revealing his or her identity, relationships, interests, location and
activities.
60.
Moreover, the costs of storing data have decreased drastically, and
continue to do so every year. Most importantly, the technical means of
analysing data have advanced rapidly so that what were previously
considered meaningless or incoherent types and amounts of data can now
produce revelatory analyses. Communications data is structured in such a
way that computers can search through it for patterns faster and more
effectively than similar searches through content.28
61.
The intrusiveness of communications data is further reflected by the RUSI
Report which states that, “[a]ggregating data sets can create an extremely
accurate picture of an individual’s life, without having to know the content
of their communications, online browsing history or detailed shopping
habits. Given enough raw data, today’s algorithms and powerful computers
can reveal new insights that would previously have remained hidden.”29
C.
Intelligence sharing
62.
The UK Intelligence Services can access information in several ways. As
described above, they can initially intercept the data itself, for example, as
it transits over a fibre optic cable. But they may also obtain intercept
material
under
intelligence
sharing
arrangements
with
foreign
intelligence agencies. For example, a foreign intelligence agency may
operate its own bulk interception programme. The information initially
intercepted through that programme may be made available, including in
bulk, to the UK Intelligence Services.
For further reading see THE ECONOMIST, Data, data everywhere, 25 Feb. 2010, available at
www.economist.com/node/15557443. Reply Annex No. 5.
29 RUSI Report, para 2.14. Reply Annex No. 19.
28
29