CENTRUM FÖR RÄTTVISA v. SWEDEN JUDGMENT

(b) the application of specific selectors to the retained
communications/related communications data;
(c) the
examination
of
selected
communications/related
communications data by analysts; and
(d) the subsequent retention of data and use of the “final product”,
including the sharing of data with third parties.
240. At what the Court has taken to be the first stage, electronic
communications (or “packets” of electronic communications) will be
intercepted in bulk by the intelligence services. These communications will
belong to a large number of individuals, many of whom will be of no
interest whatsoever to the intelligence services. Some communications of a
type unlikely to be of intelligence interest may be filtered out at this stage.
241. The initial searching, which is mostly automated, takes place at
what the Court has taken to be the second stage, when different types of
selectors, including “strong selectors” (such as an email address) and/or
complex queries are applied to the retained packets of communications and
related communications data. This may be the stage where the process
begins to target individuals through the use of strong selectors.
242. At what the Court has taken to be the third stage, intercept material
is examined for the first time by an analyst.
243. What the Court has taken to be the final stage is when the intercept
material is actually used by the intelligence services. This may involve the
creation of an intelligence report, the sharing of the material with other
intelligence services within the intercepting State or even the transmission
of material to foreign intelligence services.
244. The Court considers that Article 8 applies at each of the above
stages. While the initial interception followed by the immediate discarding
of parts of the communications does not constitute a particularly significant
interference, the degree of interference with individuals’ Article 8 rights
will increase as the bulk interception process progresses. In this regard, the
Court has clearly stated that even the mere storing of data relating to the
private life of an individual amounts to an interference within the meaning
of Article 8 (see Leander v. Sweden, 26 March 1987, § 48, Series A no.
116), and that the need for safeguards will be all the greater where the
protection of personal data undergoing automatic processing is concerned
(see S. and Marper, cited above, § 103). The fact that the stored material is
in coded form, intelligible only with the use of computer technology and
capable of being interpreted only by a limited number of persons, can have
no bearing on that finding (see Amann v. Switzerland [GC], no. 27798/95,
§ 69, ECHR 2000-II and S. and Marper, cited above, §§ 67 and 75). Finally,
at the end of the process, where information about a particular person will
be analysed or the content of the communications is being examined by an
analyst, the need for safeguards will be at its highest. This approach of the

Select target paragraph3