Back to main site

    Government-led Digital Surveillance

    Module 4: Data Privacy and Data Protection

    Communications surveillance encompasses the monitoring, intercepting, collecting, obtaining, analysing, using, preserving, retaining, interfering with, accessing or similar actions taken with regard to information that includes, reflects, arises from or is about a person’s communications in the past, present, or future.(1) This relates to both the content of communications and metadata about them, such as their location and connection points.  In respect of the latter, it has been noted that the aggregation of metadata may give deep insight into an individual’s behaviour, social relationships, private preferences and identity.  Taken as a whole, it may allow very precise conclusions to be drawn concerning the private life of a person.

    UN Human Rights Committee General Comment No. 16 provides: “Compliance with article 17 requires that the integrity and confidentiality of correspondence should be guaranteed de jure and de facto”.(2) Surveillance — both bulk (or mass) collection of data(3) or targeted collection of data — interferes directly with the privacy and security necessary for freedom of opinion and expression, and must be considered against the three-part test to assess its legitimacy.(4) In the digital age, Internet and Communications Technologies (ICTs) have enhanced the capacity of governments, corporations and individuals to conduct surveillance, interception and data collection, such that the ability to conduct such surveillance is no longer limited by scale or duration.(5)

    A resolution adopted by the UN General Assembly (UNGA) on the right to privacy in the digital age emphasised that unlawful or arbitrary surveillance and/or interception of communications, as well as the unlawful or arbitrary collection of personal data, are highly intrusive acts, violate the right to privacy, can interfere with the right to freedom of expression and may contradict the tenets of a democratic society, especially when undertaken on a mass scale.(6) It noted further that “surveillance of digital communications must be consistent with international human rights obligations and must be conducted on the basis of a legal framework, which must be publicly accessible, clear, precise, comprehensive and non-discriminatory.”(7)

    In order to meet the condition of legality, many states have taken steps to reform their surveillance laws to authorise surveillance activities.  According to the Necessary and Proportionate Principles (a series of principles on the application of human rights to surveillance elaborated by experts and privacy groups), communications surveillance should be regarded as a highly intrusive act, and in order to meet the threshold of proportionality, the state should be required at a minimum to establish the following before a competent judicial authority prior to conducting any surveillance:(8)

    • There is a high degree of probability that a serious crime or specific threat to a legitimate aim has been or will be carried out.
    • There is a high degree of probability that evidence relevant and material to such a serious crime or specific threat would be obtained by accessing the protected information sought.
    • Other less invasive techniques have been exhausted or would be futile, such that the technique used is the least invasive option.
    • Information accessed will be confined to that which is relevant and material to the serious crime or specific threat.
    • Any excess information collected will not be retained, but instead will be promptly destroyed or returned.
    • Information will be accessed only by the specified authority and used only for the purpose and duration for which authorisation was given.
    • The surveillance activities requested and techniques proposed do not undermine the essence of the right to privacy or other fundamental freedoms.

    Surveillance constitutes an obvious interference with the right to privacy.  Further, it also constitutes an interference on the right to hold opinions without interference and the right to freedom of expression.  With particular reference to the right to hold opinions without interference, surveillance systems, both targeted and mass, may undermine the right to form an opinion, as the fear of unwilling disclosure of online activity, such as search and browsing, likely deters individuals from accessing the information needed to form opinions, particularly where such surveillance leads to repressive outcomes.(9)

    The interference with the right to freedom of expression is particularly apparent in the context of journalists and members of the media who may be placed under surveillance as a result of their journalistic activities.  As noted by the Secretary-General of the UN, this can have a chilling effect on the enjoyment of media freedom and renders it more difficult to communicate with sources and share and develop ideas.(10) The use of encryption and other similar tools have become essential to the work of journalists to ensure that they are able to conduct their work without interference.

    The disclosure of journalistic sources through surveillance can have serious negative consequences for the right to freedom of expression due to confidential sources losing trust that journalists will be able to conceal  their identities.(11) This is the same for cases concerning the disclosure of anonymous user data. Once confidentiality is undermined, it cannot be restored. It is, therefore, of utmost importance that measures that undermine confidentiality are not undertaken arbitrarily.

    Surveillance activities carried out against journalists risk fundamentally undermining the right of source protection to which journalists are otherwise entitled.(12)

    The increased use of digital technologies and increasingly sophisticated surveillance tools have raised additional challenges for maintaining the anonymity of sources, including due to the risk of unintended source disclosure as a result of surveillance of communication devices.(13) For example, certain journalist sources in the US have been identified through telephone and email records.(14) (For more on the protection of journalist sources, please see Module 10 of this training course).

    Footnotes

    1. Necessary and proportionate: International principles on the application of human rights to communications surveillance, 2014 (Necessary and Proportionate Principles) at p 4 (accessible at: https://necessaryandproportionate.org/files/2016/03/04/en_principles_2014.pdf). Back
    2. General Comment No. 16 at para 8. Back
    3. Revelations by whistle-blowers, such as Edward Snowden, have revealed that the National Security Agency in the USA and the General Communications Headquarters in the United Kingdom had developed technologies allowing access to much global internet traffic, including records in the United States, individuals’ electronic address books and huge volumes of other digital communications’ metadata.  These technologies are deployed through a transnational network comprising strategic intelligence relationships between governments and other role-players. This is referred to as bulk or mass surveillance.  For more on the privacy concerns raised by the Snowden revelations, see Report of the Special Rapporteur on the right to privacy, UN Doc. A/HRC/34/60 (2017) (accessible at: https://documents-dds-ny.un.org/doc/UNDOC/GEN/G17/260/54/PDF/G1726054.pdf?OpenElement). Back
    4. 2016 Report of the UNSR on Freedom of Expression on Contemporary challenges to freedom of expression, UN Doc. A/71/373 at para 20 (accessible at: https://undocs.org/Home/Mobile?FinalSymbol=A%2F71%2F373&Language=E&DeviceType=Desktop&LangRequested=False). Back
    5. Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, Frank La Rue, A/HRC/23/40 (2013) (accessible at: https://www.ohchr.org/sites/default/files/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf). Back
    6. UNGA, ‘Resolution on the right to privacy in the digital age’, A/C.3/71/L.39/Rev.1, 16 November 2016 (2016 UN Resolution on Privacy) (accessible at: https://daccess-ods.un.org/tmp/3401807.84463882.html). Back
    7. Id. Back
    8. Necessary and proportionate: International principles on the application of human rights to communications surveillance, 2014 (Necessary and Proportionate Principles) at p 8 (accessible at: https://necessaryandproportionate.org/files/2016/03/04/en_principles_2014.pdf). Back
    9. Report of the UNSR on Freedom of Expression, ‘Report on anonymity, encryption and the human rights framework’, A/HRC/29/32, 22 May 2015 (UNSR Report on Anonymity and Encryption) at para 7 (accessible at: http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/CallForSubmission.aspx). For further discussion and resources, see UCI Law International Justice Clinic, ‘Selected references: Unofficial companion report to Report of the Special Rapporteur (A/HRC/29/32) on encryption, anonymity and freedom of expression’ at para 21 (accessible at: http://www.ohchr.org/Documents/Issues/Opinion/Communications/States/Selected_References_SR_Report.pdf). Back
    10. Report of the Secretary-General on the UN to the UNGA, ‘Report on the safety of journalists and the issue of impunity’, A/70/290, 6 August 2015 (2015 Report of the UN Secretary-General) at paras 14-16 (accessible at: https://documents-dds-ny.un.org/doc/UNDOC/GEN/N15/247/06/PDF/N1524706.pdf?OpenElement). Back
    11. For more, see Big Brother Watch v United Kingdom in the ECtHR (2018) (accessible at: https://globalfreedomofexpression.columbia.edu/cases/big-brother-watch-v-united-kingdom/). Back
    12. According to principle 9 of the Global Principles, states should provide for the protection of the confidentiality of sources in their legislation and ensure that: (1) Any restriction on the right to protection of sources complies with the three-part test under international human rights law. (2) The confidentiality of sources should only be lifted in exceptional circumstances and only by a court order, which complies with the requirements of a legitimate aim, necessity, and proportionality. The same protections should apply to access to journalistic material. (3) The right not to disclose the identity of sources and the protection of journalistic material requires that the privacy and security of the communications of anyone engaged in journalistic activity, including access to their communications data and metadata, must be protected. Circumventions, such as secret surveillance or analysis of communications data not authorised by judicial authorities according to clear and narrow legal rules, must not be used to undermine source confidentiality. (4) Any court order must only be granted after a fair hearing where sufficient notice has been given to the journalist in question, except in genuine emergencies. Back
    13. Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, A/70/361 (2015), para. 23 (accessible at: https://documents-dds-ny.un.org/doc/UNDOC/GEN/N15/273/11/PDF/N1527311.pdf?OpenElement). Back
    14. See, for example, United States of America v. Sterling, 724 F.3d 482 (2013). Back