disorder or crime” in Article 8(2) of
ECHR.199 The ECtHR dismissed the complaint about a breach of the applicants’ Article 8 right for
Weber v Germany is another important case in the jurisprudence of ECtHR on state surveillance.
The “in accordance with the law” requirement concerns not only “some basis in domestic law” but
also “the quality of the law”.201 Due to the dangers of secret surveillance, it would be against the
rule of law for a piece of legislation granting “unfettered power” to the executive to carry out
surveillance.202 The scope of the discretionary that the executive may exercise must be written with
“sufficient clarity” in the law to protect individuals against arbitrary interference.203 The ECtHR
consolidated the requirements for the minimum safeguards against the abuse which should be laid
“the nature of the offences which may give rise to an interception order;
the procedure to be followed for examining, using and storing the data obtained;
198
    ibid 106.
199
    ibid 137.
200
    ibid 138.
201
    ibid 84.
202
    ibid 94.
203
    ibid.
204
    ibid 95.
                                                 29 / 48
        the precautions to be taken when communicating the data to other parties; and
the circumstances in which recordings may or must be erased or the tapes destroyed”
In the case of Roman Zakharov v Russia, although Russian law ostensibly had detailed procedures
governing interception of the communications, the ECtHR did not consider it compatible with ECHR
for the extent of discretionary power. Section 2 of Operational Search Activities Act of 12 August
1995 (OSAA) of Russia authorised the interception of communications by the authorities for fighting
crimes and obtaining information about activities “endangering the national, military, economic or
ecological security” of Russia.205 Section 64(2) of Communications Act of 7 July 2003 of Russia
imposed obligations on communication service providers to run their services using network
government.206 Also, service providers must keep any knowledge of the “tactics” used by law
enforcement agencies confidential.207 Order no. 70 - an order issued under section 64(2) - required
communication service providers in Russia to install equipment known as “the SORM” on their
networks.208 Through SORM, Russian law enforcement agencies could remotely specify interception
subjects, manage interceptions and collect the data.209 The order further required that the
interception and data transmission activities could be logged.210 According to Order no. 130,
communications service providers did not have to be informed of acts of government interceptions
and the relevant judicial orders.211 Moreover, the OSAA did not provide a format of interception
205
    Roman Zakharov v Russia (2016) 63 EHRR 17 [26].
206
    ibid 111.
207
    ibid.
208
    ibid 116.
209
    ibid.
210
    ibid 120.
211
    ibid 125; ibid 126.
                                                  30 / 48
orders. In practice, Russian courts could use the OSAA to approve orders to intercept
The applicant complained that the whole secret interception system, especially Order no.70 and the
SORM which gave the Russian authorities “direct and unrestricted access” to “all communications of
all users” 212, was in violation of Article 8 of ECHR. The applicant pointed out that Order no.70 “had
never been officially published” and thus “not accessible to the public”.213 The “no logging”
requirement made the actual surveillance activities obscure from review and supervision.214 In
addition, the applicant speculated that there had been rampant abuse of the secret surveillance
regime by Russian officials.215 The applicant submitted news reports of officials taking bribes to
carry out unauthorised interceptions for politicians and businesspersons as well as leaked transcripts
The ECtHR observed that the requirement of judicial authorisation might be easily circumvented in
practice because of Russian authorities’ direct access to the communication networks.217 The lack of
clarity of the law allowed for an expansive surveillance system.218 The ECtHR ruled that the Russian
surveillance regime did not constraint the interference to an extent “necessary in a democratic
212
    Roman Zakharov v Russia (n 205) para 169.
213
    ibid 180.
214
    ibid 203.
215
    ibid 197.
216
    ibid.
217
    ibid 302.
218
    ibid.
219
    ibid 304.
                                                31 / 48
United Kingdom (UK) Surveillance Regime
The development of the surveillance regime of the UK is closely related to the European Convention
on Human Rights (ECHR). Initially, despite judgement of the European Court of Human Rights
(ECtHR) in Malone v UK, the UK government insisted that the existing safeguards against abuse in
the form of administrative procedures would provide adequate protection of civil liberty.220
However, to avoid further litigation, through the enactment of Interception of Communications Act
1985 (ICA 1985), the UK government laid down the procedures of interception of communicates in
Scholars noted that the ICA 1985 was just a product of “a minimalist interpretation” of UK’s
obligations under ECHR.222 The existing administrative practices were just transposed into statute
Compared with the POA 1953, the prohibition on the basis of Section 58 (1) was narrower and
applied only to “postal packet” and Post Office workers [acting] “contrary to his duty”.
Section 2 of ICA 1985 listed the necessary conditions in which the Secretary of State might issue a
warrant authorising interception of communications. The subsections in section 2 of ICA 1985 are as
follows.
220
    Iain Cameron, ‘Telephone Tapping and the Interception of Communications Act 1985’ (1986) 37 N Ir L Q
126, 130.
221
    ibid.
222
    ibid 149.
223
    ibid.
                                                  32 / 48
        “(a) in the interests of national security;
(c) for the purpose of safeguarding the economic well-being of the United Kingdom.”
Cameron observed that the reference to “national security” in subsection (a) could be broadly
interpreted in British law.224 Conceptually, a specific arrangement of social, political and economic
powers could be seen as part of “the state”. Any intention and activity to change this arrangement
might be considered “a threat to the state”.225 Subsection (a) did not necessarily contemplate a
criminal conduct. Lawful acts like peaceful demonstrations and strikes might fall into the scope of
subsection (a).226 The security agency would lawfully obtain a warrant from the Secretary of State
to carry out secret surveillance on trade unions and political groups that advocated “radical political
or economic change of British society”.227 The “serious crime” referred to in subsection (b) was
defined as an offence punishable to an imprisonment of 3 years or more or organised crime with the
use of violence.228 The subsection (c) condition, which entails “the economic well-being of the [UK]”,
Section 3(1) of ICA 1985 provided the format of warrants for interception of communications. For
internal communications (as opposed to the concept of “external communications”), the name of
the subject under surveillance or a set of premises must be specified. For “external
communications” (meaning “communication[s] sent or received outside the British Islands”)230, the
specification of a named subject or an address is not required.231 The scope of warrants for external
224
    ibid 138.
225
    ibid 137.
226
    ibid 136.
227
    ibid 137.
228
    Interception of Communications Act 1985 s 10(3).
229
    ibid 2(4).
230
    ibid 10(1).
231
    ibid 3(2).
                                                   33 / 48
A warrant issued by the Secretary of State had an initial validity of two months.232 However, a
warrant might be renewed at any other time to extend its validity by one more month in the case of
serious crimes or by six more months in the case of national security or economic well-being of the
UK.233
The focus of ICA 1985 was on the content of telephone conversations. The ICA 1985 did not cover
the practice of “metering”234 although in Malone v the UK, the ECtHR said that the uncontrolled
release of metering data to the police was in breach of Article 8 of ECHR.235 According to the ECtHR,
the level of safeguard for metering data might not be the same as that for interception of
communications, however, some control would be required to comply with the ECHR.236 Metering
data had been known to be “as valuable as” the content of telephone conversations to the police.237
The ICA 1985 did not address the issue of metering data, except for the criminalisation of
Section 7 and ICA 1985 provided for the creation of a tribunal for people who “believe that
tribunal would not tell the applicant directly whether he or she was under surveillance.240 If there
existed a warrant related to the subject, the tribunal would investigate whether there were a
contravention of warrant requirements.241 The applicant would only be informed of either “no
contravention”242 or the existence of contravention with relevant orders made by the tribunal243.
The tribunal also had the power to quash a warrant, order the destruction of intercepted materials
232
    ibid 4(6)(a).
233
    ibid 4(6).
234
    Lloyd (n 187) 92.
235
    Malone v the United Kingdom (n 146) para 89.
236
    Lloyd (n 187) 92.
237
    ibid.
238
    Interception of Communications Act 1985 sch 2, s 45(1)(b).
239
    ibid 7(2).
240
    Cameron (n 220) 145.
241
    Interception of Communications Act 1985 s 7(3).
242
    ibid 7(7).
243
    ibid 7(6).
                                                    34 / 48
and order a payment of compensation to the applicant.244 For the supervision of the overall
implementation of ICA 1985, Section 8 of ICA 1985 required the appointment of a person who held
“high judicial office” as a commissioner to review the exercise of power to issue warrants by the
The creation of the tribunal is in part a response to the requirement of “effective remedy”
developed in the ECtHR case of Klass v Germany.245 The tribunal is formed of “five members [of]
barrister, advocate or solicitor of not less than ten years' standing”.246 However, the effectiveness of
the tribunal was in doubt because the materials that the tribunal had access to could not be
different from those presented to the Secretary of State during the application for the warrant.247
The tribunal might hardly come to a conclusion different that of the Secretary of State.248
Regulation Investigatory Powers Act 2000 – Obscure Power for Mass Surveillance
Act 2000 (RIPA 2000) - to replace ICA 1985.249 ICA 1985 was considered “outdated” for its limited
scope (not covering some means of surveillance like long-range microphones, infra-red cameras and
bugging devices250) and its failure to catch up with new communication technologies251.
RIPA 2000 preserved more or less the same set of procedures and requirements for the issue of
interception warrant, albeit with some subtle changes, of ICA 1985. Under RIPA 2000, the
grounds252 on which an interception warrant may be granted are identical to those specified in
244
    Cameron (n 220) s 7(5).
245
    ibid 147.
246
    Interception of Communications Act 1985 sch 1, s 1(1).
247
    Cameron (n 220) 146.
248
    ibid.
249
    Alan S Reid and Nicholas Ryder, ‘For Whose Eyes Only? A Critique of the United Kingdom’s Regulation of
Investigatory Powers Act 2000’ (2001) 10 Information & Communications Technology L 179, 179.
250
    Lloyd (n 187) 93.
251
    Reid and Ryder (n 249) 182.
252
    Regulation of Investigatory Powers Act 2000 s 5(3).
                                                   35 / 48
Section 2 of ICA 1985, except for a new provision253 on international mutual assistance in preventing
or detecting serious crimes. An important new element to RIPA 2000 is the introduction of a
proportionality requirement consistent with ECtHR jurisprudence.254 The Secretary of State had to
assess not only whether an interception would be necessary on the grounds specified but also
whether the interception would be proportionate to the objective of the warrant.255 Section 5(4) of
RIPA 2000 further provided that the Secretary of State had to consider also whether or not there
RIPA 2000 defined a category of data called “communications data” which consists of what was
known as “metering data” in Malone v UK. “Communications data” are not the content of
communications but “any traffic data comprised in or attached to a communication”256 such as the
origin, the destination, the time etc. Authorisation for acquisition of communications data was
much less restrictive than interception of communications. The Secretary of State had the power to
designate officers of the police authorities, customs and intelligence services to authorise other
people within the same public authority to request communications data from communication
service providers.257 Authorisations may be granted on a wider range of grounds, compared with
interception of communications, and even “for any purpose” specified by the Secretary of State in
an order.258 Some of the grounds expressly provided in section 22(2) of RIPA 2000 were public
safety, public health, collection of tax and prevention of death or injury in an emergency.
RIPA 2000 inherited the formats of interception warrants from ICA 1985. For the interception of
internal communications, the name of the person whose communications are to be intercepted or a
set of premises must be specified in a warrant on the basis of section 8(1) of RIPA 2000. The
warrants issued under section 8(1) were also known as “targeted warrant” or “section 8(1) warrant”
253
    ibid 5(3)(d).
254
    Cameron (n 220) 192.
255
    Reid and Ryder (n 249) s 5(2)(b).
256
    Regulation of Investigatory Powers Act 2000 s 21(4).
257
    ibid 25.
258
    ibid 22(2)(h).
                                                    36 / 48
in later legal challenges.259 To the contrary, for the interception of external communications260 or
warrant261 on the basis of section 8(4) of RIPA 2000. The warrants issued under section 8(4) were
also known as “untargeted warrant” or “section 8(1) warrant” in later legal challenges.262
A tribunal known as Investigatory Powers Tribunal (IPT) independent of the executive was created by
section 65 of RIPA 2000. The IPT succeeded the tribunals created by Schedule 7 of ICA 1985, Section
9 of the Intelligence Services Act 1994 and Security Service Act 1989.263 The IPT hears not only
complaints about suspected unlawful interception of communications264 but also complaints against
“any of the intelligence services”265. The IPT is also the “only appropriate tribunal” in the UK to
handle claims of violation of the ECHR in interception of communications and the conducts of the
intelligence services.266
Secretary of State has the power to issue a technical notice to service providers. A service provider
may refer the notice to the Technical Advisory Board, in which the industry is represented, to review
the technical requirements and the costs. The Secretary of State will make the final say on the
version of the notice or its withdrawal. The notice is enforceable in civil proceedings. The Secretary
of State would financial compensate the service providers for the work needed to comply with the
technical notices.
259
    Big Brother Watch and Others v the United Kingdom 58170/13 [2018] 9 WLUK 157 [61].
260
    Regulation of Investigatory Powers Act 2000 s 8(5).
261
    ibid 5(6)(b).
262
    Big Brother Watch and Others v the United Kingdom 58170/13 (n 259) para 61.
263
    Regulation of Investigatory Powers Act 2000 sch 5.
264
    ibid 65(5)(b).
265
    ibid 65(3)(a).
266
    ibid 65(2)(a).
                                                 37 / 48
The Liberty and Big Brother Watch Cases – Mass Surveillance Challenged
In the advent of the Internet, the boundary between “internal” and “external” communications is
blurred. It is not unusual for communications between any two persons in the UK to be routed
through the network infrastructure of other countries. The Europe Union (EU) law and EU-US
agreements on data protection have facilitated the flow of personal data between EU countries and
the US.267 UK users’ communications are not necessarily stored in the UK.
“Communications data” – also known as “metadata” 268 – now covers many more attributes of one’s
life than it was the time of the “metering data” about telephone calls in Malone v the UK. Gaze into
the communications data of an individual can reveal a lot about one’s “personality, habits and
condition”.269 Some scholars even argued that the “artificial distinction” between communications
Snowden revelations exposed the secret surveillance capabilities of the UK and US governments to
the public. The UK government was believed to have issued and continuously renewed untargeted
communications and communications data of the Internet traffic passing through the UK.271 The UK
government was reported to have acquired communications of individuals in the UK through the
In light of the surveillance capabilities revealed by Snowden, several UK civil society organisations
complained RIPA 2000 to the IPT for a breach of Article 8 of ECHR.273 The two types of warrants
267
    Commission, ‘Data Protection Rules as a Trust-Enabler in the EU and beyond – Taking Stock’ (2019)
COM(2019) 374 final.
268
    Big Brother Watch, ‘Briefing Note: Why Communications Data (Metadata) Matter’ (2014)
<https://www.bigbrotherwatch.org.uk/wp-content/uploads/2014/07/Communications-Data-Briefing.pdf>.
269
    ibid.
270
    Daragh Murray and Pete Fussey, ‘Bulk Surveillance in the Digital Age: Rethinking the Human Rights Law
Approach to Bulk Monitoring of Communications Data’ (2019) 52 Israel L Rev 31, 54.
271
    Sebastian Schweda, ‘UK Surveillance Under Judicial Scrutiny: GCHQ Intelligence Sharing with NSA
Contravened Human Rights, But Is Now Legal’ (2015) 1 Eur Data Protection L Rev 61, 66.
272
    Hopkins (n 108).
273
    Liberty v GCHQ [2015] 3 All ER 142 [2].
                                                   38 / 48
under RIPA 2000 – “targeted warrant” under section 8(1) and “untargeted warrant” under section
8(4) – were the focus.274 The UK government was supposed to have to apply for a targeted warrant,
pursuant to section 8(1) of RIPA 2000, to obtain the communications between the people living in
the British Islands. The UK might use untargeted warrant, pursuant to section 8(4) of RIPA 2000, to
acquire communications data and the communications to which a party is not in the British Islands.
The power of untargeted warrants can be worrying taking into account of the surveillance
capabilities of the UK and the US governments. Untargeted warrants are more flexible and can be
used to intercept a “substantial volume of communications”.275 Also, the materials provided to the
would suffice for the UK government to acquire and carry out any search.276 Concerns were raised
whether the UK government had circumvented the more restrictive requirements of targeted
The UK government insisted that it was “necessary” and “proportionate” for intelligence services to
acquire unanalysed data, which comprised of communications and communications data, from a
foreign government.278
The IPT held that section 8(4) of RIPA 2000 – the legal basis of untargeted warrant – had not
contravened Article 8 of ECHR.279 The IPT, in its judgement, revealed that the UK Secretary of State
had approved untargeted interception warrants to request “the assistance of [a] foreign
government” to obtain the communications where it was not “technically feasible” to obtain the
communications using a targeted warrant in the UK.280 The emails of one of the UK-based NGO
274
    ibid 65.
275
    ibid 70.
276
    ibid 145.
277
    ibid 5.
278
    ibid 47.
279
    ibid 161.
280
    ibid 47.
                                               39 / 48
warrant.281 The IPT considered the interception lawful. It was disclosed to Amnesty International
only because the UK government failed to follow the procedure to destruct the data at the end of
the retention period.282 The IPT concluded that section 8(1) and 8(4) of RIPA 2000 had “sufficient
The claimants brought the case to the ECtHR. The Section I Chamber of ECtHR consolidated similar
applications in one case known as Big Brother Watch v the UK. Concerning the bulk interception of
“external” communications on the basis of section 8(4) of RIPA 2000, the UK government recognised
that the scope of “external communications” is wide to an extent which emails, social media posts
and any file stored on overseas servers fall into its scope.283 The applicants claimed that anyone
could be implicated with the untargeted warrant because of the blurred boundary of internal and
British Islands, his or her name, email address and other personal identifiers might not be used as a
criterion to search the materials acquired using an untargeted warrant.285 The UK government
insisted that bulk interception of communications enabled by section 8(4) of RIPA 2000 had an
important role in the protection of the national security of the UK from terrorism.286
The ECtHR examined the format of untargeted warrants. A warrant on the basis of section 8(4) of
Details of the persons who may […] modify the […] warrant in an urgent case […]”
281
    Liberty v Secretary of State for Foreign and Commonwealth Affairs [2015] 3 All ER 212 [14].
282
    ibid.
283
    Big Brother Watch and Others v the United Kingdom 58170/13 (n 259) 71.
284
    ibid 275.
285
    ibid 86.
286
    ibid 282.
287
    Home Office, ‘Interception of Communications Code of Practice’ (2016) para 6.18.
                                                    40 / 48
The ECtHR observed that the search criteria were not required to be specified in a warrant and could
be chosen without oversight.288 Compared with Weber v Germany, the G-10 law required prior
approval of the list of “catchwords” devised for the purpose of strategic monitoring.289 Bulk
However, as in the cases of Roman Zakharov v Russian and Malone v the UK, in the context of secret
surveillance, the law must provide foreseeability and sufficient clarity on the discretion conferred on
the authorities.291 The ECtHR considered that if bulk interception is not “significantly curtailed” by
the conditions set out in a warrant, the stage of selection of data for examination should
“necessarily be more robust”.292 ECtHR concluded that section 8(4) of RIPA 2000 was not
“sufficiently robust to provide adequate guarantees against abuse” because “the selectors” were
The ECtHR reiterated that the breadth of discretion that the state can exercise to carry out secret
surveillance should be discernible from legislation.294 Section 8(4) of RIPA did not meet this test as in
the case of Roman Zakharov v Russian. The ECtHR ruled that the interference caused by the section
8(4) of RIPA did not meet the “necessity” requirement as in “necessary in a democratic society” and
“foreseeability” as in “in accordance with the law” under Article 8(2) of ECHR.
On the issue of communications data, the ECtHR agreed that communications data in bulk would
reveal “an intimate picture” of an individual by showing his or her social connections, locations and
Internet browsing history.295 The ECtHR also concluded that RIPA 2000 had no “real safeguard” in
288
    Big Brother Watch and Others v the United Kingdom 58170/13 (n 259) para 227.
289
    Weber and Saravia v Germany (n 189) para 32.
290
    Big Brother Watch and Others v the United Kingdom 58170/13 (n 259) para 314.
291
    ibid 306.
292
    ibid 346.
293
    ibid 347.
294
    ibid 315.
295
    ibid 356.
                                                  41 / 48
Concerning the alleged circumvention of domestic law on interception of communications by
obtaining data from a foreign county, the ECtHR recognised that the act of interception per se could
not be attributed to the UK under international law.296 However, the ECtHR considered that the
“Weber safeguards” developed in Weber v Germany should also apply to the acquisition of
interception materials from a foreign government in the same way as they were intercepted using
UK’s “own techniques”.297 Otherwise, state parties to the ECHR could circumvent their obligations
under ECHR by obtaining intelligence materials from a non-contracting state.298 The ECtHR was
satisfied that the UK had put in place measures to subject materials obtained through the US to the
“internal rules” as the communications were intercepted by the UK.299 The ECtHR concluded that
the UK practice of using materials from a foreign country did not violated Article 8 of ECHR.300 At the
time of writing, the Big Brother Watch case was referred to the Grand Chamber of ECtHR.301 The
Regulation Investigatory Powers Act 2016 (RIPA 2016) – “Legal footing” to Mass
Surveillance
While the Section I Chamber of ECtHR was still considering the Big Brother Watch case, the UK
government enacted RIPA 2016. Section 136 of RIPA 2016 created the type of “bulk interception
warrants” for the interception of “overseas-related communications”. Scholars criticised that the
“bulk” warrants served the purpose of giving “legal footing” to the mass surveillance measures that
296
    ibid 420.
297
    ibid 423.
298
    ibid 424.
299
    ibid 432.
300
    ibid 447.
301
    Council of Europe, ‘Grand Chamber Hearing on Complaints about Surveillance Systems in the Case of Big
Brother Watch and Others v. the United Kingdom’ (10 July 2019).
302
    Burkhard Schafer, ‘Surveillance for the Masses: The Political and Legal Landscape of the UK Investigatory
Powers Bill’ (2016) 40 Datenschutz und Datensicherheit-DuD 592, 596.
                                                    42 / 48
The bulk interception warrants under section 136 of RIPA 2016, in essence, are not very different
from the untargeted warrants under section 8(4) of RIPA 2000. A notable change is that bulk
purpose” needs to be “specified in a greater level of detail” than “in the interests of national
security”, “preventing or detecting serious crime” and “the interests of the economic well-being of
The Secretary of State maintains a list of “operational purposes”305 which is shared to the
Intelligence and Security Committee of the Parliament306 and is reviewed by the Prime Minister307
annually. There is no publicly available information on the list of “operational purposes” yet.
However, it is reasonable to contemplate that a “purpose” one “level deeper” than “national
security” can still be written in a very broad and vague manner. Based on the condition that the list
is only reviewed once a year, each operational purpose should be relatively stable and broad.
Agents of the state may still have a considerably large degree of freedom to select what to intercept
and analyse for an “operational purpose”. The control of search selectors falls into the responsibility
RIPA 2016 does provide some new safeguards. For example, the activity of trade unions is expressly
excluded from the grounds for getting communications data.309 Confidential journalistic materials
interception of the communications of members of the Parliament requires the approval of the
Prime Minister.311
303
    Regulation of Investigatory Powers Act 2016 s 142.
304
    ibid 138.
305
    ibid 142(6).
306
    ibid 142(8).
307
    ibid 142(10).
308
    ibid 153(2).
309
    ibid 61(8).
310
    ibid 145.
311
    ibid 111(3).
                                                    43 / 48
Discussion and Conclusion
This dissertation covered the development of the right of privacy in the UK, select cases on state
surveillance decided by the ECtHR and the development of the UK law regulating states’ interception
of communications.
Under the ECHR, in the name of security, states have some power to interfere with the private lives
of the people. However, states do not have unfettered power to carry out secret surveillance due to
its inherent dangers. The ECtHR has developed a set of minimum safeguards to check whether state
surveillance falls within the exceptional cases in Article 8(2) of ECHR in its jurisprudence.
Surveillance law must provide clarity, foreseeability and adequate safeguards against abuse. The
minimum standard is evolving as the ECtHR handles complaints about the ever-changing state
The UK’s surveillance capabilities and practices are always a step ahead of the law. The UK
authorities adopt new practices that ostensibly fit into the framework of existing law but potentially
create a higher level of interference with people’s lives which may be hard to foresee in the law.
The ECtHR’s rulings influenced the UK government to introduce safeguards to and improve the
law revisions. A new law at its best served to consolidate, codify and clarify the existing surveillance
practices. There seemed to be a pattern that the UK government would “fix” some concerns raised
by the ECtHR, but, at the same time, legally strengthen, or even expand, the power to carry out
surveillance. The reluctance to introduce a general right to privacy in the UK may help explain why
ensuing compatibility with Article 8 of ECHR is not a priority in the UK legislation on state
surveillance. It is reasonable to speculate that there will be “no end” to the litigations challenging
the legality of the UK surveillance regime under the ECHR, as long as the HRA 1998 and the ECHR
                                                 44 / 48
Bibliography
International law
European Convention for the Protection of Human Rights and Fundamental Freedoms
UK legislation
Human Rights Act 1998
Intelligence Services Act 1994
Interception of Communications Act 1985
Regulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2016
Security Service Act 1989
German legislation
Gesetz zur Beschränkung des Brief-, Post- und Fernmeldegeheimnisses (Gesetz zu Artikel 10
    Grundgesetz) (G 10) Vom 13. August 1968
UK cases
Berd v Lovelace (1603) Cary 62, 21 ER 33
Campbell v MGN Ltd [2004] 2 AC 457
Campbell v MGN Ltd (No 2) [2005] 1 WLR 3394
Foster v The Bank of London (1862) 3 Foster and Finlason 214, 217; 176 ER 96, 98
Gartside v Outram (1857) 26 LJ Ch 113
                                              45 / 48
Greenlaw v King (1838) 1 Beavan 137, 145; 48 ER 891
Jones v Tapling (1862) 12 Common Bench Rep (New Series) 826, 845; 142 ER 1367, 1374
Liberty v GCHQ [2015] 3 All ER 142
Liberty v Secretary of State for Foreign and Commonwealth Affairs [2015] 3 All ER 212
Prince Albert v Strange 64 ER 293
Pringle v Bremner and Stirling (1867) 5 M (HL) 55
R v Griffin (1853) 6 Cox CC 219
R v Hay (1860) 2 Foster and Finlason 4, 9; 175 ER 933
Semayne’s Case 5 Coke Rep 91 a
Tipping v Clarke (1843) 2 Hare 383, 393; 67 ER 157, 161
Tolley Appellant v JS Fry and Sons, Limited Respondents [1931] AC 333 (House of Lords)
Wainwright v Home Office [2004] 2 AC 406
Walker v Brewster (1867-68) LR 5 Eq 25
UK Government reports
Home Office, ‘Interception of Communications Code of Practice’ (2016)
‘Report of the Committee on Privacy’
The Home Department, ‘INTERCEPTION OF COMMUNICATIONS IN THE UNITED KINGDOM - A
    CONSULTATION PAPER’ (1999)
Books
Boersma K and others, Histories of State Surveillance in Europe and Beyond (Routledge 2014)
Corera G, Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage (Pegasus
    Books 2016)
                                               46 / 48
Jones MD and Flaxman L, Mind Wars: A History of Mind Control, Surveillance, and Social Engineering
    by the Government, Media, and Secret Societies (Red Wheel/Weiser 2015)
Krotoszynski RJ, Privacy Revisited: A Global Perspective on the Right to Be Left Alone (Oxford
    University Press 2016)
Lloyd IJ, Information Technology Law (Oxford University Press 2017)
Pratt WF, Privacy in Britain (Bucknell University Press 1979)
Journal articles
Cameron I, ‘Telephone Tapping and the Interception of Communications Act 1985’ (1986) 37 N Ir L Q
   126
Georgieva I, ‘The Right to Privacy under Fire Foreign Surveillance under the NSA and the GCHQ and
    Its Compatibility with Art. 17 ICCPR and Art. 8 ECHR’ (2015) 31 Utrecht J Intl & Eur L 104
Lloyd IJ, ‘The Interception of Communications Act 1985’ (1986) 49 The Modern L Rev 86
Moreham N, ‘The Right to Respect for Private Life in the European Convention on Human Rights: A
   Re-Examination’ [2008] Eur Human Rights L Rev 20
Murray D and Fussey P, ‘Bulk Surveillance in the Digital Age: Rethinking the Human Rights Law
    Approach to Bulk Monitoring of Communications Data’ (2019) 52 Israel L Rev 31
Palmer S, ‘Human Rights Act 1998: Bringing Rights Home, The’ (1998) 1 CYELS 125
Reid AS and Ryder N, ‘For Whose Eyes Only? A Critique of the United Kingdom’s Regulation of
     Investigatory Powers Act 2000’ (2001) 10 Information & Communications Technology L 179
Rusinova V, ‘A EUROPEAN PERSPECTIVE ON PRIVACY AND MASS SURVEILLANCE AT THE
    CROSSROADS’ [2019] National Research University Higher School of Economics Working Papers
Schafer B, ‘Surveillance for the Masses: The Political and Legal Landscape of the UK Investigatory
    Powers Bill’ (2016) 40 Datenschutz und Datensicherheit-DuD 592
Schweda S, ‘UK Surveillance Under Judicial Scrutiny: GCHQ Intelligence Sharing with NSA
    Contravened Human Rights, But Is Now Legal’ (2015) 1 Eur Data Protection L Rev 61
Warren SD and Brandeis LD, ‘Right to Privacy’ (1890) 4 Harvard L Rev 193
News articles
Hopkins N, ‘UK Gathering Secret Intelligence via Covert NSA Operation’ The Guardian (7 June 2013)
    <https://www.theguardian.com/technology/2013/jun/07/uk-gathering-secret-intelligence-nsa-
    prism>
MacAskill E and others, ‘GCHQ Taps Fibre-Optic Cables for Secret Access to World’s
   Communications’ The Guardian (21 June 2013)
   <https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-
   nsa>
MacAskill E and Dance G, ‘NSA Files: Decoded’ The Guardian (2013)
   <https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-
   surveillance-revelations-decoded>
                                                47 / 48
The Guardian, ‘NSA Prism Program Slides’ The Guardian (1 November 2013)
    <https://www.theguardian.com/world/interactive/2013/nov/01/prism-slides-nsa-document>
Website
Big Brother Watch, ‘Briefing Note: Why Communications Data (Metadata) Matter’ (2014)
     <https://www.bigbrotherwatch.org.uk/wp-content/uploads/2014/07/Communications-Data-
     Briefing.pdf>
48 / 48