DETAILED CONTENTS

Fragmentation of providers

52

Difficulties in attributing communications

52

New sources of data

54

Geographical changes

59

Encryption

60

The dark net

65

Anonymity and anti-surveillance tools

66

Decentralised networks

67

New capabilities

68

PART II: CURRENT POSITION

5.

LEGAL CONSTRAINTS

71

The common law

71

The European Convention on Human Rights

73

The law of the European Union

84

International Law

92

6.

95

POWERS AND SAFEGUARDS

Key concepts

95

Powers outside RIPA

97

Other intrusive capabilities

100

RIPA powers

103

RIPA safeguards

113

Data Sharing

115

Oversight

119

7.

124

PRACTICE

Sources and scope

124

The Snowden Documents

124

Interception

126

Communications data

133

Computer network exploitation

137

Intelligence sharing

138

Bulk Personal Datasets

139

The Management of Relationships with CSPs

139

11

Select target paragraph3