Blackstone's Guide to the Investigatory Powers Act 2016


Book Description

This text provides a clear and accessible introduction to the Investigatory Powers Act, a foundational piece of UK national security law. This act is a blueprint for how state agencies, the police, and internet and telephone companies protect privacy and extract data to protect the public from terrorism and is used to prosecute serious criminals.




Blackstone's Guide to the Investigatory Powers Act 2016


Book Description

This text provides a clear and accessible introduction to the Investigatory Powers Act, a foundational piece of UK national security law. This act repeals part I, chapters 1 and 2 of the Regulation of Investigatory Powers Act 2000 and other surveillance legislation. This new legislation is the blueprint for how state agencies, the police, and internet and telephone companies protect privacy and extract data and information to protect the public from terrorism and is used to prosecute serious criminals. This legislation implements some parts of the recent comprehensive report by David Anderson QC, A Question of Trust: Report of the Investigatory Powers Review, it will put the Data Retention and Investigatory Powers Act 2014 on a substantive footing and attempt to bring existing legislation up to date to reflect technological advances. The passage of the bill was highly controversial and subject to considerable public criticism by the media and civil liberties and human rights groups as well as lobbying by insiders from the Security Service, the Secret Intelligence Service, GCHQ and the police. The Joint Committee on the Draft Investigatory Powers Bill criticised the Bill's definition of 'data' as "unclear, unhelpful, and recursive" and expressed concerns about the meaning of the term 'Internet Connection Record' as well as the Home Secretary's failure to make sufficient case as to the feasibility of their collection, retention, and use by law enforcement. All of these issues indicate the questions that practitioners will have to face when In the absence of other sources of reliable interpretation for practitioners, this Blackstone's Guide is essential in helping readers navigate and understand the new and complex set of provisions.




Protecting National Security


Book Description

This book contends that modern concerns surrounding the UK State’s investigation of communications (and, more recently, data), whether at rest or in transit, are in fact nothing new. It evidences how, whether using common law, the Royal Prerogative, or statutes to provide a lawful basis for a state practice traceable to at least 1324, the underlying policy rationale has always been that first publicly articulated in Cromwell’s initial Postage Act 1657, namely the protection of British ‘national security’, broadly construed. It further illustrates how developments in communications technology led to Executive assumptions of relevant investigatory powers, administered in conditions of relative secrecy. In demonstrating the key role played throughout history by communications service providers, the book also charts how the evolution of the UK Intelligence Community, entry into the ‘UKUSA’ communications intelligence-sharing agreement 1946, and intelligence community advocacy all significantly influenced the era of arguably disingenuous statutory governance of communications investigation between 1984 and 2016. The book illustrates how the 2013 ‘Intelligence Shock’ triggered by publication of Edward Snowden’s unauthorized disclosures impelled a transition from Executive secrecy and statutory disingenuousness to a more consultative, candid Executive and a policy of ‘transparent secrecy’, now reflected in the Investigatory Powers Act 2016. What the book ultimately demonstrates is that this latest comprehensive statute, whilst welcome for its candour, represents only the latest manifestation of the British state’s policy of ensuring protection of national security by granting powers enabling investigative access to communications and data, in transit or at rest, irrespective of location.




Handbook on the Rule of Law


Book Description

The discussion of the norm of the rule of law has broken out of the confines of jurisprudence and is of growing interest to many non-legal researchers. A range of issues are explored in this volume that will help non-specialists with an interest in the rule of law develop a nuanced understanding of its character and political implications. It is explicitly aimed at those who know the rule of law is important and while having little legal background, would like to know more about the norm.




Blackstone's Guide to the Proceeds of Crime Act 2002


Book Description

The Blackstone's Guide Series delivers concise and accessible books covering the latest legislative changes and amendments. Published soon after an Act they offer expert commentary by leading names on the effects, extent and scope of the legislation, plus a full copy of the Act itself. Theyoffer a cost-effective solution to key information needs and are the perfect companion for any practitioner needing to get up to speed with the latest changes.The Proceeds of Crime Act 2002 (POCA) came into force in February 2003, introducing a new anti-money laundering regime. It created the Asset Recovery Agency; introduced wide new powers in relation to the confiscation of criminal property; as well as new civil recovery and enforcement powers.The third edition provides a clear and accessible exploration of POCA, which has been completely updated to include all recent developments notably; the Serious Organised Crime and Police Act 2005 (SOCPA), the Criminal Procedure Rules 2005 and the Fraud Act 2006. It includes the full updated text ofPOCA 2002, plus other essential materials. Included are the Crown Court Rules governing procedures, forms and timetables, and Codes of Practice dealing with search, seizure warrants and production and disclosure orders.




A Question Of Trust


Book Description

[This convenience copy of the official report by the UK Independent Reviewer of Terrorism Legislation, made available under OGLv3 on a cost-only basis] Modern communications networks can be used by the unscrupulous for purposes ranging from cyber-attack, terrorism and espionage to fraud, kidnap and child sexual exploitation. A successful response to these threats depends on entrusting public bodies with the powers they need to identify and follow suspects in a borderless online world. But trust requires verification. Each intrusive power must be shown to be necessary, clearly spelled out in law, limited in accordance with international human rights standards and subject to demanding and visible safeguards. The current law is fragmented, obscure, under constant challenge and variable in the protections that it affords the innocent. It is time for a clean slate. This Report aims to help Parliament achieve a world-class framework for the regulation of these strong and vital powers.




Precursor Crimes of Terrorism


Book Description

This illuminating book offers a timely assessment of the development and proliferation of precursor crimes of terrorism, exploring the functions and implications of these expanding offences in different jurisdictions. In response to new modes and sources of terrorism, attempts to pre-empt potential attacks through precursor offences have emerged. This book examines not only the meanings and effectiveness of this approach, but also the challenges posed to human rights and social and economic development.




Covert Investigation


Book Description

The leading practical guide for anyone working in covert investigation. Containing new case law and updates to all the relevant legislation and codes of practice, the book is designed to help officers improve the quality of RIPA applications and ensure they are made in appropriate circumstances.




Covert Investigation Fifth Edition


Book Description

This guide contains all the legislation, codes of practice and case-law relating to covert investigation methods and examines the issues that investigators need to consider when deploying such investigative tools, concentrating on the implications of RIPA.




Ethics and Terrorism


Book Description

This book provides a unique insight into the ethical issues and dilemmas facing practitioners and researchers of terrorism and counterterrorism. Ethics play a central if, largely, unrecognised role in most, if not all, issues relevant to terrorism and political violence. These are often most noticeable regarding counterterrorism controversies, while often virtually absent from discussions about academic research practice. At a minimum, ethical issues as they relate to terrorism have rarely been explicitly addressed in a direct or comprehensive manner. The chapters in this edited volume draws on the experience of both practitioners and researchers to explore how a regard to ethical issues might influence and determine research and practice in counter terrorism, and in our understanding of terrorism. Ethics and Terrorism recognizes that there are conflicting and often irreconcilable perspectives from which to view terrorism and terrorism research. In calling for greater attention to these issues, the goal is not to resolve problems, but to explore and clarify the assumptions and dilemmas that underpin our understanding of the personal, institutional and societal ethical boundaries and constraints around terrorism and responses to it. This book will be of value to practitioners and researchers, and to policy makers and the broader interested community. The chapters in this book were originally published as a special issue of the journal Terrorism and Political Violence.