Skip to main content
Top

Hint

Swipe to navigate through the chapters of this book

2023 | OriginalPaper | Chapter

Regulating Strategic Communications Investigation: The Investigatory Powers Act 2016 (UK) as an Exemplar for India

Author : Phil Glover

Published in: Comparative Approaches in Law and Policy

Publisher: Springer Nature Singapore

Abstract

This chapter posits that India should consider reforming its strategic communications investigation regulatory framework using the UK’s Investigatory Powers Act 2016 (UKIPA) as an exemplar (Investigatory Powers Act 2016 (UK) c25). It offers three arguments. The first is founded on the UK government’s pre-enactment comprehensive ‘social evaluation’ process involving the publication of draft legislation, extensive stakeholder consultation, and the commissioning of two independent expert reviews (themselves consultative) (These are (i) DAVID ANDERSON QC, INDEPENDENT REVIEWER OF TERRORISM LEGISLATION, A QUESTION OF TRUST: REPORT OF THE INVESTIGATORY POWERS REVIEW (2015, Her Majesty’s Stationery Office), hereafter IRTL, RIPR 2015. (ii) DAVID ANDERSON QC, INDEPENDENT REVIEWER OF TERRORISM LEGISLATION, REPORT OF THE BULK POWERS REVIEW (Cm 9326, August 2016), hereafter IRTL, BPR 2016). Australia is currently replicating this social evaluation process in anticipation of electronic surveillance regulatory reform (See generally Richardson [1]). Social evaluation additionally involved avowing all formerly secret state investigative powers (Equipment Interference and bulk data access powers). The UKIPA’s comprehensive legislative candour has led to it being judicially endorsed as an exemplar of statutory compliance with international and regional human rights norms (See generally Big Brother Watch and Others v UK (Applications nos. 58170/13, 62322/14 and 24960/15) (Grand Chamber) 25 May 2021). The chapter argues that India would thus benefit from a similar legislative approach. A final ‘pro-homogeneity’ argument addresses why India might wish to undertake UK-modelled reform in this area. India’s progressive strategic relationships with the UK and with QUAD partner Australia and their rapidly developing trilateral relationship set the context (Discussed at length in Australian National University National Security Podcast, Working with India: Understanding the Limits and Potential (14 July 2022) https://​play.​acast.​com/​s/​the-national-security-podcast/​working-with-india-understanding-the-limits-and-potential). The argument is that, as their respective national security-focused policies increasingly homogenise, so should their respective national security (including communications surveillance) laws. The chapter concludes with a call for comparative scholarly critique.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Investigatory Powers Act 2016 (UK) c25.
 
2
These are (i) DAVID ANDERSON QC, INDEPENDENT REVIEWER OF TERRORISM LEGISLATION, A QUESTION OF TRUST: REPORT OF THE INVESTIGATORY POWERS REVIEW (2015, Her Majesty’s Stationery Office), hereafter IRTL, RIPR 2015. (ii) DAVID ANDERSON QC, INDEPENDENT REVIEWER OF TERRORISM LEGISLATION, REPORT OF THE BULK POWERS REVIEW (Cm 9326, August 2016), hereafter IRTL, BPR 2016.
 
3
Universal Declaration of Human Rights, Article 12 ‘No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks’; Article 19 ‘Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers’. <https://​www.​un.​org/​sites/​un2.​un.​org/​files/​2021/​03/​udhr.​pdf>.
 
4
European Convention on Human Rights, Article 8(1) ‘Everyone has the right to respect for his private and family life, his home and his correspondence’; Article 10(1) Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers. Both rights are qualified at 8(2) and 10(2) respectively, in that signatory governments may interfere with them if the interference is ‘in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others’. <https://​www.​echr.​coe.​int/​documents/​convention_​eng.​pdf>.
 
5
Big Brother Watch and Others v UK (Applications nos. 58170/13, 62322/14 and 24960/15) (Grand Chamber) 25 May 2021.
 
6
Ibid., [426].
 
7
Ibid., [406]–[415].
 
8
Ni Loideain [2].
 
9
Ibid.
 
10
Wallace [3].
 
11
Discussed at length in Australian National University National Security Podcast, Working With India: Understanding the Limits and Potential (14 July 2022) https://​play.​acast.​com/​s/​the-national-security-podcast/​working-with-india-understanding-the-limits-and-potential.
 
12
Telegraph Act 1885, section 5, supplemented by the Information Technology Act 2000, section 69.
 
13
This chapter does not engage in a critical appraisal of India’s regulatory framework. A useful critique of India’s statutory provisions (principally lamenting a lack of proportionality and the existence of significant state discretion) appears in PRIVACY INTERNATIONAL, State of Privacy India https://​privacyinternati​onal.​org/​state-privacy/​1002/​state-privacy-india#commssurveillanc​e.
 
14
India as a multi-aligned democracy is discussed in a detailed analysis of India’s trilateral relations with the UK and Australia involving Lisa Singh, Director of the Australia India Institute, and Dr David Brewster, Senior Fellow at the Australia National University National Security College and hosted by Will Stolz, Australia National University on their National Security Podcast (14 July 2022) (supra n 11).
 
15
Noble [4].
 
17
UK Home Office [5].
 
18
UK Home Office [5, p. 6].
 
19
Nisbet and Syme [6].
 
20
Ibid.
 
21
Ibid., emphasis added.
 
22
The Investigatory Powers Tribunal (UK). See generally https://​www.​ipt-uk.​com/​.
 
23
See generally Investigatory Powers Commissioner’s Office website https://​www.​ipco.​org.​uk/​what-we-do/​the-double-lock/​.
 
24
UK Parliament [7].
 
25
UK HOME OFFICE, Draft Investigatory Powers Bill (Cm 9152, November 2015).
 
26
UK PARLIAMENT INTELLIGENCE AND SECURITY COMMITTEE, Privacy and Security: A Modern and Transparent Legal Framework (HC 1075-I).
 
27
IRTL, RIPR 2015 (supra, n 2).
 
28
ROYAL UNITED SERVICES INSTITUTE FOR DEFENCE AND SECURITY STUDIES, A Democratic Licence to Operate: Report of the Independent Surveillance Review.
 
29
UK HOME OFFICE, Draft Investigatory Powers Bill (supra n 25) Foreword, emphasis added.
 
30
Disclosure was considered as necessary in light of allegations of ‘state-sponsored hacking’ made to the UK Investigatory Powers Tribunal in Privacy International and Others v Secretary of State for Foreign and Commonwealth Affairs UKIPTrib (2016) 14/85 CH and 14/120–126 CH.
 
31
By virtue of secret Ministerial directions available under section 94 of the UK’s Telecommunications Act 1984.
 
32
Richardson [1]. A classified version was provided to the Government in December 2019 and a declassified version in July 2020.
 
33
Ibid., vol 2, 16 (Recommendation 75).
 
34
Commonwealth Government, Attorney-General’s Department [8].
 
35
Ibid.
 
36
AUSTRALIAN GOVERNMENT DEPARTMENT OF HOME AFFAIRS, Reform of Australia’s Electronic Surveillance Framework: Discussion Paper https://​www.​homeaffairs.​gov.​au/​reports-and-publications/​submissions-and-discussion-papers/​reform-of-australias-electronic-surveillance-framework-discussion-paper.
 
37
AUSTRALIAN GOVERNMENT, DEPARTMENT OF THE PRIME MINISTER AND CABINET, MR MICHAEL L’ESTRANGE AO AND MR STEPHEN MERCHANT PSM, Report of the 2017 Independent Intelligence Review. https://​www.​pmc.​gov.​au/​resource-centre/​national-security/​report-2017-independent-intelligence-review.
 
38
AUSTRALIAN GOVERNMENT ATTORNEY-GENERAL’S DEPARTMENT, Reducing the Complexity of Legislation https://​www.​ag.​gov.​au/​legal-system/​access-justice/​reducing-complexity-legislation.
 
39
Commonwealth Government Response (supra, n 34) 3.
 
40
AUSTRALIAN GOVERNMENT, Discussion Paper (supra n 36) 8.
 
41
AUSTRALIAN GOVERNMENT, Discussion Paper (supra n 36) 6.
 
42
Ibid. Part 1 ask “who can access information under the new framework?” Part 2, “What information can be accessed?” etc.
 
43
Investigatory Powers Act 2016 (UK) Preamble, emphasis added—these are the principal powers explored herein.
 
44
See now IPA 2016, Part 2 and Part 6.
 
45
IPA 2016 (UK), Part 5 and Part 6.
 
46
Privacy International and Others v Secretary of State for Foreign and Commonwealth Affairs and GCHQ [2016] UKIPTrib 14_85-CH.
 
47
Ibid., [3].
 
48
Ibid., [89] emphasis added.
 
49
The claimants successfully ‘overturned’ the UKIPT ruling on Issue 4, which related to property interference warrants issued under section 5 of the Intelligence Services Act 1994 (UK).
 
50
Privacy International and Others v United Kingdom (Application Number 46259/16).
 
51
ARTICLE 19 AND THE ELECTRONIC FRONTIERS FOUNDATION (EFF), Third-Party Intervention in Privacy international v United Kingdom (Application Number 46259) https://​www.​article19.​org/​wp-content/​uploads/​2019/​09/​Amicus-Brief-UK-A19-EFF-Sept-2019-Proofread.​pdf.
 
52
International Institute for Strategic Studies [9].
 
53
UK Home Office [10].
 
54
NI LOIDEAIN, supra n 8.
 
55
IRTL, BPR 2016 (supra, n 2) 21–22.
 
56
Ibid.
 
57
The ASD website states that ‘details of our signals intelligence and cyber capabilities (protective and disruptive) are necessarily secret … As an analyst, you may be involved in: analysis of communication systems analysis of foreign signals intelligence developing capabilities to perform your analysis using software development skills developing new methods of analysing and exploiting data for intelligence or information security purposes investigating large and complex data sets offensive cyber operations preparation of short-term or long-term information reports to government protecting Australia from cyber adversaries as part of ASD’s Australian Cyber Security Centre solving cryptological problems using advanced mathematical concepts translating foreign language material’. See generally ASD webpage https://​www.​asd.​gov.​au/​about.
 
58
Sakuhar [11].
 
59
Intelligence Services Act 1994 (UK), section 3(1) (a) GCHQ are ‘to monitor, make use of or interfere with electromagnetic, acoustic and other emissions and any equipment producing such emissions and to obtain and provide information derived from or related to such emissions or equipment and from encrypted material …’.
 
60
Rachel Noble (supra n 15).
 
61
The United States National Security Agency (NSA) have declassified and released many formerly top-secret documents relating to this longstanding agreement, The BRUSA is available at NSA/CSS, ‘UKUSA Agreement Release 1940–1956’, https://​www.​nsa.​gov/​Portals/​70/​documents/​news-features/​declassified-documents/​ukusa/​agreement_​outline_​5mar46.​pdf.
 
62
Ibid. (emphasis added).
 
63
Despite not stating ‘all traffic’, there appears no limitation to the amount of type of traffic to be collected, emphasis added.
 
64
Bauer describes this as the discipline of deciphering a ciphertext without having access to the keytext. See Bauer [12].
 
65
Ibid.
 
66
Telegraph Act 1885 (INDIA), section 5(2), The Central or State government … if satisfied that it is necessary or expedient so to do in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of an offence; Intelligence Services Act 1994 (UK) section 3(2), [GCHQ] functions … be exercisable only … in the interests of national security, with particular reference to the defence and foreign policies of Her Majesty’s Government in the United Kingdom; or (b) in the interests of the economic well-being of the United Kingdom in relation to the actions or intentions of persons outside the British Islands; or (c) in support of the prevention or detection of serious crime.
 
67
Deeks [13].
 
68
Australia’s then Minister for Home Affairs Karen Andrews, Foreign Intelligence Legislation Amendment Bill 2021 (Australia) Revised Explanatory Memorandum. The bill was enacted and amended Australia’s Telecommunications (Interception and Access) Act 1979, section 11(c) accordingly.
 
69
IRTL, BPR 2016 (supra, n 2).
 
70
Ibid. The latter power is not relevant to communications investigation.
 
71
See generally UK Foreign, Commonwealth and Development Office [14]. For example, Part III, ‘Defence and Security’ states India and the UK will work in strategic partnership to strengthen efforts to tackle cyber, space, crime and terrorist threats and develop a free, open and secure Indo-Pacific Region. Our shared interests will underpin greater cooperation in multilateral fora where a strengthened UK India relationship will build understanding among diverse partners on international security and will help set global rules for cyber security and space taking into account their respective interests.
 
72
UKPISC, PRIVACY AND SECURITY (supra n 26).
 
73
On the Capenhurst Tower scandal and the Liberty ECtHR challenge see Glover [15].
 
74
Liberty and Others v UK (2009) 48 EHRR 1.
 
75
Regulation of Investigatory Powers Act 2000 (UK) c.23 Part I, Chapter I regulated interception of communications, and Chapter II regulated the acquisition of communications metadata from communications service providers.
 
76
Big Brother Watch and Others v UK (Grand Chamber) (supra n 5).
 
77
IRTL, BPR 2016 supra (n 2) 23.
 
78
Ibid.
 
79
Ibid.
 
80
Ibid., 25.
 
81
Ibid.
 
82
Ibid.
 
83
Big Brother Watch and Others v UK (supra, n 5) [136].
 
84
Patel [16].
 
85
See generally IRTL, RIPR 2015 (supra n 2) 49–69.
 
86
Ibid.
 
87
Australian Signals Directorate, ‘History’ (webpage) <https://​www.​asd.​gov.​au/​about/​history>.
 
88
Privacy International v Secretary of State for Foreign and Commonwealth Affairs, Secretary of State for the Home Department, GCHQ and Others UKIPTrib 13/92/CH.
 
89
WITNESS STATEMENT OF CHARLES BLANDFORD FARR, Privacy International v Secretary of State for Foreign and Commonwealth Affairs, Secretary of State for the Home Department, GCHQ and Others UKIPTrib 13/92/CH. https://​www.​privacyinternati​onal.​org/​sites/​default/​files/​2018-03/​2014.​05.​16%20​Witness%20​Statement%20​of%20​Charles%20​Blandford%20​Farr.​pdf.
 
90
Ibid.
 
91
Telecommunications (Interception and Access) Act 1979 (AU), section 5(1).
 
92
Information Technology Act 2000 (India), section 69, emphasis added.
 
93
COMMONWEALTH OF AUSTRALIA, DEPARTMENT OF THE PRIME MINISTER AND CABINET, 2017 Independent Intelligence Review 79.
 
94
RACHEL NOBLE (supra n 15).
 
95
On the disingenuous nature of the Interception of Communications Act 1985 (UK) and Regulation of Investigatory Powers Act 2000 (UK) see GLOVER, PROTECTING NATIONAL SECURITY supra (n 47).
 
96
Liberty and Others v UK (2009) 48 EHRR 1 (challenging bulk interception), Big Brother Watch and Others v UK (Applications nos. 58170/13, 62322/14 and 24960/15) (challenging bulk interception) and Privacy International & Others v UK (Application No 46259 challenging equipment interference).
 
97
NORA NI LOIDEAIN, supra (n 8).
 
98
Weber and Savaria v Germany (Application no. 54934/00). The principles are outlined at [95]: ‘In its case-law on secret measures of surveillance, the Court has developed the following minimum safeguards that should be set out in statute law in order to avoid abuses of power: the nature of the offences which may give rise to an interception order; a definition of the categories of people liable to have their telephones tapped; a limit on the duration of telephone tapping; the procedure to be followed for examining, using and storing the data obtained; the precautions to be taken when communicating the data to other parties; and the circumstances in which recordings may or must be erased or the tapes destroyed’.
 
99
The parties were: Big Brother Watch; English PEN; Open Rights Group; Dr Constanze Kurz; Bureau of Investigative Journalism; Alice Ross; Amnesty International Limited; Bytes For All; The National Council for Civil Liberties (“Liberty”); Privacy International; The American Civil Liberties Union; The Canadian Civil Liberties Association; The Egyptian Initiative For Personal Rights; The Hungarian Civil Liberties Union; The Irish Council For Civil Liberties Limited and The Legal Resources Centre.
 
100
RIPA 2000, s8(4)–(6).
 
101
The legal challenge was also to whether the UK’s acquisition of intercepted material from foreign governments and intelligence agencies, as alleged in the published disclosures of Edward Snowden, wa sin accordance with law.
 
102
EUROPEAN COURT OF HUMAN RIGHTS, UK surveillance regime: some aspects contrary to the Convention (Press Release ECHR 165 (2 ‘021) 25 May 2021) emphasis added.
 
103
Zalneriute [17].
 
104
Klass and Others v Germany (Application No 5279/71) at [78] for example, ‘the Court, in its appreciation of the scope of the protection offered by Article 8 (art. 8), cannot but take judicial notice of two important facts. The first consists of the technical advances made in the means of espionage and, correspondingly, of surveillance; the second is the development of terrorism in Europe in recent years. Democratic societies nowadays find themselves threatened by highly sophisticated forms of espionage and by terrorism, with the result that the State must be able, in order effectively to counter such threats, to undertake the secret surveillance of subversive elements operating within its jurisdiction. The Court has therefore to accept that the existence of some legislation granting powers of secret surveillance over the mail, post and telecommunications is, under exceptional conditions, necessary in a democratic society in the interests of national security and/or for the prevention of disorder or crime’.
 
105
Esen [18].
 
106
Weber and Savaria (supra n 98) [104] emphasis added.
 
107
Ibid., [88].
 
108
Big Brother Watch and Others v United Kingdom (Application Numbers 58170/13, 62322/14, 24960/15) First Section Judgment, September 2018 [308].
 
109
Big Brother Watch and Others v UK (Grand Chamber) supra, n 5 [361].
 
110
Ibid., [425].
 
111
Principally the establishment of the Investigatory Powers Commissioner’s Office (IPCO)—see generally <https://​www.​ipco.​org.​uk/​>.
 
112
Goold [19].
 
113
Patel [16].
 
114
Ibid.
 
115
Ibid.
 
116
Ibid.
 
117
Ibid.
 
118
ZALNERIUTE, supra (n 103).
 
120
See generally the AUSTRALIAN GOVERNMENT, DEPARTMENT OF FOREIGN AFFAIRS AND TRADE, Regional Architecture: Quad https://​www.​dfat.​gov.​au/​international-relations/​regional-architecture/​quad.
 
121
Australian Government, Department of Foreign Affairs and Trade [20].
 
122
Australian Government, Department of Foreign Affairs and Trade [21].
 
123
Tirkey [22].
 
124
Senator the Honorable Marise Payne [23].
 
125
Ibid., emphasis added.
 
Literature
1.
go back to reference DENNIS RICHARDSON AC, Comprehensive Review of the Legal Framework of the National Intelligence Community (Commonwealth of Australia, December 2019) ( Richardson Review). DENNIS RICHARDSON AC, Comprehensive Review of the Legal Framework of the National Intelligence Community (Commonwealth of Australia, December 2019) ( Richardson Review).
2.
go back to reference NORA NI LOIDEAIN, EU DATA PRIVACY LAW AND SERIOUS CRIME: DATA RETENTION AND POLICYMAKING (OUP, forthcoming) 30. NORA NI LOIDEAIN, EU DATA PRIVACY LAW AND SERIOUS CRIME: DATA RETENTION AND POLICYMAKING (OUP, forthcoming) 30.
5.
go back to reference UK HOME OFFICE, ‘Investigatory Powers Act 2016 Consultation: Codes of Practice’ (2017, HMSO). UK HOME OFFICE, ‘Investigatory Powers Act 2016 Consultation: Codes of Practice’ (2017, HMSO).
6.
go back to reference TOBY NISBET and GEOFFREY SYME, No way to build a highway: Law, social justice research and the Beeliar Wetlands (2017) 34 ENVIRONMENTAL PLANNING LAW JOURNAL 162. TOBY NISBET and GEOFFREY SYME, No way to build a highway: Law, social justice research and the Beeliar Wetlands (2017) 34 ENVIRONMENTAL PLANNING LAW JOURNAL 162.
8.
go back to reference COMMONWEALTH GOVERNMENT, ATTORNEY-GENERAL’S DEPARTMENT, Commonwealth Government response to the Comprehensive Review of the legal Framework of the National Intelligence Community by Mr Dennis Richardson AC (Commonwealth of Australia 2020) 3. COMMONWEALTH GOVERNMENT, ATTORNEY-GENERAL’S DEPARTMENT, Commonwealth Government response to the Comprehensive Review of the legal Framework of the National Intelligence Community by Mr Dennis Richardson AC (Commonwealth of Australia 2020) 3.
11.
go back to reference BEHAM SAKUHAR, ‘ Intelligence and Defence Cooperation in India’ in M TUZUNER, INTELLIGENCE COOPERATION PRACTICES IN THE 21ST CENTURY: TOWARDS A CULTURE OF SHARING (IOS Press, 2010) 34–35. BEHAM SAKUHAR, ‘ Intelligence and Defence Cooperation in India’ in M TUZUNER, INTELLIGENCE COOPERATION PRACTICES IN THE 21ST CENTURY: TOWARDS A CULTURE OF SHARING (IOS Press, 2010) 34–35.
12.
go back to reference F BAUER, ‘Cryptanalysis’ in van TILBORG HCA (ed) ENCYCLOPAEDIA OF CRYPTOGRAPHY AND SECURITY (Springer, Boston, MA, 2005) 87. F BAUER, ‘Cryptanalysis’ in van TILBORG HCA (ed) ENCYCLOPAEDIA OF CRYPTOGRAPHY AND SECURITY (Springer, Boston, MA, 2005) 87.
13.
go back to reference ASHLEY S DEEKS, ‘Regulating Foreign Surveillance Through International Law’, in FRED H CATE and JAMES X DEMPSEY (eds) BULK COLLECTION: SYSTEMATIC GOVERNMENT ACCESS TO PRIVATE-SECTOR DATA (Oxford University Press, 2017) 349–354. ASHLEY S DEEKS, ‘Regulating Foreign Surveillance Through International Law’, in FRED H CATE and JAMES X DEMPSEY (eds) BULK COLLECTION: SYSTEMATIC GOVERNMENT ACCESS TO PRIVATE-SECTOR DATA (Oxford University Press, 2017) 349–354.
15.
go back to reference P GLOVER, PROTECTING NATIONAL SECURITY: A HISTORY OF BRITISH COMMUNICATIONS INVESTIGATION REGULATION (Routledge 2021), 168–174. P GLOVER, PROTECTING NATIONAL SECURITY: A HISTORY OF BRITISH COMMUNICATIONS INVESTIGATION REGULATION (Routledge 2021), 168–174.
18.
go back to reference RITA ESEN, Intercepting Communications in Accordance with Law (2012) 76(2) JOURNAL OF CRIMINAL LAW 762. RITA ESEN, Intercepting Communications in Accordance with Law (2012) 76(2) JOURNAL OF CRIMINAL LAW 762.
19.
go back to reference BENJAMIN GOOLD, Liberty and others v The United Kingdom: a chance for another missed opportunity (2009) PUBLIC LAW 5–14. BENJAMIN GOOLD, Liberty and others v The United Kingdom: a chance for another missed opportunity (2009) PUBLIC LAW 5–14.
Metadata
Title
Regulating Strategic Communications Investigation: The Investigatory Powers Act 2016 (UK) as an Exemplar for India
Author
Phil Glover
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-4460-6_20