DETAILED CONTENTS
Fragmentation of providers
52
Difficulties in attributing communications
52
New sources of data
54
Geographical changes
59
Encryption
60
The dark net
65
Anonymity and anti-surveillance tools
66
Decentralised networks
67
New capabilities
68
PART II: CURRENT POSITION
5.
LEGAL CONSTRAINTS
71
The common law
71
The European Convention on Human Rights
73
The law of the European Union
84
International Law
92
6.
95
POWERS AND SAFEGUARDS
Key concepts
95
Powers outside RIPA
97
Other intrusive capabilities
100
RIPA powers
103
RIPA safeguards
113
Data Sharing
115
Oversight
119
7.
124
PRACTICE
Sources and scope
124
The Snowden Documents
124
Interception
126
Communications data
133
Computer network exploitation
137
Intelligence sharing
138
Bulk Personal Datasets
139
The Management of Relationships with CSPs
139
11