Covert policing : law and practice / Simon McKay.
2011
KD8335 .M35 2011 (Map It)
Available at Cellar
Formats
Format | |
---|---|
BibTeX | |
MARCXML | |
TextMARC | |
MARC | |
DublinCore | |
EndNote | |
NLM | |
RefWorks | |
RIS |
Items
Details
Title
Covert policing : law and practice / Simon McKay.
Published
Oxford, UK ; New York : Oxford University Press, 2011.
Call Number
KD8335 .M35 2011
ISBN
9780199289103 (cloth : alk. paper)
0199289107 (cloth : alk. paper)1
0199289107 (cloth : alk. paper)1
Description
xxxix, 356 pages ; 26 cm
System Control No.
(OCoLC)708051872
Bibliography, etc. Note
Includes bibliographical references and index.
Record Appears in
Table of Contents
Table of Cases
xvii
Table of Legislation
xxvii
Table of European Legislation
xxxvii
List of Abbreviations
xxxix
1.
An Introduction to Covert Policing Law and Practice: Exploring and Applying Methodology of Approach
A.
Introduction
1
The evolution of covert policing law in the United Kingdom
1
Halford v. The United Kingdom
7
Khan v The United Kingdom
10
B.
The Regulation of Investigatory Powers Act 2000
17
Overview
17
Section 80 RIPA's self-imposed limitations
23
C.
The Need for Methodology of Approach
36
Rv Rosenberg
41
D.
Evolving an Approach
47
Introduction
47
Methodology of approach
56
Conceptual considerations
61
Substantive matters
74
Practical application
79
E.
Summary and Structure of the Book
88
2.
Privacy, Proportionality and Other Human Rights Principles
B.
The Human Rights Context
6
European Convention on Human Rights
6
Human Rights Act 1998
10
C.
Article 8 of the European Convention on Human Rights
13
Introduction
13
Approaching Article 8
15
Key Strasbourg jurisprudence on scope and extent of privacy rights
36
D.
The Evolution of Privacy Law in the United Kingdom
64
Introduction
64
Domestic jurisprudence: tracing the modern origins of privacy law
71
E.
Proportionality
119
Introduction
119
Proportionality: practical application
124
Assistance derived from other jurisdictions
141
F.
Other Human Rights Principles
147
Collateral intrusion
147
Margin of appreciation
156
The inter-relationship between Article 8 and Article 6 ECHR
161
G.
Conclusion
185
3.
Interception of Communications
A.
Interception of Communications in Context
1
Introduction
1
Historical perspective
6
B.
The Regulation of Investigatory Powers Act 2000 and the Interception of Communications
40
Introduction
40
Sections (1)-(5): what, how and when
41
The facts and issues
66
The Court's approach
68
The Court's analysis
74
EC Directive 2002/58/EC
86
The question of legal certainty
88
In the course of transmission: conclusions
91
Lawful interception
96
Sections 6 to 14 Procedural requirements
106
Sections 15 to 19 What can and cannot be done with intercepted material
121
Legal professional privilege and confidential information
150
Foreign intercept
153
Bankruptcy proceedings
154
C.
European Convention on Human Rights
155
D.
The Future of the Admissibility of Intercept
161
4.
The Acquisition and Disclosure of Communications Data
B.
The Code of Practice
4
Overview
4
Relevant public authorities
6
Relationship with Part I of RIPA
11
C.
Statutory Provisions
26
Traffic data
30
Communications data
42
Key actors: the single point of contact, designated person and senior responsible officer
58
Immediate threats to life
76
Applications and authorizations
79
D.
Matters Arising out of the Code of Practice
130
Record keeping
130
Errors and excess data
134
Additional matters
138
5.
Surveillance
The scope of s̀urveillance' as a covert policing resource
1
B.
Surveillance Law: Statutory Sources
8
An overview
8
The Regulation of Investigatory Powers Act 2000
15
C.
Statutory Definitions of Surveillance
30
Surveillance
30
Matters common to both directed and intrusive surveillance
34
Directed surveillance
41
Intrusive surveillance
48
D.
Applications for Authorization: Requirements
56
General best practice
56
Directed surveillance authorizations
62
Intrusive surveillance
82
E.
Other Matters Relating to Authorization
129
Record keeping
129
Special circumstances arising during the authorization process
132
E.
Overt Photography, CCTV and Related Issues
150
Photography
150
CCTV
171
Surveillance of employees
185
Admissibility
188
G.
Other Practical Issues
194
Observation posts
194
Surveillance product and voice identification
197
H.
The Future of Surveillance
198
6.
Property Interference
Background and context
1
B.
The Legislative Matrix
10
The Intelligence Services Act 1994
10
The Police Act 1997, Part III
23
Legal privilege
63
Confidential, personal and journalistic material
74
Inter-relationship between Intelligence Services Act 1994, Police Act 1997, Part III, and RIPA
77
7.
Covert Human Intelligence Sources
B.
Defining Covert Human Intelligence Sources
3
Allan v United Kingdom
14
C.
Authorization
24
Special circumstances arising during the authorization process
37
Confidential and privileged material
38
D.
Vulnerable and Juvenile Sources
53
E.
Inter-relationship with Use and Conduct of Covert Human Intelligence Sources and Other Covert Policing Resources
60
F.
Participation in Criminality
66
G.
Rewards: Reduction in Sentence (Texts) and Payments
84
Reduction in sentence
84
Payments
90
H.
Cell Confessions
93
Regulatory position: application of RIPA
95
Implications for the trial process
98
Article 6 and self incrimination
101
I.
Disclosure in Criminal Proceedings
117
J.
Entrapment
147
Introduction
147
The evolution of the common law
151
The law after PACE
162
Entrapment post-HRA
171
Conclusions on exclusion and doctrine of abuse of process
177
R v Looseley: evolving practical principles
183
K.
Civil Liability
200
8.
The Investigation of Data Protected by Encryption
B.
Regulation of Investigatory Powers Act 2000, Part III
9
Persons having appropriate permission
10
Applications
11
Section 49 Notices
33
Obligations on service of notice and self incrimination
46
Self incrimination: overview of basic principles
53
R v S and A
57
Cases where a key is required
61
Offences
67
Safeguards
80
Record keeping
84
Oversight
86
C.
Future Issues
87
9.
Trial Issues
B.
Admissibility
7
Common law principles on the admissibility of evidence arising from covert policing operations
7
The law after PACE
13
The emergence of the doctrine of abuse of process as the primary remedy in cases of state impropriety
19
Abuse of process and state impropriety after HRA
22
Intercept evidence
32
Other limitations placed on the questioning of witnesses
48
C.
The Rights Engaged
49
Self incrimination
50
Legal professional privilege
62
D.
Protecting Covert Sources, Techniques and Methodology
83
R v Dawson: evidence, intelligence and proof
83
Public interest immunity and special advocates
99
R v H; R v C
130
R v C; R v H: House of Lords
138
Screening and anonymity
148
E.
Future Issues
154
10.
Private and Non-regulated Surveillance
B.
Definition and Scope of the Problem
4
C.
Compliance: the Legal Framework
8
Data Protection Act 1998
10
The Protection from Harassment Act 1997
17
Regulation of the press and media
24
Regulatory compliance with RIPA: C v Police and Secretary of State
30
Compliance with RIPA as an issue of admissibility: R v Rosenberg
42
D.
Admissibility of Private Surveillance
49
Introduction
49
Surveillance cases
53
Cases involving èntrapment'
70
E.
Strasbourg's Approach to Private Surveillance
80
MM v The Netherlands
81
Van Vondel v The Netherlands
88
F.
Conclusion and Future Challenges
104
11.
Oversight
B.
Interception of Communications Commissioner
2
C.
Intelligence Services Commissioner
10
D.
Investigatory Powers Commissioner for Northern Ireland
14
E.
Chief Surveillance Commissioner
16
F.
The Investigatory Powers Tribunal
20
The Tribunal and the Convention
36
Neither confirm nor deny policy (NCND)
46
The justification issue
47
Privacy and illegality
53
Core and ordinary functions
56
G.
Criticisms of the Current Regime
59
H.
Conclusions
74
Index
339