<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Cyber Solicitor: State Surveillance]]></title><description><![CDATA[Everything on State surveillance]]></description><link>https://www.thecybersolicitor.com/s/state-surveillance</link><image><url>https://substackcdn.com/image/fetch/$s_!T4HV!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png</url><title>The Cyber Solicitor: State Surveillance</title><link>https://www.thecybersolicitor.com/s/state-surveillance</link></image><generator>Substack</generator><lastBuildDate>Fri, 08 May 2026 16:00:41 GMT</lastBuildDate><atom:link href="https://www.thecybersolicitor.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Mahdi Assan]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thecybersolicitor@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thecybersolicitor@substack.com]]></itunes:email><itunes:name><![CDATA[Mahdi Assan]]></itunes:name></itunes:owner><itunes:author><![CDATA[Mahdi Assan]]></itunes:author><googleplay:owner><![CDATA[thecybersolicitor@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thecybersolicitor@substack.com]]></googleplay:email><googleplay:author><![CDATA[Mahdi Assan]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Acquisition of communications data under the IPA 2016 explained]]></title><description><![CDATA[How public authorities obtain communications data from companies in the UK]]></description><link>https://www.thecybersolicitor.com/p/acquisition-of-communications-data</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/acquisition-of-communications-data</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 16 May 2025 08:01:17 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d97b08f2-d583-449b-9694-4b5fa8c0bc30_1920x1082.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is about the acquisition of communications data by UK public authorities from telecommunications operators. It looks at the data that can be obtained under these authorisations, the procedure for obtaining these authorisations and the bulk version of this power.</p><p>Here are the key takeaways:</p><ul><li><p>Under the Investigatory Powers Act 2016, relevant public authorities can obtain authorisation for the acquisition of communications data from telecommunications operators. This includes the metadata of a communication rather than the content of communications, including internet connection records.</p></li><li><p>A wide range of public authorities in the UK can obtain authorisations to obtain communications data. This includes not just MI5, MI6 and GCHQ (the security and intelligence agencies), but also, among others, the police, the National Crime Agency, the Competitions and Markets Authority, the Financial Conduct Authority and the Office of Communications.</p></li><li><p>Data acquisition authorisations can be sought for the purposes of a specific investigation or a specific operation. The grounds on which authorisations may be granted include, among others, national security and preventing or detecting serious crime.</p></li><li><p>Once granted, a data acquisition authorisation can be served on a telecommunications operator. The authorisation must therefore specify the operator concerned and the nature of the requirements to be imposed.</p></li><li><p>Acquisition authorisations can also come in bulk form, of which is subject to the double lock mechanism. However, only the security and intelligence agencies can apply for these bulk acquisition warrants.</p></li></ul><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Solicitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>What are data acquisition authorisations?</h1><p>Under the Investigatory Powers Act 2016 (IPA 2016), relevant public authorities can obtain authorisation for the acquisition of communications data from telecommunications operators. Some authorisations can be obtained from certain personnel within a relevant public authority, whereas other authorisations require independent authorisation from the Investigatory Powers Commissioner (IPC). Acquisition authorisations can come in bulk form, of which is subject to the double lock mechanism, but only the SIAs can apply for these bulk acquisition warrants.</p><h1>Which public authorities can obtain data acquisition authorisations?</h1><p>Under the IPA 2016, a "relevant public authority" includes a wide range of public authorities in the UK. This includes not just MI5, MI6 and GCHQ (the security and intelligence agencies, or the SIAs), but also, among others, the police, the National Crime Agency, the Competitions and Markets Authority, the Financial Conduct Authority and the Office of Communications.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><h1>What is the procedure for obtaining data acquisition authorisations?</h1><p>The IPA 2016 requires public authorities to have a "designated senior officer" (DSO), which somebody with a certain rank, office or position who are involved in the procedure for obtaining data acquisition authorisations.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> The required rank, office or position depends on the public authority in question. For example, the minimum rank in GCHQ for authorising the acquisition of communications data is a G8 Officer.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p><p>The process for authorising the acquisition of communications data is as follows:</p><ul><li><p><em>The applicant</em> - A person within a public authority involved in an investigation or operation makes an application for the acquisition of communications data that would aid that investigation or operation. The application must be made in writing or in a manner that produces a record of its having been applied.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p></li><li><p><em>The single point of contact</em> - Applicants must consult a person within the relevant public authority who is acting as a single point of contact (SPoC) in relation to the making of applications.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a> DSOs must also consult SPoCs before granting an authorisation. These SPoCs are &#8220;trained to facilitate the lawful acquisition of communications data and effective cooperation between a public authority, the Office for Communications Data Authorisations and telecommunications operators&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a></p></li><li><p><em>The authorising individuals</em> - Authorisation for the acquisition of communications data may be obtained in one of three ways:</p><ul><li><p>Certain public authorities may only obtain authorisation from the IPC,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a> including local authorities.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a> These duties of the IPC are delegated, in accordance with the IPA 2016,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a> to their staff who sit in a body known as the Office for Communications Data Authorisations (OCDA).<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a> The requirement for independent authorisation depends on the grounds on which an application for data acquisition is made and which public authority is making the application. For example, if the Department of Health and Social Care is applying for a data acquisition authorisation in the interests of public safety,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a> independent authorisation from the OCDA will be required and the Department may obtain both entity data and events data. The OCDA will need to consider the necessity and proportionality of each application.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a></p></li><li><p>Authorisations can be made by a DSO within a relevant public authority where the acquisition data is requested on certain grounds.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-13" href="#footnote-13" target="_self">13</a> That DSO will have to consider the necessity and proportionality of the application.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-14" href="#footnote-14" target="_self">14</a></p></li><li><p>If the OCDA or a DSO has authorised the acquisition of communications data for the purpose of identifying or confirming a source of journalistic information, then the approval of a Judicial Commissioner is also required.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-15" href="#footnote-15" target="_self">15</a></p></li></ul></li></ul><h1>What data can be obtained under a data acquisition authorisation?</h1><p>Acquisition authorisations permit the collection of communications data. As explained in my post on retention notices under the IPA 2016:</p><blockquote><p>Retention notices can be used to obtain 'relevant communications data' from telecommunications operators.</p><p>"Communications data" effectively means the metadata of a communication. This includes information about things like the recipient, sender and timing of the communication. The IPA 2016 itself defines the specific pieces of metadata within the scope of communications data, namely entity data and events data:</p><ul><li><p>'Entity data' means data about an entity which could be a person or a thing.</p></li><li><p>'Events data' means any data identifying or describing an event on, in or by means of a telecommunication system where the event consists of one or more entities engaging in a specific activity at a specific time.</p></li></ul><p>Together, communications data means any data "generated, held or obtained in the provision, delivery and maintenance of communication services." This could include:</p><ul><li><p>Those involved in the communication (i.e., the sender and recipient)</p></li><li><p>When the communication was made</p></li><li><p>The duration of the communication</p></li><li><p>The type and method of communication</p></li><li><p>The telecommunication system used for the communication</p></li><li><p>The location of the telecommunication system</p></li></ul></blockquote><p>For acquisition authorisations, certain DSOs are only permitted to authorise the obtaining of entity data whereas other DSOs of a higher rank, office or position are permitted to authorise the obtaining of both entity and events data. For instance, an inspector within the Metropolitan police force may authorise the acquisition of entity data only, whereas a superintendent may authorise the acquisition of both entity and events data.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-16" href="#footnote-16" target="_self">16</a></p><p>Communications data also includes what the IPA 2016 defines as 'internet connection records', which also explained in my post on data retention notices:</p><blockquote><p>An internet connection record is a type of communications data that satisfies the following two conditions:</p><ul><li><p>It can be used to identify a communication that has been transmitted to a telecommunications service via a telecommunication system to obtain access to or run a computer file or program</p></li><li><p>It comprises data generated or processed by a telecommunications operator in the process of supplying the telecommunications service to the sender of the communication (whether or not a person)</p></li></ul><p>ICRs therefore consist of information that identifies an internet service that a person has been using. This could include a wide range of data, such as IP addresses or a customer account reference like an account number.</p><p>The websites a person has visited can also constitute an ICR. However, the definition of an ICR excludes certain elements of a person's web browsing history. For example, if a person visits '<a href="https://www.thecybersolicitor.com/s/state-surveillance'">https://www.thecybersolicitor.com/s/state-surveillance'</a>, the only part of this URL that would constitute 'communications data' for the purposes of the IPA 2016 includes the host name ('<a href="http://www.thecybersolicitor.com/">www.thecybersolicitor.com</a>). The remainder of the URL, namely the resource ('/s/state-surveillance') would be classed as the content of a communication under the Act and therefore not fall within the definition of an ICR.</p></blockquote><p>The IPA &#8220;recognises the additional sensitivities associated with ICRs and restricts public authority access accordingly&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-17" href="#footnote-17" target="_self">17</a> Accordingly, neither the OCDA nor a DSO can authorise the acquisition of communications data which is, or can be obtained by processing, an ICR.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-18" href="#footnote-18" target="_self">18</a> There are limited exceptions to this rule, which effectively pertain to when an ICR is used:</p><ul><li><p>To identify those who are using a service on the internet only where the service and the time of use are already known.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-19" href="#footnote-19" target="_self">19</a></p></li><li><p>To identify the internet communications service being used by a known person or apparatus, including when and how it is used.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-20" href="#footnote-20" target="_self">20</a></p></li><li><p>To identify the internet service being used, including when and how, by a known person or apparatus.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-21" href="#footnote-21" target="_self">21</a></p></li><li><p>Obtain access to, or run, a computer file or program by a known person or apparatus involving, wholly or mainly, the making available or acquisition of material the possession of which is a crime.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-22" href="#footnote-22" target="_self">22</a></p></li></ul><h1>On what grounds can a data acquisition authorisation be sought?</h1><p>Any acquisition authorisation can be sought if it necessary to obtain communicationa data for the purposes of:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-23" href="#footnote-23" target="_self">23</a></p><ul><li><p>A specific investigation or a specific operation</p></li><li><p>Testing, maintaining or developing equipment, systems or other capabilities relating to the availability or obtaining of communications data</p></li></ul><p>Either of those activities must be connected with one of the statutory grounds provided under the IPA 2016. The OCDA may authorise the acquisition of communications data on any of the following grounds:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-24" href="#footnote-24" target="_self">24</a></p><ul><li><p>In the interests of national security.</p></li><li><p>For the purpose of preventing or detecting serious crime (where the communications data is wholly or partly events data) or, in any other case, for the purpose of preventing or detecting crime or of preventing disorder.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-25" href="#footnote-25" target="_self">25</a> Serious crime is defined as a criminal offence that involves conduct entailing the use of violence, results in substantial financial gain or is conduct by a large number of persons in pursuit of a common purpose.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-26" href="#footnote-26" target="_self">26</a></p></li><li><p>In the interests of the economic well-being of the UK so far as those interests are also relevant to the interests of national security.</p></li><li><p>In the interests of public safety.</p></li><li><p>For the purposes of preventing death or injury or any damage to a person&#8217;s physical or mental health, or of mitigating any injury or damage to a person&#8217;s physical or mental health.</p></li><li><p>To assist investigations into alleged miscarriages of justice.</p></li><li><p>Where a person (P) has died or is unable to identify themselves because of a physical or mental condition, so as to assist in identifying P or to obtain information about P&#8217;s next of kin or other persons connected with P or about the reasons for P&#8217;s death or condition.</p></li></ul><p>DSOs may authorise the acquisition of communications data on a much narrower set of grounds:</p><ul><li><p>In the interests of national security.</p></li><li><p>For the purpose of preventing or detecting serious crime, i.e., a criminal offence that involves conduct entailing the use of violence, results in substantial financial gain or is conduct by a large number of persons in pursuit of a common purpose.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-27" href="#footnote-27" target="_self">27</a></p></li><li><p>In the interests of the economic well-being of the UK so far as those interests are also relevant to the interests of national security.</p></li></ul><p>However, the grounds on which an authorisation may be granted by a DSO are wider where an application is made by a public authority in an urgent case:</p><ul><li><p>For the purpose of preventing or detecting serious crime (where the communications data is wholly or partly events data) or, in any other case, for the purpose of preventing or detecting crime or of preventing disorder.33 Serious crime is defined as a criminal offence that involves conduct entailing the use of violence, results in substantial financial gain or is conduct by a large number of persons in pursuit of a common purpose.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-28" href="#footnote-28" target="_self">28</a></p></li><li><p>In the interests of public safety.</p></li><li><p>For the purposes of preventing death or injury or any damage to a person&#8217;s physical or mental health, or of mitigating any injury or damage to a person&#8217;s physical or mental health.</p></li><li><p>To assist investigations into alleged miscarriages of justice.</p></li><li><p>Where a person (P) has died or is unable to identify themselves because of a physical or mental condition, so as to assist in identifying P or to obtain information about P&#8217;s next of kin or other persons connected with P or about the reasons for P&#8217;s death or condition.</p></li></ul><p>The DSO may only grant an authorisation in urgent cases if it considers that it is necessary and proportionate and there is an urgent need to obtain the data.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-29" href="#footnote-29" target="_self">29</a> An example of an urgent case is where there is &#8220;an immediate threat of loss or serious harm to human life&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-30" href="#footnote-30" target="_self">30</a> However, that &#8220;any part of an investigation or operation is undertaken urgently must not be taken to mean that all requirements to obtain communications data in connection with that investigation of operation can be undertaken using the urgent process&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-31" href="#footnote-31" target="_self">31</a> Therefore, the application must make clear why it is not possible to use the standard process in the particular circumstances of the case.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-32" href="#footnote-32" target="_self">32</a></p><h1>What conduct can be permitted by a data acquisition authorisation?</h1><p>Under an acquisition authorisation, a public authority may engage in any conduct which is for the purpose of obtaining communications data from any person relating to a telecommunication system.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-33" href="#footnote-33" target="_self">33</a> In particular, that authorised conduct may include any of the following:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-34" href="#footnote-34" target="_self">34</a></p><ul><li><p>The authorised officer obtains the communications data themselves.</p></li><li><p>The authorised officer asks any person that the officer believes is, or may be, in possession of communications data or capable of obtaining it to obtain that data and disclose it to the public authority.</p></li><li><p>The authorised officer serves an acquisition notice on a telecommunications operator that the officer believes is, or may be, in possession of the communications data and is capable of obtaining that data and disclosing it to the public authority.</p></li></ul><p>In addition, an authorisation may:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-35" href="#footnote-35" target="_self">35</a></p><ul><li><p>Relate to data that may not exist at the time of the authorisation.</p></li><li><p>Authorise a person other than the authorised officer to obtain and disclose communications data or carry out any other conduct that enables or facilitates the obtaining of communications data.</p></li><li><p>Require a telecommunications operator to obtain or disclose communications data from a telecommunications service provided by another operator.</p></li></ul><h1>Who can be served with data acquisition notices?</h1><p>As stated beforehand, an authorisation for the acquisition of communications data can authorise a public authority to obtain the data from a telecommunications operator. If so, the authorisation imposing such requirements on an operator must specify the operator concerned and the nature of the requirements to be imposed.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-36" href="#footnote-36" target="_self">36</a></p><p>An acquisition notice must then be provided to the telecommunications operator. That notice, of which must be given in writing or in a manner that produces a record of its having been given, must specify:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-37" href="#footnote-37" target="_self">37</a></p><ul><li><p>The office, rank or position held by the person within the public authority giving the notice</p></li><li><p>The requirements being imposed</p></li><li><p>The operator to whom the requirements are being imposed</p></li></ul><p>Any notice given &#8220;should contain enough information to allow the telecommunications operator to comply with the requirements of the notice&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-38" href="#footnote-38" target="_self">38</a> This includes a description of &#8220;the communications data to be obtained or disclosed under the notice specifying, where relevant, any historic or future date(s) and, where appropriate, time period(s)&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-39" href="#footnote-39" target="_self">39</a> The notice should also &#8220;specify the manner in which the data should be disclosed and specify or describe the person(s) to whom the data is to be, or may be, disclosed or how to identify such person(s)&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-40" href="#footnote-40" target="_self">40</a> Although, an operator will usually only ever be required to disclose data to the public authority, typically the SPoC.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-41" href="#footnote-41" target="_self">41</a> An authorisation notice is cancelled when the corresponding authorisation is cancelled.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-42" href="#footnote-42" target="_self">42</a></p><p>It is the duty of a telecommunications operator subject to an acquisition notice to comply with the requirements in the notice.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-43" href="#footnote-43" target="_self">43</a> In doing so, the operator must only obtain or disclose the amount of data needed in order to comply with the notice.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-44" href="#footnote-44" target="_self">44</a> Such duties are enforceable by the Secretary of State by civil proceedings.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-45" href="#footnote-45" target="_self">45</a> However, an operator is not required to take steps to comply with an acquisition notice that are not reasonably practicable to take.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-46" href="#footnote-46" target="_self">46</a></p><p>It is a criminal offence for telecommunications operator or its employees to disclose, without a reasonable excuse, the existence of an acquisition notice or its contents.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-47" href="#footnote-47" target="_self">47</a> The IPA 2016 does not specify what might constitute a &#8220;reasonable excuse&#8221; except for when the disclosure is made with the permission of the relevant public authority, of which can be contained in the notice itself.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-48" href="#footnote-48" target="_self">48</a></p><p>The Secretary of State must ensure that arrangements are in place for telecommunications operators to receive an appropriate contribution in respect of the cost of complying with an acquisition notice.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-49" href="#footnote-49" target="_self">49</a></p><h1>What are bulk data acquisition warrants?</h1><h2>Scope of bulk acquisition warrants</h2><p>A bulk acquisition warrant authorises a person to secure by any conduct one or more of a series of specified activities that relate to the acquisition of communications data.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-50" href="#footnote-50" target="_self">50</a> Those specified activities include:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-51" href="#footnote-51" target="_self">51</a></p><ul><li><p>Requiring a telecommunications operator to obtain and disclose communications data to a public authority, including data which may not be in the possession of the operator if the operator is capable of obtaining such data. A bulk acquisition warrant may relate to data whether or not in existence at the time of the issuing of the warrant.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-52" href="#footnote-52" target="_self">52</a></p></li><li><p>The selection for examination of communications data obtained under the warrant.</p></li><li><p>The disclosure of communications data to the person to whom the warrant is addressed or to any person acting on the person&#8217;s behalf.</p></li></ul><p>Furthermore, a bulk acquisition warrant can authorise any conduct that is necessary to undertake in order to do what is expressly required by the warrant. This includes conduct by a person in pursuance of a requirement under the warrant in order to provide assistance to the person to whom the warrant is addressed.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-53" href="#footnote-53" target="_self">53</a> However, the communications data that can be obtained under a bulk acquisition warrant is data relating to the acts and intentions of persons outside of the British Islands.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-54" href="#footnote-54" target="_self">54</a></p><h2>Restrictions on bulk acquisition warrants</h2><p>Only the head of an SIA can apply for a bulk acquisition warrant. That application must be made to the Secretary of State, and from there the application is subject to the double lock mechanism involving Judicial Commissioners.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-55" href="#footnote-55" target="_self">55</a></p><p>In addition to this, bulk acquisition warrants must also satisfy three other conditions:</p><ul><li><p>The examination of the communications data sought must be necessary for specified operational purposes.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-56" href="#footnote-56" target="_self">56</a> Those operational purposes must be sourced from a list of operational purposes maintained by the SIAs<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-57" href="#footnote-57" target="_self">57</a> that is approved by the Secretary of State.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-58" href="#footnote-58" target="_self">58</a> The Prime Minister is also responsible for reviewing that list at least once a year.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-59" href="#footnote-59" target="_self">59</a></p></li><li><p>The examination of the communications data for each operational purpose must be necessary on the relevant statutory grounds.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-60" href="#footnote-60" target="_self">60</a></p></li><li><p>There must be satisfactory arrangements in place consisting of safeguards relating to the retention and disclosure of data.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-61" href="#footnote-61" target="_self">61</a></p></li></ul><p>The relevant statutory grounds include:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-62" href="#footnote-62" target="_self">62</a></p><ul><li><p>In the interests of national security<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-63" href="#footnote-63" target="_self">63</a></p></li><li><p>For the purpose of preventing or detecting serious crime, i.e., a criminal offence that involves conduct entailing the use of violence, results in substantial financial gain or is conduct by a large number of persons in pursuit of a common purpose<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-64" href="#footnote-64" target="_self">64</a></p></li><li><p>In the interests of the economic well-being of the UK so far as those interests are also relevant to the interests of national security</p></li></ul><p>The safeguards that must be in place for a bulk acquisition warrant relate to the copying, storage, dissemination and destruction of communications data in that such processing must be kept to the minimum necessary for the authorised purposes.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-65" href="#footnote-65" target="_self">65</a> Those &#8220;authorised purposes&#8221; include the grounds on which a bulk acquisition warrant is issued,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-66" href="#footnote-66" target="_self">66</a> but also include, for example, where such processing is necessary for facilitating the carrying out of any functions of the Judicial Commissioners or the Investigatory Powers Tribunal.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-67" href="#footnote-67" target="_self">67</a> Public authorities must ensure that &#8220;all copies, extracts and summaries of communications data obtained under a bulk acquisition warrant [are] handled and stored securely, so as to minimise loss or theft&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-68" href="#footnote-68" target="_self">68</a> Only those with the appropriate security clearance should be able to access the data.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-69" href="#footnote-69" target="_self">69</a></p><h2>Serving bulk acquisition warrants</h2><p>Bulk acquisition warrants may also be served on telecommunications operators. Public authorities may act through, or together with, other persons so that such persons can provide assistance in giving effect to the warrant.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-70" href="#footnote-70" target="_self">70</a> This can be done by serving a copy of the warrant on the assisting person,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-71" href="#footnote-71" target="_self">71</a> of whom can be outside of the UK.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-72" href="#footnote-72" target="_self">72</a> It must be served in a way that the contents of the warrant are brought to the attention of the assisting person.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-73" href="#footnote-73" target="_self">73</a> In particular, the warrant &#8220;must specify the communications data to be obtained&#8221; and should also detail the steps &#8220;required to take to give effect to the warrant&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-74" href="#footnote-74" target="_self">74</a> The specification of &#8220;any other details regarding the means of acquisition of the data and delivery&#8221; should also be included.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-75" href="#footnote-75" target="_self">75</a></p><p>An assisting person can be a telecommunications operator. That operator must take all the necessary steps to give effect to the warrant as instructed by the public authority.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-76" href="#footnote-76" target="_self">76</a> Such a duty may be enforced by the Secretary of State by civil proceedings,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-77" href="#footnote-77" target="_self">77</a> however the operator is not required to take any steps which it is not reasonably practicable for the operator to take.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-78" href="#footnote-78" target="_self">78</a></p><p>The Secretary of State must ensure that arrangements are in place for telecommunications operators to receive an appropriate contribution in respect of the cost of complying with a bulk acquisition warrant.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-79" href="#footnote-79" target="_self">79</a></p><p>A telecommunications operator served with a warrant must keep it confidential<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-80" href="#footnote-80" target="_self">80</a> unless there is a reasonable excuse for disclosure, such as the permission of the Secretary of State.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-81" href="#footnote-81" target="_self">81</a> Non-compliance with this duty of confidentiality is a criminal offence.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-82" href="#footnote-82" target="_self">82</a></p><h1>Operational case for the acquisition of communications data</h1><p>Public authorities use communications data &#8220;to develop intelligence leads, to help them focus on individuals who may be a threat to national security, or to discount individuals seen in contact with those under investigation&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-83" href="#footnote-83" target="_self">83</a> For example, in 2015, MI5 was able to use bulk communications data to identify a foreign national associated with ISIL who had visited the UK for a period of time.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-84" href="#footnote-84" target="_self">84</a> Through the analysis of that data, MI5 &#8220;identified a previously unknown telephone used by the individual and this enabled MI5 to understand the purpose of his travel and whether he had been involved in attack planning&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-85" href="#footnote-85" target="_self">85</a></p><p>In addition, it can be used to &#8220;illuminate networks and associations between groups and plots&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-86" href="#footnote-86" target="_self">86</a> In 2015, &#8220;intelligence indicated that a number of individuals had travelled to Europe in order to conduct attacks in European capital cities&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-87" href="#footnote-87" target="_self">87</a> While the names of these individuals were unknown, &#8220;MI5 was able to use bulk acquisition data to identify one individual who had travelled to the UK and then on to another European country&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-88" href="#footnote-88" target="_self">88</a></p><p>Overall, communications data can &#8220;help decide quickly, with minimal intrusion and cost, whether contacts of &#8216;subjects of interest&#8217; are innocent and of no further interest, or are potential co-conspirators&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-89" href="#footnote-89" target="_self">89</a> For GCHQ, bulk communications data is the primary way it discovers threats in the UK &#8220;together with communications data obtained through bulk interception&#8221;.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-90" href="#footnote-90" target="_self">90</a></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Investigatory Powers Act 2016, Schedule 4.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.70(3).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>Investigatory Powers Act 2016, Schedule 4.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.64(4).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.76(A1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>Home Office, <em>Communications Data Code of Practice</em> (November 2018), para. 4.4.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.70(2A).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.73(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.238(5).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p>Home Office, <em>Communications Data Code of Practice</em> (November 2018), para. 4.11.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-11" href="#footnote-anchor-11" class="footnote-number" contenteditable="false" target="_self">11</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.60A(7)(d).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-12" href="#footnote-anchor-12" class="footnote-number" contenteditable="false" target="_self">12</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.60A(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-13" href="#footnote-anchor-13" class="footnote-number" contenteditable="false" target="_self">13</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.70(5A).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-14" href="#footnote-anchor-14" class="footnote-number" contenteditable="false" target="_self">14</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.61(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-15" href="#footnote-anchor-15" class="footnote-number" contenteditable="false" target="_self">15</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.77(2).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-16" href="#footnote-anchor-16" class="footnote-number" contenteditable="false" target="_self">16</a><div class="footnote-content"><p>Investigatory Powers Act 2016, Schedule 4.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-17" href="#footnote-anchor-17" class="footnote-number" contenteditable="false" target="_self">17</a><div class="footnote-content"><p>Home Office, <em>Communications Data Code of Practice</em> (November 2018), para. 9.3.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-18" href="#footnote-anchor-18" class="footnote-number" contenteditable="false" target="_self">18</a><div class="footnote-content"><p>Investigatory Powers Act 2016, ss.62(A2) and 62(2).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-19" href="#footnote-anchor-19" class="footnote-number" contenteditable="false" target="_self">19</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.62(3).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-20" href="#footnote-anchor-20" class="footnote-number" contenteditable="false" target="_self">20</a><div class="footnote-content"><p>Investigatory Powers Act 2016, ss.62(4)(b)(i) and 62(5)(c)(i).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-21" href="#footnote-anchor-21" class="footnote-number" contenteditable="false" target="_self">21</a><div class="footnote-content"><p>Investigatory Powers Act 2016, ss.62(4)(b)(iii) and 62(5)(c)(iii).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-22" href="#footnote-anchor-22" class="footnote-number" contenteditable="false" target="_self">22</a><div class="footnote-content"><p>Investigatory Powers Act 2016, ss.62(4)(b)(ii) and 62(5)(c)(ii).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-23" href="#footnote-anchor-23" class="footnote-number" contenteditable="false" target="_self">23</a><div class="footnote-content"><p>Investigatory Powers Act 2016, ss.60A(1)(b) and 61(1)(b).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-24" href="#footnote-anchor-24" class="footnote-number" contenteditable="false" target="_self">24</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.60A(7).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-25" href="#footnote-anchor-25" class="footnote-number" contenteditable="false" target="_self">25</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.60A(8).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-26" href="#footnote-anchor-26" class="footnote-number" contenteditable="false" target="_self">26</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.263(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-27" href="#footnote-anchor-27" class="footnote-number" contenteditable="false" target="_self">27</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.263(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-28" href="#footnote-anchor-28" class="footnote-number" contenteditable="false" target="_self">28</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.263(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-29" href="#footnote-anchor-29" class="footnote-number" contenteditable="false" target="_self">29</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.61A(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-30" href="#footnote-anchor-30" class="footnote-number" contenteditable="false" target="_self">30</a><div class="footnote-content"><p>Home Office, <em>Communications Data Code of Practice</em> (November 2018), para. 5.13.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-31" href="#footnote-anchor-31" class="footnote-number" contenteditable="false" target="_self">31</a><div class="footnote-content"><p>Home Office, <em>Communications Data Code of Practice</em> (November 2018), para. 5.29.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-32" href="#footnote-anchor-32" class="footnote-number" contenteditable="false" target="_self">32</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.64(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-33" href="#footnote-anchor-33" class="footnote-number" contenteditable="false" target="_self">33</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.61(2).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-34" href="#footnote-anchor-34" class="footnote-number" contenteditable="false" target="_self">34</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.61(4).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-35" href="#footnote-anchor-35" class="footnote-number" contenteditable="false" target="_self">35</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.61(5).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-36" href="#footnote-anchor-36" class="footnote-number" contenteditable="false" target="_self">36</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.64(2).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-37" href="#footnote-anchor-37" class="footnote-number" contenteditable="false" target="_self">37</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.64(3).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-38" href="#footnote-anchor-38" class="footnote-number" contenteditable="false" target="_self">38</a><div class="footnote-content"><p>Home Office, <em>Communications Data Code of Practice</em> (November 2018), para. 6.22.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-39" href="#footnote-anchor-39" class="footnote-number" contenteditable="false" target="_self">39</a><div class="footnote-content"><p>Home Office, <em>Communications Data Code of Practice</em> (November 2018), para. 6.23.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-40" href="#footnote-anchor-40" class="footnote-number" contenteditable="false" target="_self">40</a><div class="footnote-content"><p>Home Office, <em>Communications Data Code of Practice</em> (November 2018), para. 6.23.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-41" href="#footnote-anchor-41" class="footnote-number" contenteditable="false" target="_self">41</a><div class="footnote-content"><p>Home Office, <em>Communications Data Code of Practice</em> (November 2018), para. 6.26.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-42" href="#footnote-anchor-42" class="footnote-number" contenteditable="false" target="_self">42</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.65(7)(b).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-43" href="#footnote-anchor-43" class="footnote-number" contenteditable="false" target="_self">43</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.66(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-44" href="#footnote-anchor-44" class="footnote-number" contenteditable="false" target="_self">44</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.66(2).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-45" href="#footnote-anchor-45" class="footnote-number" contenteditable="false" target="_self">45</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.66(5).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-46" href="#footnote-anchor-46" class="footnote-number" contenteditable="false" target="_self">46</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.66(3).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-47" href="#footnote-anchor-47" class="footnote-number" contenteditable="false" target="_self">47</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.82(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-48" href="#footnote-anchor-48" class="footnote-number" contenteditable="false" target="_self">48</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.82(3).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-49" href="#footnote-anchor-49" class="footnote-number" contenteditable="false" target="_self">49</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.249(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-50" href="#footnote-anchor-50" class="footnote-number" contenteditable="false" target="_self">50</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.158(5).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-51" href="#footnote-anchor-51" class="footnote-number" contenteditable="false" target="_self">51</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.158(6).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-52" href="#footnote-anchor-52" class="footnote-number" contenteditable="false" target="_self">52</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.158(8).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-53" href="#footnote-anchor-53" class="footnote-number" contenteditable="false" target="_self">53</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.159(7).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-54" href="#footnote-anchor-54" class="footnote-number" contenteditable="false" target="_self">54</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.158(3).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-55" href="#footnote-anchor-55" class="footnote-number" contenteditable="false" target="_self">55</a><div class="footnote-content"><p>Investigatory Powers Act 2016, ss.158(1) and 159.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-56" href="#footnote-anchor-56" class="footnote-number" contenteditable="false" target="_self">56</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.158(1)(c)(i).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-57" href="#footnote-anchor-57" class="footnote-number" contenteditable="false" target="_self">57</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.161(4).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-58" href="#footnote-anchor-58" class="footnote-number" contenteditable="false" target="_self">58</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.161(6).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-59" href="#footnote-anchor-59" class="footnote-number" contenteditable="false" target="_self">59</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.161(10).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-60" href="#footnote-anchor-60" class="footnote-number" contenteditable="false" target="_self">60</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.158(1)(c)(ii).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-61" href="#footnote-anchor-61" class="footnote-number" contenteditable="false" target="_self">61</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.158(1)(d).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-62" href="#footnote-anchor-62" class="footnote-number" contenteditable="false" target="_self">62</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.158(2).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-63" href="#footnote-anchor-63" class="footnote-number" contenteditable="false" target="_self">63</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.158(1)(a)(i).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-64" href="#footnote-anchor-64" class="footnote-number" contenteditable="false" target="_self">64</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.263(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-65" href="#footnote-anchor-65" class="footnote-number" contenteditable="false" target="_self">65</a><div class="footnote-content"><p>Home Office, <em>Bulk Acquisition of Communications Data Code of Practice</em> (March 2018), para. 9.5.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-66" href="#footnote-anchor-66" class="footnote-number" contenteditable="false" target="_self">66</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.171(3)(a).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-67" href="#footnote-anchor-67" class="footnote-number" contenteditable="false" target="_self">67</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.171(3)(c).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-68" href="#footnote-anchor-68" class="footnote-number" contenteditable="false" target="_self">68</a><div class="footnote-content"><p>Home Office, <em>Bulk Acquisition of Communications Data Code of Practice</em> (March 2018), para. 9.5.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-69" href="#footnote-anchor-69" class="footnote-number" contenteditable="false" target="_self">69</a><div class="footnote-content"><p>Home Office, <em>Bulk Acquisition of Communications Data Code of Practice</em> (March 2018), para. 9.5.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-70" href="#footnote-anchor-70" class="footnote-number" contenteditable="false" target="_self">70</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.168(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-71" href="#footnote-anchor-71" class="footnote-number" contenteditable="false" target="_self">71</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.168(2).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-72" href="#footnote-anchor-72" class="footnote-number" contenteditable="false" target="_self">72</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.168(3).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-73" href="#footnote-anchor-73" class="footnote-number" contenteditable="false" target="_self">73</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.169(2).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-74" href="#footnote-anchor-74" class="footnote-number" contenteditable="false" target="_self">74</a><div class="footnote-content"><p>Home Office, <em>Bulk Acquisition of Communications Data Code of Practice</em> (March 2018), para. 7.3.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-75" href="#footnote-anchor-75" class="footnote-number" contenteditable="false" target="_self">75</a><div class="footnote-content"><p>Home Office, <em>Bulk Acquisition of Communications Data Code of Practice</em> (March 2018), para. 7.3.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-76" href="#footnote-anchor-76" class="footnote-number" contenteditable="false" target="_self">76</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.170(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-77" href="#footnote-anchor-77" class="footnote-number" contenteditable="false" target="_self">77</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.170(5).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-78" href="#footnote-anchor-78" class="footnote-number" contenteditable="false" target="_self">78</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.170(3).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-79" href="#footnote-anchor-79" class="footnote-number" contenteditable="false" target="_self">79</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.249(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-80" href="#footnote-anchor-80" class="footnote-number" contenteditable="false" target="_self">80</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.174(1).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-81" href="#footnote-anchor-81" class="footnote-number" contenteditable="false" target="_self">81</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.174(2).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-82" href="#footnote-anchor-82" class="footnote-number" contenteditable="false" target="_self">82</a><div class="footnote-content"><p>Investigatory Powers Act 2016, s.174(3).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-83" href="#footnote-anchor-83" class="footnote-number" contenteditable="false" target="_self">83</a><div class="footnote-content"><p>Intelligence and Security Committee, <em>Access to Communications Data by the Intelligence and Security Agencies</em> (Cm 85134, 2013), p.9.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-84" href="#footnote-anchor-84" class="footnote-number" contenteditable="false" target="_self">84</a><div class="footnote-content"><p>David Anderson QC, <em>Report of the Bulk Powers Review</em> (Cm 9326, 2016), Annex 9 Case Studies &#8211; Bulk Acquisition, Case study A9/8.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-85" href="#footnote-anchor-85" class="footnote-number" contenteditable="false" target="_self">85</a><div class="footnote-content"><p>David Anderson QC, <em>Report of the Bulk Powers Review</em> (Cm 9326, 2016), Annex 9 Case Studies &#8211; Bulk Acquisition, Case study A9/8.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-86" href="#footnote-anchor-86" class="footnote-number" contenteditable="false" target="_self">86</a><div class="footnote-content"><p>Intelligence and Security Committee, <em>Access to Communications Data by the Intelligence and Security Agencies</em> (Cm 85134, 2013), p.9.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-87" href="#footnote-anchor-87" class="footnote-number" contenteditable="false" target="_self">87</a><div class="footnote-content"><p>David Anderson QC, <em>Report of the Bulk Powers Review</em> (Cm 9326, 2016), Annex 9 Case Studies &#8211; Bulk Acquisition, Case study A9/1.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-88" href="#footnote-anchor-88" class="footnote-number" contenteditable="false" target="_self">88</a><div class="footnote-content"><p>David Anderson QC, <em>Report of the Bulk Powers Review</em> (Cm 9326, 2016), Annex 9 Case Studies &#8211; Bulk Acquisition, Case study A9/1.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-89" href="#footnote-anchor-89" class="footnote-number" contenteditable="false" target="_self">89</a><div class="footnote-content"><p>Intelligence and Security Committee, <em>Access to Communications Data by the Intelligence and Security Agencies</em> (Cm 85134, 2013), p.9.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-90" href="#footnote-anchor-90" class="footnote-number" contenteditable="false" target="_self">90</a><div class="footnote-content"><p>David Anderson QC, <em>Report of the Bulk Powers Review</em> (Cm 9326, 2016), para. 6.5.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Retention notices under the IPA 2016 explained]]></title><description><![CDATA[How the UK government can mandate companies to retain data for national security purposes]]></description><link>https://www.thecybersolicitor.com/p/retention-notices-under-the-ipa-2016</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/retention-notices-under-the-ipa-2016</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 25 Apr 2025 08:01:58 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d6ff38dd-b2a8-4509-91d2-ef655a322326_4000x2500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is about the retention notices that can be served on telecommunications operators by the UK government under the Investigatory Powers Act 2016. It looks at what these notices are, when they can be served, what data can be retained under these notices and other relevant requirements around this power.</p><p>Here are the key takeaways:</p><ul><li><p>Under &#8230;</p></li></ul>
      <p>
          <a href="https://www.thecybersolicitor.com/p/retention-notices-under-the-ipa-2016">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Open justice pulls back the national security veil]]></title><description><![CDATA[The IPT's first decision in the Apple TCN case]]></description><link>https://www.thecybersolicitor.com/p/open-justice-pulls-back-the-national</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/open-justice-pulls-back-the-national</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Thu, 10 Apr 2025 19:01:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/bf936312-4d12-462b-b66b-ccc5a1d41f66_1000x666.avif" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In January, the UK Home Office imposed on Apple a technical capability notice (TCN) ordering the company to provide access to encrypted user data held on iCloud. If you need a catch-up/want to know what this is all about, read my previous post here:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;7ed48f26-4f7b-4a99-a4b0-5c3e0117ebb4&quot;,&quot;caption&quot;:&quot;In early February, the Washington Post reported that the UK security officials have \&quot;demanded that Apple create a back door allowing them to retrieve all the content any Apple user worldwide has uploaded to the cloud.\&quot;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The UK's iCloud backup order explained&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:112131599,&quot;name&quot;:&quot;Mahdi Assan&quot;,&quot;bio&quot;:&quot;Privacy pro working on AI and data rights &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7720d483-a816-433a-b1f6-cc4b49097fea_658x659.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-02-21T09:01:09.067Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thecybersolicitor.com/p/the-uks-icloud-backup-order-explained&quot;,&quot;section_name&quot;:&quot;&#128064; State Surveillance&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:156804503,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:4,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Cyber Solicitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Apple has commenced legal proceedings against the Home Office concerning its TCN. It brought its claim before the Investigatory Powers Tribunal (IPT), and the below post gives on overview of this court and its role in regulating UK state surveillance:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;c6fe9715-03e4-4f22-8cb5-14cd5ccc03a5&quot;,&quot;caption&quot;:&quot;The BBC reported that a hearing will be held by the Investigatory Powers Tribunal (IPT) today (Friday 14 March 2025) concerning a technical capability notice (TCN) imposed on Apple by the UK government. The scheduling of this hearing can be seen on the Tribunal's&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;How to challenge state surveillance powers in the UK&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:112131599,&quot;name&quot;:&quot;Mahdi Assan&quot;,&quot;bio&quot;:&quot;Privacy pro working on AI and data rights &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7720d483-a816-433a-b1f6-cc4b49097fea_658x659.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-03-14T09:01:35.091Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b53f1412-173e-4ce7-8a84-10bf8d702327_750x500.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thecybersolicitor.com/p/how-to-challenge-state-surveillance&quot;,&quot;section_name&quot;:&quot;&#128064; State Surveillance&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:159014609,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Cyber Solicitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>In this post, I cover the IPT's first decision on the Apple TCN case. In short, the IPT held that the proceedings against the Home Office regarding Apple's TCN should not be completely held in secret.</p><h1>What was this latest IPT decision about?</h1><p>This latest decision by the IPT is not about the legalities of the TCN itself. It is more to do with the management of the case.</p><p>In particular, it is about "the bare details of the case". This means "the fact or details of the claim, or the identities of the parties to the claim."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><p>The Home Office tried to argue that the publication of any of this information would "be damaging to national security."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> Therefore, not even the bare details of the case should be published.</p><p>Accordingly, on 28 February, the Home Office "sought an order that the bare details of the case should be private, including by them not appearing on the Tribunal's website, until further order of the Tribunal."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> The Tribunal listed a hearing for this order to take place on 14 March 2025, with the only information being publicised being the case number and the name of the judges.</p><p>But the Home Office wanted this hearing to also be entirely in secret, and therefore to not list it publicly. It argued that this "was necessary to prevent damage to national security."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p><p>But the Tribunal disagreed with the Home Office. It stated that not publishing any details about the hearing regarding whether the main case should be held in secret would have been "a truly extraordinary step" requiring "a correspondingly compelling justification."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a> It further stated that whilst it was not impossible for there to be circumstances in which not publishing any details about a case may be justified on national security grounds, this case was not one of them:</p><blockquote><p>It was not shown that publicly listing a hearing, without publishing the names of the parties or the nature of the case, would create any real risk of damage to the public interest or prejudice to the interests of national security.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a></p></blockquote><p>Accordingly, on 10 March, the IPT's website published the hearing to take place on 14 March, "giving the case number and the names of the judges, but not giving the names of the parties."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a></p><p>For this hearing on the 14 March, which is what the IPT's latest decision is about, the UK government relied on a witness statement from the Head of Investigatory Powers Unit, part of the Homeland Security Group within the Home Office. In that statement, it was explained that national security would be damaged if "the fact, substance or parties to [the] proceedings be made public."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a></p><h1>What are the relevant rules for this?</h1><p>In my post providing an <a href="https://www.thecybersolicitor.com/p/how-to-challenge-state-surveillance">overview of the IPT</a>, I covered the rules that enable it to hold different kinds of hearings. This includes the ability to carry out hearings wholly or partly in private.</p><p>This ability hinges on the duty imposed on the IPT under <a href="https://www.legislation.gov.uk/uksi/2018/1334/article/7/made">Rule 7(1)</a> of the Investigatory Powers Tribunal Rules 2018, which reads:</p><blockquote><p>The Tribunal must carry out their functions in such a way as to secure that information is not disclosed to an extent, or in a manner, that is contrary to the public interest or prejudicial to national security...</p></blockquote><p>But in fulfilling this duty, the Tribunal has to balance national security with the principle of open justice. This "fundamental common law constitutional principle...applies to all courts and tribunals exercising the state's judicial power", including the IPT.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a></p><p>Such a principle normally requires the names of parties to a case to be made public. And this principle can only be departed from (e.g., anonymising the names of the parties) "when, and to the extent that, it is established on clear and cogent evidence that it is strictly necessary" to do so.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a></p><p>An example of this could be cases concerning national security matters:</p><blockquote><p>The executive is entitled to take precautionary approach when assessing risks to national security. Courts and tribunals must accord particular weight to such assessments made by the executive. Those assessments should usually be accepted, unless they are shown to be irrational or otherwise vitiated by a public law error.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a></p></blockquote><h1>The IPT's verdict</h1><p>The central question for the IPT in this case was "whether publication of the bare details of the case would be prejudicial to national security."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a> On this, the Tribunal found that this would not be the case.</p><p>While the IPT is not permitted to substitute its view of what is or is not damaging to national security with that of the government's, courts a still "entitled to intervene on rationality grounds if a decision involves a serious logical or methodological error."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-13" href="#footnote-13" target="_self">13</a></p><p>Accordingly, the IPT did not believe that "the revelation of the bare details of the case would be damaging to the public interest or prejudicial to national security."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-14" href="#footnote-14" target="_self">14</a> The reasoning for this is set out in its private judgment, which of course is not public.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-15" href="#footnote-15" target="_self">15</a> The Home Office's attempt to keep proceedings on Apple's TCN secret were therefore rejected.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-16" href="#footnote-16" target="_self">16</a></p><h1>Pulling back the veil of national security</h1><p>This decision by the IPT is an example of UK court's pulling back what I call the veil of national security:</p><blockquote><p>There are two key elements to the veil of national security:</p><ol><li><p>Secrecy</p></li><li><p>Exclusivity</p></li></ol><p>The first key element is about national security matters being protected from public eyes and therefore barred from public discussion. Such secrecy applies to information about national security threats, the methods used to combat them, and anything else that is relevant to these operations.</p><p>Secrecy is maintained by the 'neither confirm nor deny' (NCND) policy. This is a principle that the government will not confirm nor deny the accuracy of information related to national security matters if doing so would damage national security.</p><p>When invoked, the government will not respond to questions, claims or allegations about its national security work. This policy has been used in Parliamentary debate and in court proceedings.</p><p>The second key element is about matters of national security being solely reserved for the government and its agencies. This means that it is not for the courts or the legislature to decide which threats to prioritise and how they should be addressed.</p><p>Exclusivity is maintained by the separation of powers. This is a long-standing public law principle that the institutions of the state (the executive, the legislature and the judiciary) should be functionally independent.</p><p>This means that none of these institutions should be able to exercise the powers of the other. Only the executive can execute national security policy, only the legislature can pass national security laws, and only the judiciary can provide legal judgments on national security law and policy.</p><p>The rationale for secrecy and exclusivity is the operational efficacy of national security. Both elements contribute to this efficacy in different ways.</p><p>Secrecy prevents adversaries from learning about the measures used against them by the state and adapting their behaviour accordingly. Exclusivity ensures that national security decisions are made by agencies with the relevant information, resources and expertise.</p><p>These ideas were explored in the <em><a href="https://www.bailii.org/uk/cases/UKPC/1916/1916_24.html">Zamora Case</a></em> in 1916. This case concerned whether an order could be made by the government to requisition a neutral ship carrying contraband (copper) during wartime.</p><p>It was determined that such an order was illegal. But even in making this judgement, the House of Lords made reference the veil of national security.</p><p>On secrecy, it was asserted that matters of national security should not be &#8220;made the subject of evidence in a Court of law or otherwise discussed in public.&#8221; On exclusivity, it was asserted that &#8220;those responsible for the national security must be the sole judges of what the national security requires.&#8221;</p><p>Justifications have therefore been made for the veil of national security. It ultimately provides agencies like GCHQ and MI5 the opportunity to do their job effectively.</p><p>But another consequence of the veil is that it makes it more difficult to determine what national security actually is. It can distort what constitutes a national security threat and how they should be addressed.</p><p>This in turn complicates the scrutiny and accountability of government agencies responsible for executing national security operations. It is hard to critique the work of these agencies when their internal workings are largely inaccessible.</p><p>This is clearly demonstrated in the <em><a href="https://www.bailii.org/cgi-bin/format.cgi?doc=/uk/cases/UKHL/1984/9.html">GCHQ Case</a></em> in 1985. This case looked at the decision by the government, made without consultation, prohibiting GCHQ employees from being members of trade unions.</p><p>While motivated by the disruptive industrial action that had already taken place at the agency, the House of Lords found the government&#8217;s decision would normally be illegal. However, it was ultimately concluded that the decision should be permitted.</p><p>The reason for this had to do with national security. Not only was it for the government to balance national security with fairness, but that sometimes government power &#8220;must take precedence over those of the individual.&#8221;</p><p>The government was given the benefit of the doubt that it was in a better position to determine whether trade union membership was a genuine threat to national security. Therefore, if the government says it is such a threat, then it is not for a court to conclude otherwise.</p><p>Such a situation can put human rights in jeopardy. How can we know if the infringement of our rights is necessary and proportionate if we lack the opportunity to assess the potentially infringing decision by the state?</p><p>Such a position is clearly not tenable. This is therefore why, over time, the veil has had to be pulled back gradually.</p></blockquote><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;7adad57e-b50e-4798-9d58-c75fa679dc16&quot;,&quot;caption&quot;:&quot;TL;DR This newsletter is about national security in the context of UK state surveillance. It looks at its definition, its key constituent elements and the evolution of its legal treatment over time.&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;What even is national security?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:112131599,&quot;name&quot;:&quot;Mahdi Assan&quot;,&quot;bio&quot;:&quot;Privacy pro working on AI and data rights &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7720d483-a816-433a-b1f6-cc4b49097fea_658x659.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-01-19T09:00:37.326Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thecybersolicitor.com/p/what-even-is-national-security&quot;,&quot;section_name&quot;:&quot;&#128064; State Surveillance&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:140143606,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:1,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Cyber Solicitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>In this IPT decision, the IPT appeared willing to question the logic of the government's assertion that national security would be damaged by publishing details about the case. The exclusivity and secrecy of the national security veil did not protect the government on this occasion. But we await to see what role the veil might play when the IPT considers Apple's TCN itself.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Solicitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 1.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 1.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 7.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 10.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 10.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 10.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 11.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 21.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 24.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 25.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-11" href="#footnote-anchor-11" class="footnote-number" contenteditable="false" target="_self">11</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 28.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-12" href="#footnote-anchor-12" class="footnote-number" contenteditable="false" target="_self">12</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 29.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-13" href="#footnote-anchor-13" class="footnote-number" contenteditable="false" target="_self">13</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 30.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-14" href="#footnote-anchor-14" class="footnote-number" contenteditable="false" target="_self">14</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 32.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-15" href="#footnote-anchor-15" class="footnote-number" contenteditable="false" target="_self">15</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 6.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-16" href="#footnote-anchor-16" class="footnote-number" contenteditable="false" target="_self">16</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/wp-content/uploads/2025/04/IPT-25-68-CH-Judgment.pdf">Apple v Secretary of State for the Home Department</a></em> [2025] UKIPTrib 1, para. 43.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[How to challenge state surveillance powers in the UK]]></title><description><![CDATA[An overview of the Investigatory Powers Tribunal]]></description><link>https://www.thecybersolicitor.com/p/how-to-challenge-state-surveillance</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/how-to-challenge-state-surveillance</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 14 Mar 2025 09:01:35 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b53f1412-173e-4ce7-8a84-10bf8d702327_750x500.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The BBC <a href="https://www.bbc.co.uk/news/articles/c798xv5qwylo">reported</a> that a hearing will be held by the Investigatory Powers Tribunal (IPT) today (Friday 14 March 2025) concerning a technical capability notice (TCN) imposed on Apple by the UK government. The scheduling of this hearing can be seen on the Tribunal's <a href="https://investigatorypowerstribunal.org.uk/hearings/">website</a>. Apple is challenging the TCN which requires the company to provide access to encrypted iCloud backup data of its users to the government. You can read more about the TCN imposed on Apple below:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;9a422854-d295-4ef3-bd1b-4d899755a7c4&quot;,&quot;caption&quot;:&quot;In early February, the Washington Post reported that the UK security officials have \&quot;demanded that Apple create a back door allowing them to retrieve all the content any Apple user worldwide has uploaded to the cloud.\&quot;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The UK's iCloud backup order explained&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:112131599,&quot;name&quot;:&quot;Mahdi Assan&quot;,&quot;bio&quot;:&quot;Privacy pro working on AI and data rights &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7720d483-a816-433a-b1f6-cc4b49097fea_658x659.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-02-21T09:01:09.067Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thecybersolicitor.com/p/the-uks-icloud-backup-order-explained&quot;,&quot;section_name&quot;:&quot;&#128064; State Surveillance&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:156804503,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:4,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Cyber Solicitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>This post provides an overview of the IPT, including its jurisdiction, its procedures and its powers.</p><h1>What is the Investigatory Powers Tribunal?</h1><p>Under the Human Rights Act 1998 (HRA 1998), a person who claims that a public authority has infringed their rights may bring proceedings against that authority in the appropriate court or tribunal.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><p>To this effect, the IPT has jurisdiction to hear cases against the security and intelligence agencies (SIAs), and certain other public authorities, to determine whether such authorities have acted lawfully using their surveillance powers.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a></p><h1>What is the jurisdiction of the IPT?</h1><p>There are two ways in which UK state surveillance can be challenged before the IPT:</p><ol><li><p>Challenging surveillance legislation itself</p></li><li><p>The actual conduct of the SIAs under that legislation</p></li></ol><p>The latter type of challenge is one that is exclusively reserved for the Tribunal to decide on as it has the appropriate jurisdiction and powers to investigate such claims. With this special status, the Tribunal van validate the claims brought to it in terms of the validity of the specific use of surveillance powers by UK public authorities.</p><p>The European Court of Human Rights (ECtHR) has commended the Tribunal for the "elucidatory role" that it plays in litigation against the SIAs. It acts as a fact-finder and information filter to formulate an accurate starting point for the ECtHR to base its decisions.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> This prevents the Court from having to assess the legalities of surveillance powers in a "factual vacuum" when cases eventually come it.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> The IPT can confirm the activities and operations of the SIAs with the ECtHR then deciding definitively on whether those activities or operations comply with the requirements of the European Convention on Human Rights.</p><p>Certain decisions of the IPT are capable of being reviewed by the UK senior courts. In <em>R (Privacy International) v IPT &amp; Others</em>, the Supreme Court held that the High Court has jurisdiction to hear appeals against the rulings of the IPT where the appeal is based on an error of law made by the Tribunal in its decision.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a></p><h1>Who can lodge complaints with the IPT and how?</h1><p>Human rights complaints can be submitted directly to the IPT by completing the requisite form,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a> of which is available on its <a href="https://investigatorypowerstribunal.org.uk/leaflets-and-forms/%5D">website</a>. In that form, the complainant must state, among other things, the SIAs that the complaint relates to and a description of the nature of the claim, including the details of the right that is alleged to have been infringed, and the complainant's interest.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a> Other complaints can be lodged with the Tribunal too,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a> including, among other things, the conduct required under a national security or technical capability notice.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a></p><p>While the nature of surveillance powers are covert, and therefore it may not always be possible for a complainant to know when they have been subject to such powers, this will not necessarily frustrate the complainant's ability to lodge their claim. As held by the ECtHR, "an individual might, under certain conditions, claim to be the victim of a violation occasioned by the mere existence of secret measures or of legislation permitting secret measures, without having to allege that such measures had been in fact applied to him."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a></p><p>Accordingly, the IPT has held that an individual "may claim to be a victim of a violation occassione by the mere existence of secret measures or of legislation permitting secret measures only if he is able to show that, due to this personal situation, he is potentially at risk of being subjected to such measures."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a> This may be the case even if the basis of a claim is hypothetical (see further below for more on this).</p><h1>What are the information powers of the IPT?</h1><p>The IPT is subject to a duty to investigate claims that are submitted to it,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a> though it is required to dismiss claims that it considers frivolous or vexatious.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-13" href="#footnote-13" target="_self">13</a></p><p>Such investigations can be made with the assistance of a Judicial Commissioner or the Investigatory Powers Commissioner and require public authorities to disclose all such documents and information as may be required to vet a claim lodged with the IPT.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-14" href="#footnote-14" target="_self">14</a></p><p>Additionally, there is a duty on public authorities and all government personnel to disclose or provide to the IPT all documents and information that the Tribunal may require to exercise its jurisdiction.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-15" href="#footnote-15" target="_self">15</a> This means that no information can be withheld from the IPT on national security grounds or for other public interest reasons.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-16" href="#footnote-16" target="_self">16</a> However, this must be balanced with the Tribunal's duty to secure that information is not disclosed in a way that is contrary to the public interest or prejudicial to national security.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-17" href="#footnote-17" target="_self">17</a></p><h1>How are hearings held by the IPT?</h1><p>The IPT is equipped with special powers that allow it to conduct in-depth examinations of the work of the SIAs. With these powers, the IPT has developed two practices regarding how it hears cases brought to it:</p><ul><li><p>Holding hearings on the basis of assumed or hypothetical facts</p></li><li><p>Holding hearings wholly or partly in private</p></li></ul><h2>Hearings on the basis of assumed or hypothetical facts</h2><p>The IPT is permitted to presume that a set of facts presented by a claimant are true to decide whether those facts constitute lawful conduct. An example of this took place in <em>Privacy International v Secretary of State for Foreign and Commonwealth Affairs &amp; Others</em> (2016). This case concerned the lawfulness of GCHQ's use of computer network exploitation (essentially computer hacking) as a means to obtain intelligence. You can read my previous commentary of such surveillance operations by GCHQ here</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;3732eb5f-4f11-43c0-8b0b-f10bb970ef8c&quot;,&quot;caption&quot;:&quot;On 8 January 2021, the High Court delivered its judgment on Privacy International v IPT &amp; Others (2021), a case concerning computer hacking operations carried out by GCHQ. This ruling specifically focused on the scope of property interference warrants under&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Reining in Government Hacking in the UK&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:112131599,&quot;name&quot;:&quot;Mahdi Assan&quot;,&quot;bio&quot;:&quot;Privacy pro working on AI and data rights &quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7720d483-a816-433a-b1f6-cc4b49097fea_658x659.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2021-02-23T15:08:11.000Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thecybersolicitor.com/p/reining-in-government-hacking-in-the-uk&quot;,&quot;section_name&quot;:&quot;&#128064; State Surveillance&quot;,&quot;video_upload_id&quot;:null,&quot;id&quot;:85615689,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Cyber Solicitor&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F276409e9-b16f-4458-aae2-f3c59c484ed3_1110x1110.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>But regarding the procedural aspects of the case, given that GCHQ did not admit to the use of computer hacking, the IPT proceeded on the presumption that GCHQ <em>did</em> carry out such activity. In doing so, the Tribunal was able to reach conclusions on the basis that computer hacking did take place against the claimants and determine whether such conduct was lawful.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-18" href="#footnote-18" target="_self">18</a></p><p>This practice allows the IPT to balance national security with the rights of the claimants and principles of open justice. This is particularly the case where SIAs invoke the 'Neither Confirm Nor Deny' (NCND) policy whereby the SIAs provide no comment on their surveillance capabilities or operations. In <em>Liberty v GCHQ</em>, the UK SIAs, while admitting to their involvement in the PRISM surveillance programme revealed by Edward Snowden in 2013, relied on NCND in relation to the other information on the surveillance activities of the UK and US that formed part of the Snowden documents.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-19" href="#footnote-19" target="_self">19</a> Nevertheless, the IPT took the approach of presuming the activities alleged by the claimants in that case to be true and provided their conclusions on that basis.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-20" href="#footnote-20" target="_self">20</a></p><h2>Hearings wholly or partly in private</h2><p>The IPT is under not duty to hold an oral hearing.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-21" href="#footnote-21" target="_self">21</a> But its powers do enable it to hold 'closed' hearings.</p><p>It is through these closed hearings that the SIAs can submit evidence regarding their operations that would be too sensitive or confidential to discuss in open court.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-22" href="#footnote-22" target="_self">22</a> Whilst this departs from the principle of open justice,<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-23" href="#footnote-23" target="_self">23</a> such arrangements form part of the Tribunal's duty to secure that information is not disclosed in a way that is contrary to the public interest or prejudicial to national security, the prevention or detection of serious crime, the economic well-being of the UK or the continued discharge of the functions of the SIAs.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-24" href="#footnote-24" target="_self">24</a></p><p>The IPT also has the ability to hold hearings where the complainant is absent.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-25" href="#footnote-25" target="_self">25</a> However, the SIAs can be requested to give reasons for the withholding of any information from the complainant.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-26" href="#footnote-26" target="_self">26</a> After considering such representations, the IPT can direct the SIAs to disclose documents or information to the complainant or provide a gist or summary of the documents or information.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-27" href="#footnote-27" target="_self">27</a> </p><h1>What are the remedial powers of the IPT?</h1><p>The IPT is empowered to make orders quashing or cancelling a warrant or authorisation if it finds against public authorities.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-28" href="#footnote-28" target="_self">28</a> Before making any such orders, the Tribunal must allow the parties to the case to make representations.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-29" href="#footnote-29" target="_self">29</a></p><p>The IPT has emphasised how its remedial powers are discretionary, just as relief in public law is discretionary. Accordingly, the IPT will not grant a quashing order if it deems it not necessary in the circumstances and other effective remedies will suffice.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-30" href="#footnote-30" target="_self">30</a></p><p>This discretion is also used when determining the specifics of any orders granted. In <em>Liberty v GCHQ</em>, the IPT found that Amnesty International's emails had been retained for longer than was permitted under GCHQ's internal policies. The agency was therefore ordered to to destroy these communications but also deliver a copy to the then Interception of Communications Commissioner<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-31" href="#footnote-31" target="_self">31</a> to be retained for five years in case it was needed for any legal proceedings or inquiry.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-32" href="#footnote-32" target="_self">32</a></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Solicitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Human Rights Act 1998, <a href="https://www.legislation.gov.uk/ukpga/1998/42/section/7">s.7(1)(a)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Regulation of Investigatory Powers Act 2000, <a href="https://www.legislation.gov.uk/ukpga/2000/23/section/65">s.65(2)(a)</a>. See also <em><a href="https://www.bailii.org/uk/cases/UKSC/2009/12.html">R(A) v B</a></em> [2009] UKSC 12.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p><em><a href="https://hudoc.echr.coe.int/eng#{%22itemid%22:[%22001-186048%22]}">Big Brother Watch and Others v UK</a></em>, App nos. 58170/13, 62322/14 and 24960/15 (ECHR, 13 September 2018), para. 256.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p><em><a href="https://hudoc.echr.coe.int/eng#{%22itemid%22:[%22001-186048%22]}">Big Brother Watch and Others v UK</a></em>, App nos. 58170/13, 62322/14 and 24960/15 (ECHR, 13 September 2018), para. 256.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p><em>R (Privacy International) v Investigatory Powers Tribunal &amp; Others</em> [2019] UKSC 22.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>Regulation of Investigatory Powers Act 2000, <a href="https://www.legislation.gov.uk/ukpga/2000/23/section/65">s.65(2)(a)</a> and Investigatory Powers Tribunal Rules 2018, SI 2018/1334, <a href="https://www.legislation.gov.uk/uksi/2018/1334/article/8/made">Rule 8(1)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>Investigatory Powers Tribunal Rules 2018, SI 2018/1334, <a href="https://www.legislation.gov.uk/uksi/2018/1334/article/8/made">Rule 8(2)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p>Regulation of Investigatory Powers Act 2000, <a href="https://www.legislation.gov.uk/ukpga/2000/23/section/65">s.65(2)</a> and Investigatory Powers Tribunal Rules 2018, SI 2018/1334, <a href="https://www.legislation.gov.uk/uksi/2018/1334/article/9/made">Rule 9(1)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p>Regulation of Investigatory Powers Act 2000, <a href="https://www.legislation.gov.uk/ukpga/2000/23/section/65">s.65(5)(czi)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p><em><a href="https://hudoc.echr.coe.int/eng#{%22itemid%22:[%22001-159324%22]}">Roman Zakharov v Russia</a></em>, App no. 47143/06 (ECHR, 4 December 2015), para. 169.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-11" href="#footnote-anchor-11" class="footnote-number" contenteditable="false" target="_self">11</a><div class="footnote-content"><p><em><a href="https://investigatorypowerstribunal.org.uk/judgement/human-rights-watch-inc-ors-and-the-secretary-of-state-for-the-foreign-commonwealth-office-ors/">Human Rights Watch Inc &amp; Others v Secretary of State for the Foreign &amp; Commonwealth Affairs Office &amp; Others</a></em> [2016] UKIPTrib 15_165-CH, para. 19. See also <em><a href="https://www.judiciary.uk/wp-content/uploads/2022/07/Liberty-judgment-Final-1.pdf">R (Liberty) v Secretary of State for the Home Department &amp; Others</a></em> [2019] EWHC 2057 (Admin), paras. 99&#8211;112.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-12" href="#footnote-anchor-12" class="footnote-number" contenteditable="false" target="_self">12</a><div class="footnote-content"><p>Regulation of Investigatory Powers Act 2000, <a href="https://www.legislation.gov.uk/ukpga/2000/23/section/67">s.67(3)(a)</a>. See also <em><a href="https://hudoc.echr.coe.int/eng#{%22itemid%22:[%22001-90051%22]}">S v Marper</a></em>, App nos. 30562/04 and 30566/04 (ECHR, 4 December 2008), para. 183.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-13" href="#footnote-anchor-13" class="footnote-number" contenteditable="false" target="_self">13</a><div class="footnote-content"><p>Regulation of Investigatory Powers 2000, <a href="https://www.legislation.gov.uk/ukpga/2000/23/section/67">s.67(4)</a>. See also <em><a href="https://www.bailii.org/cgi-bin/format.cgi?doc=/ew/cases/EWCA/Civ/2017/1868.html&amp;amp=&amp;query=(R)+AND+((on)+AND+(the)+AND+(application)+AND+(of)+AND+(Privacy)+AND+(International))+AND+((Appellant))+AND+(v)+AND+(Investigatory)+AND+(Powers)+AND+(Tribunal)">R (Privacy International) v Investigatory Powers Tribunal</a></em> [2017] EWCA Civ 1868, para. 10.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-14" href="#footnote-anchor-14" class="footnote-number" contenteditable="false" target="_self">14</a><div class="footnote-content"><p>Regulation of Investigatory Powers Act 2000, ss.<a href="https://www.legislation.gov.uk/ukpga/2000/23/section/68">68(2) and (6)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-15" href="#footnote-anchor-15" class="footnote-number" contenteditable="false" target="_self">15</a><div class="footnote-content"><p>Regulation of Investigatory Powers Act 2000, <a href="https://www.legislation.gov.uk/ukpga/2000/23/section/68">s.68(6)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-16" href="#footnote-anchor-16" class="footnote-number" contenteditable="false" target="_self">16</a><div class="footnote-content"><p>Robert Ward et al (eds), <em>National Security: Law, Procedure and Practice</em> (OUP 2021), p.159.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-17" href="#footnote-anchor-17" class="footnote-number" contenteditable="false" target="_self">17</a><div class="footnote-content"><p>Investigatory Powers Tribunal Rules 2018, SI 2018/1334, <a href="https://www.legislation.gov.uk/uksi/2018/1334/article/7/made">Rule 7(1)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-18" href="#footnote-anchor-18" class="footnote-number" contenteditable="false" target="_self">18</a><div class="footnote-content"><p><em><a href="https://www.bailii.org/cgi-bin/format.cgi?doc=/uk/cases/UKIPTrib/2016/14_85-CH.html&amp;query=(.2016.)+AND+(UKIPTrib)+AND+(14_85-CH)">Privacy International vs Secretary of State for Foreign and Commonwealth Affairs Office</a></em> [2016] UKIPTrib 14_85-CH, para. 2.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-19" href="#footnote-anchor-19" class="footnote-number" contenteditable="false" target="_self">19</a><div class="footnote-content"><p><em><a href="https://www.bailii.org/uk/cases/UKIPTrib/2014/13_77-H.html">Liberty &amp; Others v GCHQ &amp; Others</a></em> [2014] UKIPTrib 13_77-h, para. 4(i).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-20" href="#footnote-anchor-20" class="footnote-number" contenteditable="false" target="_self">20</a><div class="footnote-content"><p><em><a href="https://www.bailii.org/uk/cases/UKIPTrib/2014/13_77-H.html">Liberty &amp; Others v GCHQ &amp; Others</a></em> [2014] UKIPTrib 13_77-h, para. 4.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-21" href="#footnote-anchor-21" class="footnote-number" contenteditable="false" target="_self">21</a><div class="footnote-content"><p>Investigatory Powers Tribunal Rules 2018, SI 2018/1334, <a href="https://www.legislation.gov.uk/uksi/2018/1334/article/10/made">Rule 10(1)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-22" href="#footnote-anchor-22" class="footnote-number" contenteditable="false" target="_self">22</a><div class="footnote-content"><p><em><a href="https://www.bailii.org/uk/cases/UKIPTrib/2014/13_77-H.html">Liberty &amp; Others v GCHQ &amp; Others</a></em> [2014] UKIPTrib 13_77-h, para. 7.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-23" href="#footnote-anchor-23" class="footnote-number" contenteditable="false" target="_self">23</a><div class="footnote-content"><p>Robert Ward et al (eds), <em>National Security: Law, Procedure and Practice</em> (OUP 2021), p.161.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-24" href="#footnote-anchor-24" class="footnote-number" contenteditable="false" target="_self">24</a><div class="footnote-content"><p>Investigatory Powers Tribunal Rules 2018, SI 2018/1334, <a href="https://www.legislation.gov.uk/uksi/2018/1334/article/7/made">Rule 7(1)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-25" href="#footnote-anchor-25" class="footnote-number" contenteditable="false" target="_self">25</a><div class="footnote-content"><p>Investigatory Powers Tribunal Rules 2018, SI 2018/1334, <a href="https://www.legislation.gov.uk/uksi/2018/1334/article/10/made">Rule 10(1)(c)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-26" href="#footnote-anchor-26" class="footnote-number" contenteditable="false" target="_self">26</a><div class="footnote-content"><p>Investigatory Powers Tribunal Rules 2018, SI 2018/1334, <a href="https://www.legislation.gov.uk/uksi/2018/1334/article/7/made">Rule 7(5)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-27" href="#footnote-anchor-27" class="footnote-number" contenteditable="false" target="_self">27</a><div class="footnote-content"><p>Investigatory Powers Tribunal Rules 2018, SI 2018/1334, <a href="https://www.legislation.gov.uk/uksi/2018/1334/article/7/made">Rule 7(6)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-28" href="#footnote-anchor-28" class="footnote-number" contenteditable="false" target="_self">28</a><div class="footnote-content"><p>Regulation of Investigatory Powers Act 2000, <a href="https://www.legislation.gov.uk/ukpga/2000/23/section/67">s.67(7)(a)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-29" href="#footnote-anchor-29" class="footnote-number" contenteditable="false" target="_self">29</a><div class="footnote-content"><p>Investigatory Powers Tribunal Rules 2018, SI 2018/1334, <a href="https://www.legislation.gov.uk/uksi/2018/1334/article/14/made">Rule 14(1)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-30" href="#footnote-anchor-30" class="footnote-number" contenteditable="false" target="_self">30</a><div class="footnote-content"><p><em><a href="https://www.bailii.org/cgi-bin/format.cgi?doc=/uk/cases/UKIPTrib/2023/1.html">Liberty v Security Service</a></em> [2023] UKIPTrib 1, paras. 190-192.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-31" href="#footnote-anchor-31" class="footnote-number" contenteditable="false" target="_self">31</a><div class="footnote-content"><p>This has now been superseded by the Investigatory Powers Commissioner and their office.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-32" href="#footnote-anchor-32" class="footnote-number" contenteditable="false" target="_self">32</a><div class="footnote-content"><p><em><a href="https://www.bailii.org/uk/cases/UKIPTrib/2014/13_77-H.html">Liberty &amp; Others v GCHQ &amp; Others</a></em> [2014] UKIPTrib 13_77-h.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[The UK's iCloud backup order explained]]></title><description><![CDATA[A legal breakdown of access to data by the state in the UK]]></description><link>https://www.thecybersolicitor.com/p/the-uks-icloud-backup-order-explained</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/the-uks-icloud-backup-order-explained</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 21 Feb 2025 09:01:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!VQ0y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VQ0y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VQ0y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VQ0y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VQ0y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VQ0y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VQ0y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:10032030,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VQ0y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg 424w, https://substackcdn.com/image/fetch/$s_!VQ0y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg 848w, https://substackcdn.com/image/fetch/$s_!VQ0y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!VQ0y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50dc633e-77eb-4d16-9226-cedb6cd26539_5760x3840.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image from <a href="https://pixabay.com/users/arttower-5337/">ArtTower</a></figcaption></figure></div><p>In early February, the <em>Washington Post</em> <a href="https://www.washingtonpost.com/technology/2025/02/07/apple-encryption-backdoor-uk/">reported</a> that the UK security officials have "demanded that Apple create a back door allowing them to retrieve all the content any Apple user worldwide has uploaded to the cloud."</p><p>Issued in January, the order from the UK government requires the tech company to provide full access to encrypted material rather than access to a specific account. The <em>Washington Post</em> described this demand as unprecedented in major democracies.</p><p>The order is aimed at the ability for Apple users to encrypt backups uploaded to iCloud. These backups contain a copy of various data held on a users' device, including copies of messaging data from iMessage.</p><p>According to the <em>Washington Post</em> report, Apple is likely to stop offering this service to UK users instead of breaking its security promise to users. However, such a concession "would not fulfill the U.K. demand for backdoor access to the service in other countries, including the United States," according to the <em>Washington Post</em>.</p><p>This post provides a breakdown of the legalities of this request.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Solicitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>How is the UK able to order Apple to do this?</h1><h2>The Investigatory Powers Act 2016</h2><p>The relevant law here is the Investigatory Powers Act 2016 (IPA 2016). This is the principal piece of legislation regulating state surveillance in the UK.</p><p>It stipulates rules for the use of various surveillance powers by government agencies like MI5, MI6 and GCHQ. It makes provision for seven different types of powers:</p><ul><li><p>Interception of communications</p></li><li><p>Retention of communications data</p></li><li><p>Acquisition of communications data</p></li><li><p>Equipment interference</p></li><li><p>Bulk personal datasets</p></li><li><p>Technical capability notices</p></li><li><p>National security notices</p></li></ul><p>The IPA 2016 specifies the nature, scope and limits of these powers. Supplementing the Act are <a href="https://www.gov.uk/government/collections/investigatory-powers-act-codes-of-practice">codes of practice</a> that provide more detail on the practical application of the powers.</p><p>One important feature of the IPA 2016 is what is known as the 'double lock' mechanism. This is a system of review for the approval of warrants, notices and authorisations permitting the use of surveillance powers by government agencies.</p><p>Judicial commissioners (JCs), persons who have held high judicial office in the UK, are tasked with carrying out this review process.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> For each warrant, notice or authorisation, they must look at the conduct being permitted and determine whether it is both necessary for and proportionate to the objective being pursued.</p><p>Before these warrants, notices or authorisations are reviewed by the JCs, the government agency applying for them must also consider the conduct to be necessary and proportionate. These considerations by the JCs and government agencies make up the double lock mechanism.</p><p>Accordingly, the double lock mechanism ensures that the use of surveillance powers by government agencies is compliant with human rights law. This is an important aspect of the IPA 2016 that was missing from previous versions of UK state surveillance law.</p><h2>Technical capability notices</h2><p>Under the IPA 2016, a technical capability notice (TCN) is an instruction given by the government to a telecommunications operator to assist with the execution of surveillance powers.</p><p>These notices are used to facilitate the surveillance operations of government agencies when using their powers under the IPA 2016.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> This could be in relation to interception warrants, data acquisition authorisations, bulk acquisition warrants or equipment interference warrants.</p><p>TCNs can therefore contain a range of obligations that a telecommunications operator must fulfil. These include:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a></p><ul><li><p>Providing facilities or services of a specified description</p></li><li><p>Obligations relating to apparatus owned or operated by an operator</p></li><li><p>The removal by an operator of electronic protection applied by or on behalf of that operator to any communications or data</p></li><li><p>Obligations relating to the security of any telecommunications service provided by an operator</p></li><li><p>Obligations relating to the handling or disclosure of information</p></li></ul><p>The IPA 2016 has a very wide definition of 'telecommunications operators'. It effectively covers a wide range of entities providing communications services, including public networks, online storage providers and messaging applications.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a></p><p>There are four key rules that government agencies must follow when issuing TCNs:</p><ol><li><p>The obligations contained in a TCN must be necessary for and proportionate to the objective pursued, which is ensuring that the telecommunications operator can provide assistance to the government agency executing its surveillance powers.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a></p></li><li><p>TCNs must be reviewed by a JC for their necessity and proportionality under the double lock mechanism.</p></li><li><p>TCNs relating to interception and equipment interference warrants cannot be imposed on telecommunications operators that do not provide a service to more than 10,000 users.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a></p></li><li><p>TCNs cannot be issued to telecommunications operators solely providing banking, insurance, investment or other financial services.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a></p></li></ol><p>Additionally, the government must also consult the telecommunications operator before serving them with a TCN. In doing so, the following factors must be taken into account:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a></p><ul><li><p>The likely benefits of the TCN</p></li><li><p>The likely number of users (if known) of the service provided by the operator</p></li><li><p>The technical feasibility of complying the TCN</p></li><li><p>The likely cost of complying with the TCN</p></li><li><p>Any other effect of the TCN</p></li></ul><p>Finally, operators served with a TCN must keep it secret from the public.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a> Permission is needed from the government before revealing anything about its existence or contents.</p><h1>What Apple data does the order target?</h1><p>Given that TCNs are secret, the UK has not published the one it has issued to Apple. Also, the Home Office has neither confirmed or denied the existence of the TCN.</p><p>But according to the <em>Washington Post</em>, the TCN requires "blanket capability to view fully encrypted material, not merely assistance in cracking a specific account." In particular, the TCN is focused on Apple's <a href="https://support.apple.com/en-us/108756">Advanced Data Protection (ADP) system</a> for iCloud.</p><p>ADP is an optional setting that allows users to encrypt their iCloud data, including backups, photos, notes and other information. Apple states that ADP uses 'end-to-end encryption', meaning that Apple itself does not possess a copy of the cryptographic keys to decrypt the data uploaded its servers.</p><p>However, if users do not turn ADP on, then any data stored in iCloud is subject to Apple's <a href="https://support.apple.com/en-us/102651">standard security measures</a>. This means that although the data are still protected by encryption, it is not protected by E2EE and Apple will hold a copy of the cryptographic keys that it can use to decrypt the data.</p><p>Apple states that by holding a copy of the keys, it can assist users with data recovery. This could be helpful if a user forgets their password or loses their phone and is trying to access the data stored in their iCloud account.</p><p>However, as cryptographer Matthew Green points out in his <a href="https://blog.cryptographyengineering.com/2025/02/12/u-k-asks-to-backdoor-icloud-backup-encryption/">blog post</a>, the downside of this is that Apple holding a copy of the keys does introduce more vulnerabilities relative to E2EE:</p><blockquote><p>Two different types of &#8220;bad guys&#8221; can walk through the hole created by this vulnerability: one type includes hackers and criminals, including sophisticated <a href="https://en.wikipedia.org/wiki/Salt_Typhoon">state-sponsored cyber-intrusion groups</a>. The other is national governments: typically, law enforcement and national intelligence agencies.</p><p>Since Apple&#8217;s servers hold the decryption key, the company can be asked (or their servers can be hacked) to provide a complete backup copy of your phone at any moment. Notably, since this all happens on the server side, you&#8217;ll never even know it happened. Every night your phone sends up a copy of its contents, and then you just have to <a href="https://blog.cryptographyengineering.com/2022/12/07/apple-icloud-and-why-encrypted-backup-is-the-only-privacy-issue/">hope that nobody else obtains them</a>.</p></blockquote><h1>What about data protection law?</h1><p>Ordinarily, the automated or structured processing of personal data is subject to the UK GDPR.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a> However, many of the data protection obligations imposed by this regulation do not apply to processing carried out in the context of national security.</p><p>Such an exemption can be found in the Data Protection Act 2018 (DPA 2018). <a href="https://www.legislation.gov.uk/ukpga/2018/12/section/26">Section 26(1)(a)</a> of the DPA 2018 states that certain provisions of the UK GDPR do not apply if the exemption from such provisions is necessary for the purpose of safeguarding national security.</p><p>The exempted provisions in this case include, among others:</p><ul><li><p>The data protection principles (except for lawfulness and therefore also Article 6 on the lawfulness of processing and Article 9 on special categories data)</p></li><li><p>Data subject rights</p></li><li><p>Notification of data breaches to the Information Commissioner and data subjects</p></li><li><p>International data transfers</p></li></ul><p>This exemption could apply to <em>any</em> data controller, even if they are not a government department or other public body. The national security exemption could therefore even apply to a private company like Apple.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a></p><p>A Minister of the Crown can certify that a national security exemption from certain data protection law provisions is required in relation to certain personal data or processing where such are necessary for safeguarding national security.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a> Under the DPA 2018, a 'Minister of the Crown' means a member of the Cabinet or the Attorney General or the Advocate General for Scotland.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-13" href="#footnote-13" target="_self">13</a></p><p>So in Apple's case, if a national security certificate was issued along with the TCN, it would exempt the company from certain data protection obligations with respect to the iCloud data sought by the UK government.</p><h1>What about human rights law?</h1><p>Last year I wrote a <a href="https://www.thecybersolicitor.com/p/end-to-end-encryption-is-a-human">post</a> about an important decision from the European Court of Human Rights (ECtHR) which held that data acquisition orders requiring the decryption of communications protected by E2EE are unlawful.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-14" href="#footnote-14" target="_self">14</a> This was on three main grounds:</p><ol><li><p>Weakening E2EE would make all users of the service implementing E2EE more vulnerable, therefore impacting those who pose no threat or are otherwise of no interest to government agencies.</p></li><li><p>Creating backdoors opens the possibility for indiscriminate surveillance of personal electronic communications.</p></li><li><p>Such backdoors could also be exploited by criminal networks for nefarious purposes.</p></li></ol><p>Since the TCN has not been publicly disclosed, and since Apple cannot reveal its existence or contents, we do not know if the data acquisition is in relation to iCloud data protected by E2EE or protected by Apple's standard encryption measures with which the company could decrypt the data. If the latter, then it would not require the weakening of E2EE and (potentially) escape the criticisms highlighted by the ECtHR.</p><p>However, if the order relates to data protected by E2EE, then this would appear to fall foul of the Court's stipulations: orders for the weakening or removal of E2EE constitute an unlawful interference with the right to privacy under Article 8 of the European Convention on Human Rights.</p><h1>So what can Apple do next?</h1><p>Apple could fight back.</p><p>The IPA 2016 does include a procedure for challenging TCNs. Under this procedure, Apple could challenge the TCN if its obligations are unreasonable.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-15" href="#footnote-15" target="_self">15</a> It can refer it back to the government for review, requiring JCs and technical experts to consider the pros and cons of the TCN, resulting in either its variation, revocation or replacement.</p><p>Failing this, Apple could commence judicial review proceedings contending that the TCN contains obligations that are incompatible with the Human Rights Act 1998.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-16" href="#footnote-16" target="_self">16</a> Under <a href="https://www.legislation.gov.uk/ukpga/1998/42/section/7">s.7(1)(a)</a> of the Human Rights Act 1998, a person who claims that a public authority has infringed their rights may bring proceedings against that authority in the appropriate court of tribunal. To this effect, the Investigatory Powers Tribunal has jurisdiction to hear cases against the security and intelligence agencies, and certain other public authorities, to determine whether such authorities have complied with the 1998 Act when using their surveillance powers.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-17" href="#footnote-17" target="_self">17</a></p><p></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/p/the-uks-icloud-backup-order-explained?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Cyber Solicitor! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/p/the-uks-icloud-backup-order-explained?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thecybersolicitor.com/p/the-uks-icloud-backup-order-explained?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Investigatory Powers Act 2016, <a href="https://www.legislation.gov.uk/ukpga/2016/25/section/227">s.227(2)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>Investigatory Powers Act 2016, <a href="https://www.legislation.gov.uk/ukpga/2016/25/section/253">s.253</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>Investigatory Powers Act 2016, <a href="https://www.legislation.gov.uk/ukpga/2016/25/section/253">s.253(3)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>Investigatory Powers Act 2016, <a href="https://www.legislation.gov.uk/ukpga/2016/25/section/261">ss.261(10), (11) and (13))</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>Investigatory Powers Act 2016, <a href="https://www.legislation.gov.uk/ukpga/2016/25/section/253">ss.253(1)(a) and (b)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>Investigatory Powers (Technical Capability) Regulations 2018, SI 2018/353, <a href="https://www.legislation.gov.uk/uksi/2018/353/regulation/4/made">reg. 4(3)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>Technical Capability Regulations 2018, <a href="https://www.legislation.gov.uk/uksi/2018/353/regulation/2/made">reg. 2</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p>Investigatory Powers Act 2016, <a href="https://www.legislation.gov.uk/ukpga/2016/25/section/253">s.253(3)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p>Investigatory Powers Act 2016, <a href="https://www.legislation.gov.uk/ukpga/2016/25/section/255">s.255(8)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p>UK GDPR, <a href="https://www.legislation.gov.uk/eur/2016/679/article/2">Article 2.1</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-11" href="#footnote-anchor-11" class="footnote-number" contenteditable="false" target="_self">11</a><div class="footnote-content"><p><em><a href="https://www.bailii.org/cgi-bin/format.cgi?doc=/ew/cases/EWHC/QB/2020/1812.html">Aven v Orbis Business Intelligence</a></em> [2020] EWHC 1812 (QB), para. 108.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-12" href="#footnote-anchor-12" class="footnote-number" contenteditable="false" target="_self">12</a><div class="footnote-content"><p>Data Protection Act 2018, <a href="https://www.legislation.gov.uk/ukpga/2018/12/section/27">s.27(1)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-13" href="#footnote-anchor-13" class="footnote-number" contenteditable="false" target="_self">13</a><div class="footnote-content"><p>Data Protection Act 2018, <a href="https://www.legislation.gov.uk/ukpga/2018/12/section/27">s.27(10)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-14" href="#footnote-anchor-14" class="footnote-number" contenteditable="false" target="_self">14</a><div class="footnote-content"><p><em><a href="https://hudoc.echr.coe.int/eng/#{%22itemid%22:[%22001-230854%22]}">Podchasov v Russia</a></em>, App no. 33696/19 (ECHR, 13 February 2024).</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-15" href="#footnote-anchor-15" class="footnote-number" contenteditable="false" target="_self">15</a><div class="footnote-content"><p>Investigatory Powers Act 2016, <a href="https://www.legislation.gov.uk/ukpga/2016/25/section/257">s.257(1)</a> and Technical Capability Regulations, <a href="https://www.legislation.gov.uk/uksi/2018/353/regulation/2/made">reg. 2(2)</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-16" href="#footnote-anchor-16" class="footnote-number" contenteditable="false" target="_self">16</a><div class="footnote-content"><p>The Human Rights Act 1998 transposes the rights under the European Convention for Human Rights into UK law. See <a href="https://www.legislation.gov.uk/ukpga/1998/42/section/1">s.1</a> of the 1998 Act.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-17" href="#footnote-anchor-17" class="footnote-number" contenteditable="false" target="_self">17</a><div class="footnote-content"><p>See Regulation of Investigatory Powers Act 2000, <a href="https://www.legislation.gov.uk/ukpga/2000/23/section/65">s.65(2)(a)</a>. See also <em><a href="https://www.bailii.org/uk/cases/UKSC/2009/12.html">R(A) v B</a></em> [2009] UKSC 12.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[A history of British SIGINT (#1); the origins, 1850-1918]]></title><description><![CDATA[From the Second Boer War to the First World War]]></description><link>https://www.thecybersolicitor.com/p/a-history-of-british-sigint-1-the</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/a-history-of-british-sigint-1-the</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 31 Jan 2025 09:01:58 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/dc5a3c20-f302-4c88-acd2-7ba014110ff8_1464x1004.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is the first in a series covering the history of British signals intelligence (SIGINT). It looks at how SIGINT emerged, its initial development during the Second Boer War and the success it had during WWI.</p><p>Here are the key takeaways:</p><ul><li><p>SIGINT may have significantly matured during WWI, but it did not begin at that point. SIGINT was a practice starting to develop during the 1850s, and was first put to the test during the Second Boer War between 1899 and 1902.</p></li><li><p>SIGINT operations during the Boer War were not that advanced. However, it provided a glimpse into the value of such intelligence, and this combined with the growth of radio encouraged Britain to grow its SIGINT capabilities.</p></li><li><p>By the time WWI came around in 1914, Britain was well-positioned to deploy its SIGINT operations. The advantages it gave the British during the conflict was fairly consistent, and saw its intelligence community grow very quickly.</p></li><li><p>The most important contribution British SIGINT made to WWI was the interception and decoding of the infamous Zimmermann telegram. This act, which revealed German plans to engage in submarine warfare in the North Atlantic and its proposal to Mexico for a military alliance, would bring the US into the war and help secure an Allied victory.</p></li><li><p>WWI proved crucial for the development of British SIGINT in numerous ways. This includes the utilisation of cable networks and the private sector, the establishment of MI5 and MI6, the advancements in both interception <em>and</em> codebreaking, and the importance of capturing codebooks to enable the deciphering of encrypted messages.</p></li></ul><h1>What is SIGINT?</h1><p>Simply put, signals intelligence (SIGINT) is the practice of extracting information from intercepted communications.</p><p>A more sophisticated definition is provided in <a href="https://www.legislation.gov.uk/ukpga/1994/13/section/3">s.3(1)(a)</a> of the Intelligence Services Act 1994, which spells out the function of the Government Communications Headquarters (GCHQ) as the agency responsible for British SIGINT. That provision states that the function of GCHQ is to:</p><blockquote><p>...to monitor, make use of or interfere with electromagnetic, acoustic and other emissions and any equipment producing such emissions and to obtain and provide information derived from or related to such emissions or equipment and from encrypted material...</p></blockquote><p>Today, much of SIGINT is obtained via cyberspace. Because of this, almost everyone with access to the internet could be subject to SIGINT operations by GCHQ and other intelligence agencies around the world. The proliferation of the internet and the communications it conveys has led to a perception of mass surveillance, whereby the state is able to tap into and collect any communications or information that it wants, whenever it wants, however it wants and from whoever and wherever without limitations or constraints. The prospect of such mass surveillance received particularly widespread attention in 2013 after the <a href="https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded">Snowden revelations</a>.</p><h1>Why write about the history of SIGINT?</h1><p>The Snowden revelations are what got me interested in the data rights space. It highlighted the importance of the happenings in the intersection between technology, the law and society. In other words, it highlighted to me how technological development has a significant impact on our wider society, and it is important to understand the risks that arise from this and how we deal with those risks to ensure a healthy and well-functioning society.</p><p>However, I felt that the Snowden revelations put a lot of focus on the regulation of SIGINT and how our security and intelligence agencies (SIAs) carry this out. And rightfully so of course - the revelations exposed the unlawful intelligence operations of the US and UK SIAs, in particular the NSA and GCHQ respectively, which eventually led to an improved legal framework (though it is far from perfect).</p><p>But an aspect of the debate that I think was missing was the importance of SIGINT and why it even exists in the first place. This does make sense in way, since the SIAs enjoy a great deal of secrecy and exclusivity regarding their work. <a href="https://www.thecybersolicitor.com/p/what-even-is-national-security">Cf</a>. from <em>What even is national security?</em>:</p><blockquote><p>There are two key elements to the veil of national security:</p><ol><li><p>Secrecy</p></li><li><p>Exclusivity</p></li></ol><p>The first key element is about national security matters being protected from public eyes and therefore barred from public discussion. Such secrecy applies to information about national security threats, the methods used to combat them, and anything else that is relevant to these operations.</p><p>Secrecy is maintained by the 'neither confirm nor deny' (NCND) policy. This is a principle that the government will not confirm nor deny the accuracy of information related to national security matters if doing so would damage national security.</p><p>When invoked, the government will not respond to questions, claims or allegations about its national security work. This policy has been used in Parliamentary debate and in court proceedings.</p><p>The second key element is about matters of national security being solely reserved for the government and its agencies. This means that it is not for the courts or the legislature to decide which threats to prioritise and how they should be addressed.</p><p>Exclusivity is maintained by the separation of powers. This is a long-standing public law principle that the institutions of the state (the executive, the legislature and the judiciary) should be functionally independent.</p><p>This means that none of these institutions should be able to exercise the powers of the other. Only the executive can execute national security policy, only the legislature can pass national security laws, and only the judiciary can provide legal judgments on national security law and policy.</p><p>The rationale for secrecy and exclusivity is the operational efficacy of national security. Both elements contribute to this efficacy in different ways.</p><p>Secrecy prevents adversaries from learning about the measures used against them by the state and adapting their behaviour accordingly. Exclusivity ensures that national security decisions are made by agencies with the relevant information, resources and expertise.</p><p>These ideas were explored in the <em><a href="https://www.bailii.org/uk/cases/UKPC/1916/1916_24.html">Zamora Case</a></em> in 1916. This case concerned whether an order could be made by the government to requisition a neutral ship carrying contraband (copper) during wartime.</p><p>It was determined that such an order was illegal. But even in making this judgement, the House of Lords made reference the veil of national security.</p><p>On secrecy, it was asserted that matters of national security should not be &#8220;made the subject of evidence in a Court of law or otherwise discussed in public.&#8221; On exclusivity, it was asserted that &#8220;those responsible for the national security must be the sole judges of what the national security requires.&#8221;</p><p>Justifications have therefore been made for the veil of national security. It ultimately provides agencies like GCHQ and MI5 the opportunity to do their job effectively.</p><p>But another consequence of the veil is that it makes it more difficult to determine what national security actually is. It can distort what constitutes a national security threat and how they should be addressed.</p><p>This in turn complicates the scrutiny and accountability of government agencies responsible for executing national security operations. It is hard to critique the work of these agencies when their internal workings are largely inaccessible.</p></blockquote><p>This has driven me to better understand the work of the SIAs, and in particular the work of GCHQ as the agency responsible for British SIGINT. I have always thought that a better understanding of this would provide a sound foundation to develop appropriate legislation covering such activity. By looking at the historical evolution of British SIGINT in particular, we can see how the capabilities of SIGINT have changed over time and the associated policy implications this has had.</p><p>Accordingly, this series aims to explore that historical evolution, starting with this post which covers the beginnings of British SIGINT in the 1850s and its eventual maturation during WWI. I will do so with the help of several books on the subject, including but not limited to:</p><ul><li><p>Richard J. Aldrich and Rory Cormac, <em>The Black Door: Spies, Secret Intelligence and British Ministers</em> (William Collins 2016)</p></li><li><p>Paul F Scott, <em>The National Security Constitution</em> (Hart Publishing 2018)</p></li><li><p>John Ferris, <em>Behind the Enigma: The Authorised History of GCHQ, Britain&#8217;s Secret Cyber-Intelligence Agency</em> (Bloomsbury 2020)</p></li><li><p>David Khan, <em>Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943</em> (Frontline Books 2023)</p></li></ul><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecybersolicitor.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">The Cyber Solicitor is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/a-history-of-british-sigint-1-the">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Intelligence sharing under the IPA 2016 explained]]></title><description><![CDATA[The rules that apply to intelligence partnerships between the UK and foreign authorities]]></description><link>https://www.thecybersolicitor.com/p/intelligence-sharing-under-the-ipa</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/intelligence-sharing-under-the-ipa</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 13 Sep 2024 08:00:34 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/cb268976-4003-42a5-998e-f19c25ef1f73_424x599.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is about the rules that apply to intelligence sharing arrangements between UK public authorities and foreign authorities under the Investigatory Powers Act 2016. It looks at how the Act regulates intelligence requests made to and by foreign authorities, as well as requests made directly to UK telecommunications operators by foreign &#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/intelligence-sharing-under-the-ipa">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Once it is there, it is there forever]]></title><description><![CDATA[When techno-solutionism and function creep combine]]></description><link>https://www.thecybersolicitor.com/p/once-it-is-there-it-is-there-forever</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/once-it-is-there-it-is-there-forever</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 06 Sep 2024 08:00:45 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/46b0e7e4-dfd7-4e2b-92a3-f992c66dff2f_4260x2840.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>It should be obvious at this point that our societies are becoming increasingly reliant and dominated by technology.</p><p>In his book <em>The Coming Wave: AI, Power and the 21st Century</em>, Suleyman identifies several factors that drive this trend. These include:<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><ul><li><p><strong>Competition.</strong> Technological innovation is required to gain an advantage over others, and this applies to c&#8230;</p></li></ul>
      <p>
          <a href="https://www.thecybersolicitor.com/p/once-it-is-there-it-is-there-forever">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Interception warrants under the IPA 2016 explained]]></title><description><![CDATA[An overview of the rules on the interception of communications by state agencies in the UK]]></description><link>https://www.thecybersolicitor.com/p/interception-warrants-under-the-ipa</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/interception-warrants-under-the-ipa</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 16 Aug 2024 08:01:13 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f3e2376e-db0a-42da-b9c9-563c06052783_3200x1590.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1>TL;DR</h1><p>This newsletter is about the power of UK public authorities to intercept communications under the <a href="https://www.legislation.gov.uk/ukpga/2016/25/contents">Investigatory Powers Act 2016</a>. It looks the conduct that can be permitted under an interception warrant, the kind of data that can be obtained and the rules and restrictions that apply to such activity.</p><p>Here are the key takeaways:</p><ul><li><p>Interception warrants a&#8230;</p></li></ul>
      <p>
          <a href="https://www.thecybersolicitor.com/p/interception-warrants-under-the-ipa">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Is the UK about to ban end-to-end encryption?]]></title><description><![CDATA[A look at the upcoming changes to UK state surveillance law]]></description><link>https://www.thecybersolicitor.com/p/is-the-uk-about-to-ban-end-to-end</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/is-the-uk-about-to-ban-end-to-end</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 02 Feb 2024 09:00:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vRe0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vRe0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vRe0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vRe0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vRe0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vRe0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vRe0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg" width="1456" height="963" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:963,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2203290,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vRe0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg 424w, https://substackcdn.com/image/fetch/$s_!vRe0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg 848w, https://substackcdn.com/image/fetch/$s_!vRe0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!vRe0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff08e9519-7ee9-420a-8065-10e8fff88436_3000x1985.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image from <a href="https://pixabay.com/users/arttower-5337/">ArtTower</a></figcaption></figure></div><h1>TL;DR</h1><p>This newsletter is about the the proposed <a href="https://bills.parliament.uk/publications/53420/documents/4180">amendments</a> to the UK's Investigatory Powers Act 2016. It looks at the provisions concerning technical capability notices and the implications this may have for end-to-end encryption.</p><p>Here are the key takeaways:</p><ul><li><p>The Investigatory Powers Act 2016 is the principal piece of legislation regulati&#8230;</p></li></ul>
      <p>
          <a href="https://www.thecybersolicitor.com/p/is-the-uk-about-to-ban-end-to-end">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[What even is national security?]]></title><description><![CDATA[A look at an important concept in state surveillance law]]></description><link>https://www.thecybersolicitor.com/p/what-even-is-national-security</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/what-even-is-national-security</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Fri, 19 Jan 2024 09:00:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!G5GT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G5GT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G5GT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png 424w, https://substackcdn.com/image/fetch/$s_!G5GT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png 848w, https://substackcdn.com/image/fetch/$s_!G5GT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png 1272w, https://substackcdn.com/image/fetch/$s_!G5GT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G5GT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png" width="1280" height="721" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/be0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:721,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2186723,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G5GT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png 424w, https://substackcdn.com/image/fetch/$s_!G5GT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png 848w, https://substackcdn.com/image/fetch/$s_!G5GT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png 1272w, https://substackcdn.com/image/fetch/$s_!G5GT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe0b4f41-168b-43e1-9715-bf7729c0397b_1280x721.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image from <a href="https://pixabay.com/users/arttower-5337/">ArtTower</a></figcaption></figure></div><h1>TL;DR</h1><p>This newsletter is about national security in the context of UK state surveillance. It looks at its definition, its key constituent elements and the evolution of its legal treatment over time.</p><p>Here are the key takeaways:</p><ul><li><p>National security is essentially about the state protecting is people from threats. However, the term 'national &#8230;</p></li></ul>
      <p>
          <a href="https://www.thecybersolicitor.com/p/what-even-is-national-security">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Is TikTok a national security threat?]]></title><description><![CDATA[Probably, but we ought to explore the argument in full]]></description><link>https://www.thecybersolicitor.com/p/is-tiktok-a-national-security-threat</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/is-tiktok-a-national-security-threat</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Mon, 05 Dec 2022 08:30:41 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Nm9H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Nm9H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Nm9H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png 424w, https://substackcdn.com/image/fetch/$s_!Nm9H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png 848w, https://substackcdn.com/image/fetch/$s_!Nm9H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png 1272w, https://substackcdn.com/image/fetch/$s_!Nm9H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Nm9H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png" width="842" height="595" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/fdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:595,&quot;width&quot;:842,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:249210,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Nm9H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png 424w, https://substackcdn.com/image/fetch/$s_!Nm9H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png 848w, https://substackcdn.com/image/fetch/$s_!Nm9H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png 1272w, https://substackcdn.com/image/fetch/$s_!Nm9H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdbf460b-4afa-40e1-ab73-dc52189e321d_842x595.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>
      <p>
          <a href="https://www.thecybersolicitor.com/p/is-tiktok-a-national-security-threat">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Reining in Government Hacking in the UK]]></title><description><![CDATA[A legal history of GCHQ computer hacking]]></description><link>https://www.thecybersolicitor.com/p/reining-in-government-hacking-in-the-uk</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/reining-in-government-hacking-in-the-uk</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Tue, 23 Feb 2021 15:08:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WcL7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WcL7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WcL7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WcL7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WcL7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WcL7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WcL7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg" width="1024" height="614" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/e1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:614,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!WcL7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg 424w, https://substackcdn.com/image/fetch/$s_!WcL7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg 848w, https://substackcdn.com/image/fetch/$s_!WcL7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!WcL7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1d5a5c6-fd7d-4d81-9fe3-729d479546ac_1024x614.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>On 8 January 2021, the High Court delivered its judgment on <em><a href="https://www.bailii.org/ew/cases/EWHC/Admin/2021/27.html">Privacy International v IPT &amp; Others (2021)</a></em>, a case concerning computer hacking operations carried out by GCHQ. This ruling specifically focused on the scope of property interference warrants under <a href="https://www.legislation.gov.uk/ukpga/1994/13/section/5">section 5</a> of the Intelligence Services Act 1994 (ISA 1994). GCHQ applies for these warrants as pa&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/reining-in-government-hacking-in-the-uk">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[What the Tik Tok Ban Really Shows]]></title><description><![CDATA[The ByteDance-Beijing relationship is more familiar than one may think]]></description><link>https://www.thecybersolicitor.com/p/what-the-tik-tok-ban-really-shows</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/what-the-tik-tok-ban-really-shows</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Tue, 01 Sep 2020 10:59:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HJy8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HJy8!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HJy8!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png 424w, https://substackcdn.com/image/fetch/$s_!HJy8!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png 848w, https://substackcdn.com/image/fetch/$s_!HJy8!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png 1272w, https://substackcdn.com/image/fetch/$s_!HJy8!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HJy8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png" width="1023" height="723" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:723,&quot;width&quot;:1023,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!HJy8!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png 424w, https://substackcdn.com/image/fetch/$s_!HJy8!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png 848w, https://substackcdn.com/image/fetch/$s_!HJy8!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png 1272w, https://substackcdn.com/image/fetch/$s_!HJy8!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F67b3f05c-22f9-43be-9226-f09045098c2f_1023x723.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>On 14 August, President Trump issued an <a href="https://home.treasury.gov/system/files/136/EO-on-TikTok-8-14-20.pdf">Executive Order</a> (EO) giving ByteDance 90 days to divest the US operations of Tik Tok, its highly popular social media platform. The EO retrospectively invalidates the 2017 acquisition of Music.ly (the predecessor to Tik Tok), and requires ByteDance, along with its subsidiaries and Chinese investors, to cease owner&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/what-the-tik-tok-ban-really-shows">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Equipment Interference: an Unruly Horse?]]></title><description><![CDATA[The future of UK State surveillance has serious implications attached to it]]></description><link>https://www.thecybersolicitor.com/p/equipment-interference-an-unruly-horse</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/equipment-interference-an-unruly-horse</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Sun, 24 Mar 2019 16:59:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!E-4h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!E-4h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!E-4h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg 424w, https://substackcdn.com/image/fetch/$s_!E-4h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg 848w, https://substackcdn.com/image/fetch/$s_!E-4h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!E-4h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!E-4h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg" width="1456" height="972" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:972,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!E-4h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg 424w, https://substackcdn.com/image/fetch/$s_!E-4h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg 848w, https://substackcdn.com/image/fetch/$s_!E-4h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!E-4h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F544b3253-7fc6-4bae-9d80-2356b2bf80e6_2065x1378.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Many years ago, the most precious property one could own was their private papers. At least this was the notion exhibited in one of the landmark cases in public law, that of <em><a href="https://www.bailii.org/ew/cases/EWHC/KB/1765/J98.html">Entick v Carrington</a></em>.</p><p>In that 18th century case, the Earl of Halifax, a member of the King&#8217;s Privy Council, issued a warrant authorising the King&#8217;s messengers to enter the premises of&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/equipment-interference-an-unruly-horse">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Still a Work in Progress]]></title><description><![CDATA[The UK government is yet to implement a fully lawful mass surveillance regime]]></description><link>https://www.thecybersolicitor.com/p/still-a-work-in-progress</link><guid isPermaLink="false">https://www.thecybersolicitor.com/p/still-a-work-in-progress</guid><dc:creator><![CDATA[Mahdi Assan]]></dc:creator><pubDate>Tue, 15 May 2018 18:46:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!pEm6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pEm6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pEm6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pEm6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pEm6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pEm6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pEm6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pEm6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pEm6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pEm6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pEm6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1deb3c2d-f3a4-4a22-93f8-35b4d7285df8_3840x2560.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Last month, the <a href="http://www.legislation.gov.uk/ukpga/2016/25/contents/enacted">Investigatory Powers Act 2016</a>, commonly known as the &#8216;Snoopers Charter&#8217;, passed some hurdles but stumbled at others after the High Court gave the <a href="https://www.judiciary.gov.uk/wp-content/uploads/2018/04/liberty-v-home-office-judgment.pdf">first judgment</a> on the statute since it came into force.&#185; Thus, the UK&#8217;s surveillance laws remain, at least for now, somewhat incompatible with the requirements of EU law. Such a judgment will n&#8230;</p>
      <p>
          <a href="https://www.thecybersolicitor.com/p/still-a-work-in-progress">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>