Abstract
The techniques of investigation used by the police have had to keep pace with the complex and changing nature of communication. Technological advances, such as the internet, have meant that crime investigation has evolved significantly since the days of needing to be physically present to ‘eavesdrop’ on a suspected offender. As the Snowden files revealed, in the twenty-first century, ‘eavesdropping’ can be conducted remotely and from one country to another. The introduction of the Investigatory Powers Act 2016, allowing bulk data collection by the government, raises significant questions for the future of crime investigation and the safeguarding of individuals’ privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
Anderson D (2015a) A Question of Trust: Report of the Investigatory Powers Review, Independent Reviewer of Terrorism Legislation, London.
Anderson D (2015b) Terrorism Prevention and Investigation Measures in 2014: Third Report of the Independent Reviewer on the Operation of the Terrorism Prevention and Investigation Measures Act 2011 (available at https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/411824/IRTL_TPIMs_2014_final_report__web_.pdf accessed 2 February 2017).
Andrew C (2009) The Defence of the Realm: The Authorized History of MI5, London: Penguin.
BBC News (2008b) Spy Law ‘Used in Dog Fouling War’, 27 April (available at: http://news.bbc.co.uk/1/hi/uk/7369543.stm accessed 6 December 2016).
BBW (Big Brother Watch) (2010) The Grim RIPA: Cataloguing the Ways in Which Local Authorities Have Abused Their Covert Surveillance Powers (available from: http://www.bigbrotherwatch.org.uk/TheGrimRIPA.pdf accessed 6 December 2016).
BBW (Big Brother Watch) (2014) Surveillance Transparency Is Now More Important than Ever, London: BBW.
BBW (Big Brother Watch) (2016a) Safe in Police Hands? London (available at: https://www.bigbrotherwatch.org.uk/wp-content/uploads/2016/07/Safe-in-Police-Hands.pdf accessed 9 November 2016).
Bingham J (2008) Anti-Terror Powers Used to Spy on Paperboys. Daily Telegraph, 5 December.
Birkett Report (1957) Report of the Committee of Privy Councillors Appointed to Inquire into the Interception of Communications, Cmnd. 283, October, London: HMSO.
Bonino S and Kaoullas L (2015) Preventing Political Violence in Britain: An Evaluation of over Forty Years of Undercover Policing of Political Groups Involved in Protest. Studies in Conflict and Terrorism, 38(10): 814–840.
Channel 4 News (2013) Stephen Lawrence Family ‘Targeted in Police Smear Campaign,’ 24 June (available at https://www.channel4.com/news/stephen-lawrence-undercover-police-officer-smear-campaign accessed 23 March 2017).
Clark D (2007) Covert Surveillance and Informer Handling, in Newburn T, Williamson T and Wright A (eds.) Handbook of Criminal Investigation, Cullompton: Willan.
College of Policing (2016a) Covert Policing (available at: https://www.app.college.police.uk/app-content/covert-policing/undercover-policing/ accessed 6 December 2016).
Corera G (2015) Intercept: The Secret History of Computers and Spies, London: Weidenfeld & Nicolson.
Court of Justice of the European Union (2014) The Court of Justice Declares the Data Retention Directive to Be Invalid (Press Release) No. 54/14 Luxembourg, 8 April 2014.
Creedon M (2013) Operation Herne: Report 1 Use of Covert Identities, Derbyshire Constabulary (available at: http://www.derbyshire.police.uk/About-us/Operation-Herne/Operation-Herne.aspx accessed 16 March 2017).
Creedon M (2014a) Operation Herne: Operation Trinity Report 2 Allegations of Peter Francis, Derbyshire Constabulary (available at: http://www.derbyshire.police.uk/About-us/Operation-Herne/Operation-Herne.aspx accessed 16 March 2017).
Creedon M (2014b) Operation Herne: Special Demonstration Squad Reporting: Mentions of Sensitive Campaigns, Derbyshire Constabulary (available at: http://www.derbyshire.police.uk/About-us/Operation-Herne/Operation-Herne.aspx accessed 16 March 2017).
Diplock Report (1981) The Interception of Communications in Great Britain, Cmnd. 8191, March, London: HMSO.
DSOU (Don’t Spy on Us) (2016) Investigatory Powers Bill: How to Make It Fit-For-Purpose (available from: https://www.dontspyonus.org.uk/blog/2016/02/26/investigatory-powers-bill-how-to-make-it-fit-for-purpose/).
DSOU (Don’t Spy on Us) (2017) Web Site (available at: https://www.dontspyonus.org.uk/ last accessed 16 March 2017).
Ellison M (2014) The Stephen Lawrence Independent Review – Possible Corruption and the Role of Undercover Policing in the Stephen Lawrence Case, HC 1094, London: TSO.
Ellison M and Morgan A (2015) Review of Possible Miscarriages of Justice: Impact of Undisclosed Undercover Police Activity on the Safety of Convictions, a Report to the Attorney General, July HC 291, London: TSO.
Evans R and Lewis P (2011b) Activists Walk Free as Undercover Officer Prompts Collapse of Case. The Guardian, 10 January.
Evans R and Lewis P (2013a) Undercover the True Story of Britain’s Secret Police, London: Faber and Faber Ltd.
Evans R and Lewis P (2013b) Police Spy: ‘I Thought, How Would They Feel About Their Son’s Name Being Used’. The Guardian, 3 February.
Evans R and Lewis P (2015) Scotland Yard Shut Down Undercover Police Unit Because It Broke Rules. The Guardian, 26 July.
Evans R, Lewis P and Dodd V (2011) Revealed: Second Undercover Police Officer Who Posed as an Activist. The Guardian, 13 January.
Halford A and Barnes T (1993) No Way Up the Greasy Pole: The Fight for Equality, London: Constable.
Hirsch A (2011) Mark Kennedy and the Strange Case of Undercover Sex. The Guardian, 13 January.
HMG (HM Government) (2010a) The Coalition: Our Programme for Government, May, London: Cabinet Office.
HMIC (HM Inspectorate of Constabulary) (2012) A Review of National Police Units Which Provide Intelligence on Criminality Associated with Protest, February, London.
HMIC (HM Inspectorate of Constabulary) (2013b) A Review of Progress Made Against the Recommendations in HMIC’s 2012 Report on the National Police Units Which Provide Intelligence on Criminality Associated with Protest, June, London.
HMIC (HM Inspectorate of Constabulary) (2014) A Inspection of Undercover Policing in England and Wales, October, London.
Home Office (1980) The Interception of Communications in Great Britain, Cmnd. 7873, April, London: HMSO.
Home Office (1984) Guidelines on the Use of Equipment in Police Surveillance Operations, London.
Home Office (1985) The Interception of Communications in the United Kingdom, Cmnd. 9438, June, London: HMSO.
Home Office (1999b) Interception of Communications: A Consultation Paper, Cm 4368, June.
Home Office (2000) Regulation of Investigatory Powers Act 2000 – Explanatory Notes.
Home Office (2014c) Covert Surveillance and Property Interference, Code of Practice, December, London: TSO.
Home Office (2014d) Data Retention and Investigatory Powers Act 2014, London: Guidance.
Home Office (2014e) Covert Human Intelligence Sources – Code of Practice, December, London: TSO.
Home Office (2015d) Home Secretary Announces Statutory Inquiry into Undercover Policing (Press Release) 12 March, London.
Home Office (2016a) RIPA Codes (available at: https://www.gov.uk/government/collections/ripa-codes#current-codes-of-practice accessed 16 March 2017).
Home Office (2016b) Investigatory Powers Bill Receives Royal Assent (Press Release) 29 October, London.
Home Office (2016c) Investigatory Powers Bill: Government Response to Pre-Legislative Scrutiny, Cm 9219, March, London.
Hope C (2008) Local Authorities Launched 10,000 Snooping Operations Last Year. The Telegraph, 22 July.
Hopkins N (2013) UK Gathering Secret Intelligence Via Covert NSA Operation. The Guardian, 7 June.
Hopkins N and Watt N (2013) Prism: Ministers Challenged over GCHQ’s Access to Covert US Operation. The Guardian, 7 June.
House of Commons (2015a) Privacy and Security: A Modern and Transparent Legal Framework Intelligence and Security Committee, HC 1075, March, London.
House of Commons (2016a) Investigatory Powers Bill: Technology Issues Science and Technology Committee (3rd Report of Session 2015–16), HC 573, January, London.
House of Lords/House of Commons (2012) Draft Communications Data Bill, Joint Committee on the Draft Communications Data Bill (Session 2012–13), HL Paper 79/HC 479, December, London.
House of Lords/House of Commons (2016) Draft Investigatory Powers Bill – Report, Joint Committee on the Draft Investigatory Powers Bill HL Paper 93/HC 651, February, London.
James A (2013) Examining Intelligence-Led Policing: Developments in Research, Policy and Practice, Palgrave Macmillan.
Liberty (2015a) Intelligence Sharing Between UK and USA Was Unlawful, Tribunal Rules (Press Release) 6 February.
Liberty (2016b) Liberty Responds to the Snoopers’ Charter Becoming Law After Receiving Royal Assent (Press Release) 29 November, London.
Lyon D (2015) Surveillance After Snowden, Cambridge: Polity Press.
MacAskill E, Borger J, Hopkins N, Davies N and Ball J (2013) GCHQ Taps Fibre-Optic Cables for Secret Access to World’s Communications. The Guardian, 21 June.
McTague T (2016) Investigatory Powers Bill: Theresa May Accused of Rushing Snoopers’ Charter into Law to Avoid Scrutiny. Independent, 27 February.
Milne S (2004) The Enemy Within: The Secret War Against the Miners, 3rd ed., London: Verso Books.
Morgan T (2015) Scotland Yard’s Multi-Million Pound Apology to Seven Women Deceived into Relationships with Officers. Daily Telegraph, 20 November.
MPS (Metropolitan Police Service) (2015a) Special Demonstration Squad Tradecraft Manual, Freedom of Information Request, June (available at http://www.met.police.uk/foi/pdfs/priorities_and_how_we_are_doing/corporate/operation_herne_sds_tradecraft_manual.pdf accessed 6 December 2016).
MPS (Metropolitan Police Service) (2015b) Claimants in Civil Cases Receive MPS Apology (Press Release) 20 November.
Porter B (1989) Plots and Paranoia: A History of Political Espionage in Britain 1790–1988, London: Routledge.
Privacy International (2015) Bulk Personal Datasets Challenge (available from: https://privacyinternational.org/node/843 last accessed 6 December 2016).
Privy Council (2008) Review of Intercept as Evidence – Report to the Prime Minister and Home Secretary, 30 Jan, Cm 7324, London: The Stationery Office.
Robinson M (2013) Police Forces Pay £25million to Informants and Nearly Half Is Spent by London’s Met. Daily Mail, 18 June.
RUSI (Royal United Services Institute) (2015) A Democratic Licence to Operate: Report of the Independent Surveillance Review, 13 July, London.
Sharpe S (2002) Covert Surveillance and the Use of Informants, in McConville M and G Wilson (eds.) The Handbook of the Criminal Justice Process, Oxford University Press.
Spencer JR (1997) Bugging and Burglary by the Police. Cambridge Law Journal, 56(1): 6–8.
Taylor S (2015) Investigation into Links Between Special Demonstration Squad and Home Office, London: Home Office.
Travis A (2016) UK Security Agencies Unlawfully Collected Data for 17 Years, Court Rules. The Guardian, 17 October.
UCPI (Undercover Policing Inquiry) (2016) Official Website (available at https://www.ucpi.org.uk/ accessed 16 March 2017).
Vincent D (1998) The Culture of Secrecy: Britain 1832–1998, Oxford: Oxford University Press.
Vincent D (2016) Privacy: A Short History, Cambridge: Polity Press.
Wynn Davies P (1997) Halford Triumphs over Workplace Phone Bugs. Independent, 25 June.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Marshall, D., Thomas, T. (2017). Police (2): Techniques of Investigation. In: Privacy and Criminal Justice. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-64912-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-64912-2_4
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-64911-5
Online ISBN: 978-3-319-64912-2
eBook Packages: Law and CriminologyLaw and Criminology (R0)