28
CHAPTER I INTRODUCTION “The promotion and protection of human rights for all and the rule of law is essential to all components of the Strategy, recognizing that effective counter-terrorism measures and the promotion of human rights are not conflicting goals, but complementary and mutually reinforcing” United Nations Global Counter-Terrorism Strategy (General Assembly resolution 60/288, annex) Background of the Study The National Security Agency's mass surveillance is just the beginning. Documents from Edward Snowden show that the intelligence agency is arming America for future digital wars -- a struggle for control of the Internet that is already well underway. 1 For years, there’s been ample evidence that authoritarian governments around the world are relying on technology produced by American, Canadian, and European companies to facilitate human rights abuses.  From software that enables the filtering and blocking of online content to tools that help governments spy on their citizens, many such companies are actively serving autocratic governments as "repression’s little helper." 2 The reach of these technologies is astonishingly broad: governments can listen in on cell phone calls, use voice recognition to scan mobile networks, read emails and text messages, censor web pages, track a citizen’s every movement using GPS, and can even change email contents while en route to a recipient. Some tools are installed using the same type of malicious malware and spyware used by online criminals to steal credit card and banking information. They can secretly turn on webcams built into personal laptops and microphones in cell phones not being used. And all of this information is filtered 1 http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for- cyber-battle-a-1013409.html. Accessed on March 2, 2015, at 1. 2 https://www.eff.org/issues/mass-surveillance-technologies Accessed on March 30, 2015. 1

PIL Research FINAL

Embed Size (px)

Citation preview

CHAPTER I

INTRODUCTION

“The promotion and protection of human rights for all and the rule of law is essential to all components of the Strategy, recognizing that effective counter-terrorism measures and the promotion of human rights are not conflicting goals, but complementary and mutually reinforcing”

United Nations Global Counter-Terrorism Strategy(General Assembly resolution 60/288, annex)

Background of the Study

The National Security Agency's mass surveillance is just the beginning.

Documents from Edward Snowden show that the intelligence agency is arming

America for future digital wars -- a struggle for control of the Internet that is

already well underway.1

For years, there’s been ample evidence that authoritarian governments

around the world are relying on technology produced by American, Canadian,

and European companies to facilitate human rights abuses.  From software that

enables the filtering and blocking of online content to tools that help

governments spy on their citizens, many such companies are actively serving

autocratic governments as "repression’s little helper."2

The reach of these technologies is astonishingly broad: governments

can listen in on cell phone calls, use voice recognition to scan mobile networks,

read emails and text messages, censor web pages, track a citizen’s every

movement using GPS, and can even change email contents while en route to a

recipient. Some tools are installed using the same type of malicious malware

and spyware used by online criminals to steal credit card and banking

information. They can secretly turn on webcams built into personal laptops and

microphones in cell phones not being used. And all of this information is filtered 1 http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html. Accessed on March 2, 2015, at 1.2 https://www.eff.org/issues/mass-surveillance-technologies Accessed on March 30, 2015.

1

and organized on such a massive scale that it can be used to spy on every

person in an entire country.3

This is a phenomenon that spans the globe and implicates dozens of

corporations.  Over the past year, and partly in response to the uprisings that

have swept the Arab world, concerns about these exports have been amplified

in media reports and by digital rights organizations, sparking a debate as to the

appropriate course of action.4

Digital communications technologies, such as the Internet, mobile

smartphones and WiFi-enabled devices, have become part of everyday life. By

dramatically improving access to information and real-time communication,

innovations in communications technology have boosted freedom of expression,

facilitated global debate and fostered democratic participation. By amplifying the

voices of human rights defenders and providing them with new tools to

document and expose abuses, these powerful technologies offer the promise of

improved enjoyment of human rights. As contemporary life is played out ever

more online, the Internet has become both ubiquitous and increasingly intimate.5

In the digital era, communications technologies also have enhanced the

capacity of Governments, enterprises and individuals to conduct surveillance,

interception and data collection. As noted by the Special Rapporteur on the right

to freedom of expression and opinion, technological advancements mean that

the State’s effectiveness in conducting surveillance is no longer limited by scale

or duration. Declining costs of technology and data storage have eradicated

financial or practical disincentives to conducting surveillance. The State now has

a greater capability to conduct simultaneous, invasive, targeted and broad-scale

surveillance than ever before.1 In other words, the technological platforms upon

3 Id.4 Id.5 http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf. Accessed on March 30, 2015, at 3.

2

which global political, economic and social life are increasingly reliant are not

only vulnerable to mass surveillance, they may actually facilitate it. 6

Deep concerns have been expressed as policies and practices that

exploit the vulnerability of digital communications technologies to electronic

surveillance and interception in countries across the globe have been exposed.

Examples of overt and covert digital surveillance in jurisdictions around the world

have proliferated, with governmental mass surveillance emerging as a

dangerous habit rather than an exceptional measure. Governments reportedly

have threatened to ban the services of telecommunication and wireless

equipment companies unless given direct access to communication traffic,

tapped fibre-optic cables for surveillance purposes, and required companies

systematically to disclose bulk information on customers and employees.

Furthermore, some have reportedly made use of surveillance of

telecommunications networks to target political opposition members and/or

political dissidents. There are reports that authorities in some States routinely

record all phone calls and retain them for analysis, while the monitoring by host

Governments of communications at global events has been reported. Authorities

in one State reportedly require all personal computers sold in the country to be

equipped with filtering software that may have other surveillance capabilities.

Even non-State groups are now reportedly developing sophisticated digital

surveillance capabilities. Mass surveillance technologies are now entering the

global market, raising the risk that digital surveillance will escape governmental

controls. 7

Concerns have been amplified following revelations in 2013 and 2014

that suggested that, together, the National Security Agency in the United States

of America and General Communications Headquarters in the United Kingdom

6 Id.7 Id.

3

of Great Britain and Northern Ireland have developed technologies allowing

access to much global internet traffic, calling records in the United States,

individuals’ electronic address books and huge volumes of other digital

communications content. These technologies have reportedly been deployed

through a transnational network comprising strategic intelligence relationships

between Governments, regulatory control of private companies and commercial

contracts.8

Following on the concerns of Member States and other stakeholders at

the negative impact of these surveillance practices on human rights, in

December 2013 the United Nations General Assembly adopted resolution

68/167, without a vote, on the right to privacy in the digital age. In the resolution,

which was co-sponsored by 57 Member States, the Assembly affirmed that the

rights held by people offline must also be protected online, and called upon all

States to respect and protect the right to privacy in digital communication. It

further called upon all States to review their procedures, practices and legislation

related to communications surveillance, interception and collection of personal

data, emphasizing the need for States to ensure the full and effective

implementation of their obligations under international human rights law.9

The exponential growth in States’ technological capabilities over

the past decade has improved the capacity of intelligence and law

enforcement agencies to carry out targeted surveillance of suspected

individuals and organizations. The interception of communications

provides a valuable source of information by which States can

investigate, forestall and prosecute acts of terrorism and other serious

crime. Most States now have the capacity to intercept and monitor

calls made on a landline or mobile telephone, enabling an individual’s

8 Id.9 Id.

4

location to be determined, his or her movements to be tracked

through cell site analysis and his or her text messages to be read and

recorded. Targeted surveillance also enables intelligence and law

enforcement agencies to monitor the online activity of particular

information stored on them. An increasing number of States are

making use ofmalware systems that can be used to infiltrate an

individual’s computer or smartphone, to override its settings and to

monitor its activity. Taken together, these forms of surveillance

provide a mosaic of data from multiple sources that can generate

valuable intelligence about particular individuals or organizations. 10

The common feature of these surveillance techniques is that

they depend upon the existence of prior suspicion of the targeted

individual or organization. In such cases, it is the almost invariable

practice of States to require some form of prior authorization (whether

judicial or executive), and in some States there is an additional tier of

ex post facto independent review. In most States, therefore, there is

at least one opportunity (and sometimes more than one) for scrutiny

of the information alleged to give rise to the suspicion, and for an

assessment of the legality and proportionality of surveillance

measures by reference to the facts of a particular case. With targeted

surveillance, it is possible to make an objective assessment of the

necessity and proportionality of the contemplated surveillance,

weighing the degree of the proposed intrusion against its anticipated

value to a particular investigation.11

10 https://firstlook.org/theintercept/document/2014/10/15/un-report-human-rights-terrorism/. Accessed on March 7, 2015, at 4.11 Id, at 5.

5

The dynamic pace of technological change has, however,

enabled some States to secure bulk access to communications and

content data without prior suspicion. Relevant authorities in these

States are now able to apply automated “data mining” algorithms to

dragnet a potentially limitless universe of communications traffic. By

placing taps on fibre-optic cables through which the majority of digital

communications travel, relevant States have thus been able to

conduct mass surveillance of communications content and metadata,

providing intelligence and law enforcement agencies with the

opportunity to monitor and record not only their own citizens’

communications, but also the communications of individuals located in

other States. This capacity is typically reinforced by mandatory data

retention laws that require telecommunications and Internet service

providers to preserve communications data for inspection and

analysis. The use of scanning software, profiling criteria and specified

search terms enables the relevant authorities then to filter vast

quantities of stored information in order to identify patterns of

communication between individuals and organizations.12

States with high levels of Internet penetration can thus gain access to the

telephone and e-mail content of an effectively unlimited number of users and

maintain an overview of Internet activity associated with particular websites. All

of this is possible without any prior suspicion related to a specific individual or

organization. The communications of literally every Internet user are potentially

open for inspection by intelligence and law enforcement agencies in the States

concerned. This amounts to a systematic interference with the right to respect

12 Id.

6

for the privacy of communications, and requires a correspondingly compelling

justification. 13

From a law enforcement perspective, the added value of mass

surveillance technology derives from the very fact that it permits the surveillance

of the communications of individuals and organizations that have not previously

come to the attention of the authorities. The public interest benefit in bulk access

technology is said to derive precisely from the fact that it does not require prior

suspicion. The circularity of this reasoning can be squared only by subjecting the

practice of States in this sphere to the analysis mandated by Article 17 of the

International Covenant on Civil and Political Rights.14

Mass digital surveillance was mainly justified by various States to protect

national security and as a means to fight terrorism. The justification was further

aggravated by the 9/11 attacked in the United States.

On the morning of September 11, 2001, the Al-Qaeda terrorists hijacked

four United States commercial airliners. Thousands of innocent people were

killed, and the twin towers of the World Trade Center and a portion of the

Pentagon were deliberately destroyed. It was probably the worst attack on the

U.S. soil in modern history, perpetrated against the defenseless civilians, not

merely to end lives, but to disrupt and end a way of life.15 Every nation, in every

region, had a decision to make, for in the words of President George Bush,

“either you are with us, or you are with the terrorists.”16

A coalition of freedom and peace loving nations was formed and a

crusade against the ‘axis of evil’ emerged for after all, “it is not just America’s

13 Id.14 Id, at 6.15Balderama, Gilbert D, Dénouement of the Human Security Act: Tremors in the Turbulent Odyssey of Civil Liberties, at 2. http://ustlawreview.com/pdf/vol.LII/Denoument of the Human Security Act.pdf. Accessed on March 5, 2014 citing the Address of President George Bush to the Joint Session of Congress and the American People, September 20, 2001. 16 Id, at 3

7

fight. And what is at stake is not just America’s freedom. It is the world’s fight, a

fight against civilization. It is the fight of all who believe in progress and

pluralism, tolerance and freedom.”17

In a borderless fight against terror and in the name of freedom and

democracy, anti-terrorism laws were enacted by different states in the world.18

However, some of these anti-terrorism laws and measures have been a

major concern of international bodies as jeopardizing fundamental human rights

protection. The leaders of the states, found themselves in war not just against

the terrorists but worse, against their very own people whom they were and are

defending for. Trading diplomacy for war, governments seem to have forgotten

that persuasion and not persecution is the means for winning the allegiance of

free men.19

Problem Statement

Whether mass digital surveillance for counter-terrorism violates the right

to privacy under Article 17 the International Covenant on Civil and Political

Rights.

Definition of Terms

The following terms are defined based on the usage of the words in this

study:

Privacy – the presumption that individuals should have an area

of personal autonomous development, interaction and liberty free

from State intervention and excessive unsolicited intrusion by other

uninvited individuals20

17 Id.18 Id.19 Balderama, at 4.20 https://firstlook.org/theintercept/document/2014/10/15/un-report-human-rights-terrorism/, Accessed on March 7, 2015, at 12.

8

Mass surveillance – the intricate surveillance of an entire or a

substantial fraction of a population. The surveillance is often carried out by

governments or governmental organisations, but may also be carried out by

corporations, either on behalf of governments or at their own initiative.21

Significance of the Study

This study is important to the researcher in her studies on public

international law and human rights. The readers of this study will also be aware

of international laws and issues affecting their rights and how they can

safeguard these rights.

Scope and Limitations

The study focused on the current mass surveillance using modern

technology such as the internet by States in order to counter terrorism and its

possible violation of the rights to privacy of persons under Article 17 of

International Covenant on Civil and Political Rights.

This study was primarily constrained with time as the researcher is

presently employed and studying law at the same time. Also, the research

period was limited to one semester only so the research evaluation and result

may not be that exhaustive.

Methodology

This study is both a policy research and an evaluation research. It is also

both descriptive and analytical in character. Relevant literatures and

jurisprudence on the topic were also researched and presented in this paper.

Most references were taken from the internet and books on constitutional and

international laws.

21 http://en.wikipedia.org/wiki/Mass_surveillance. Accessed on March 30, 2015.

9

CHAPTER II

REVIEW OF RELATED LITERATURE

Terrorism

The US Department of Defense Dictionary of military terms defines

terrorism as the calculated use of unlawful violence or threat of unlawful violence

to inculcate fear; intended to coerce or to intimidate governments or societies in

the pursuit of goals that are generally political, religious, or ideological.22

However, there is no official definition of terrorism agreed on throughout the

world, and definitions tend to rely heavily on who is doing the defining and for

what purpose. Some definitions focus on terrorist tactics to define the term, while

others focus on the actor.23

Terrorism is commonly understood to refer to acts of violence

that target civilians in the pursuit of political or ideological aims. In

legal terms, although the international community has yet to adopt a

comprehensive definition of terrorism, existing declarations,

resolutions and universal “sectoral” treaties relating to specific aspects

of it define certain acts and core elements. In 1994, the General

Assembly’s Declaration on Measures to Eliminate International

Terrorism, set out in its resolution 49/60, stated that terrorism includes

“criminal acts intended or calculated to provoke a state of terror in the

general public, a group of persons or particular persons for political

purposes” and that such acts “are in any circumstances unjustifiable,

whatever the considerations of a political, philosophical, ideological,

22 Chester B. Cabalza Deconstructing Human Security in the Philippines. Accessed on March 5, 2014, at 4 citing Definitions of Terrorism, http://terrorism.about.com/od/whatisterroris1/ss/DefineTerrorism_4.htm, accessed on 15 February 2011.23 Id., at 4, citing Dr Amy Zalman, PhD, former About.com Guide, text can be found at http://terrorism.about.com/od/whatisterroris1/ss/DefineTerrorism.htm.

10

racial, ethnic, religious or other nature that may be invoked to justify

them.” 24

Ten years later, the Security Council, in its resolution 1566

(2004), referred to “criminal acts, including against civilians,

committed with the intent to cause death or serious bodily injury, or

taking of hostages, with the purpose to provoke a state of terror in the

general public or in a group of persons or particular persons, intimidate

a population or compel a Government or an international organization

to do or to abstain from doing any act”. Later that year, the Secretary-

General’s High-level Panel on Threats, Challenges and Change

described terrorism as any action that is “intended to cause death or

serious bodily harm to civilians or noncombatants, when the purpose of

such an act, by its nature or context, is to intimidate a population, or to

compel a Government or an international organization to do or to

abstain from doing any act…”25

Whatever the definition, as the Secretary-General recommended in his

report Uniting Against Terrorism, “ensuring the defence of human rights is

inherent and essential to any counter-terrorism strategy.” In their 2006 Strategy

to combat terrorism, UN Member States stated that they must comply with their

obligations under international law, in particular human rights law, refugee law

and international humanitarian law, on the basis of the General Assembly

resolution 60/158 of December 16, 2005, which provides the fundamental

framework for the “Protection of human rights and fundamental freedoms while

countering terrorism.” States Parties to the International Covenant on Civil and

Political Rights (ICCPR), like the Republic of the Philippines, are more

particularly under the obligation to ensure that measures taken to implement

24 http://www.ohchr.org/Documents/Publications/Factsheet32EN.pdf. Accessed on March 30, 2015, at 5.25 Id, at 6.

11

Security Council Resolutions on terrorism are in full conformity with the

Covenant. They are requested in particular to ensure, among others, that the

definition of terrorism does not lead to abuse.26

Impact of Terrorism on Human Rights

Terrorism aims at the very destruction of human rights, democracy and

the rule of law. It attacks the values that lie at the heart of the Charter of the

United Nations and other international instruments: respect for human rights; the

rule of law; rules governing armed conflict and the protection of civilians;

tolerance among peoples and nations; and the peaceful resolution of conflict.27

Terrorism has a direct impact on the enjoyment of a number of human

rights, in particular the rights to life, liberty and physical integrity. Terrorist acts

can destabilize Governments, undermine civil society, jeopardize peace and

security, threaten social and economic development, and may especially

negatively affect certain groups. All of these have a direct impact on the

enjoyment of fundamental human rights.28

International and regional human rights law makes clear that States have

both a right and a duty to protect individuals under their jurisdiction from terrorist

attacks. This stems from the general duty of States to protect individuals under

their jurisdiction against interference in the enjoyment of human rights. More

specifically, this duty is recognized as part of States’ obligations to ensure

respect for the right to life and the right to security.29

In addition, international and regional human rights law has recognized

that, in specific circumstances, States have a positive obligation to take

26 Mouloud, at 18-19, citing Uniting against terrorism: recommendations for a global counter-terrorism strategy, Doc. A/60/825, para. 110.27 http://www.ohchr.org/Documents/Publications/Factsheet32EN.pdf. Accessed on March 30, 2015, at 7.28 Id. 29 Id.

12

preventive operational measures to protect an individual or individuals whose life

is known or suspected to be at risk from the criminal acts of another individual,

which certainly includes terrorists. Also important to highlight is the obligation on

States to ensure the personal security of individuals under their jurisdiction where

a threat is known or suspected to exist. This, of course, includes terrorist

threats.30

30 Id.

13

CHAPTER III

DISCUSSION

Terrorism has a direct impact on the enjoyment of human rights. As such,

States have a duty to take effective counterterrorism measures. Just as terrorism

impacts on human rights and the functioning of society, so too can measures

adopted by States to counter terrorism. Because terrorism has a serious impact

on a range of fundamental human rights, States have not only a right but a duty

to take effective counter-terrorism measures. Effective counter-terrorism

measures and the protection of human rights are complementary and mutually

reinforcing objectives which must be pursued together as part of States’ duty to

protect individuals within their jurisdiction.31 Not only is the promotion and

protection of human rights essential to the countering of terrorism, but States

have to ensure that any counterterrorism measures they adopt also comply with

their international human rights obligations.32 The imposition of a limitation on

rights and freedoms for the purpose of countering terrorism, but by ineffective

means, is unlikely to be justifiable. In assessing the impact of a counterterrorism

measure on rights and freedoms, consideration must be given, case by case, to

the level to which it limits the right or freedom, and also to the importance and

degree of protection offered by the human right being limited.33

Article 12 of the Universal Declaration of Human Rights provides that “no

one shall be subjected to arbitrary interference with his privacy, family, home or

correspondence, nor to attacks upon his honour and reputation. Everyone has

the right to the protection of the law against such interference or attacks.” The

International Covenant on Civil and Political Rights provides in Article 17 that “no

one shall be subjected to arbitrary or unlawful interference with his or her privacy,

family, home or correspondence, nor to unlawful attacks on his or her honour and

31 http://www.ohchr.org/Documents/Publications/Factsheet32EN.pdf. Accessed on March 30, 2015, at 19.32 Id, at 21.33 Id. at 26.

14

reputation”. It further states that “everyone has the right to the protection of the

law against such interference or attacks.”

The duty to respect the privacy and security of communications

implies that individuals have the right to share information and ideas

with one another without interference by the State (or a private actor),

secure in the knowledge that their communications will reach and be

read by the intended recipients alone. The right to privacy also

encompasses the right of individuals to know who holds information

about them and how that information is used.34

Article 17 of the International Covenant on Civil and Political

Rights prohibits States parties from interfering with the privacy of

those within their jurisdiction and requires them to protect those

persons by law against arbitrary or unlawful interference with their

privacy. Privacy includes information about an individual’s identity, as

well as the private life of the person. 35

Article 17 of the International Covenant on Civil and Political

Rights is the most important legally binding treaty provision

guaranteeing the right to privacy at the universal level. Other

international human rights instruments contain similar provisions; and

laws at the regional and national levels also reflect the right of all

people to respect for their private and family life, home and

correspondence.36

The right to privacy is not, however, an absolute right. Once an

individual is under suspicion and subject to formal investigation by

34 https://firstlook.org/theintercept/document/2014/10/15/un-report-human-rights-terrorism/, Accessed on March 7, 2015, at 12.35 http://www.ohchr.org/Documents/Publications/Factsheet32EN.pdf. Accessed on March 30, 2015, at 45.36 https://firstlook.org/theintercept/document/2014/10/15/un-report-human-rights-terrorism/, Accessed on March 7, 2015, at 12.

15

intelligence or law enforcement agencies, that individual may be

subjected to surveillance for entirely legitimate counter-terrorism and

law enforcement purposes. Although article 17 of the Covenant does

not contain a specific limitation clause outlining the circumstances in

which interference with the right to privacy may be compatible with

the Covenant, it is universally understood as permitting such measures

providing that (a) they are authorized by domestic law that is

accessible and precise and that conforms to the requirements of the

Covenant, (b) they pursue a legitimate aim and (c) they meet the tests

of necessity and proportionality.37

States have for a long time provided their security intelligence

services with powers of surveillance, including wiretapping and the use

of tracking devices. Some States have significantly extended these

surveillance powers in recent years. All of these practices involve the

collection of information about a person. They therefore limit the

privacy of such persons, as well as raising questions about how the

data are to be protected. Interference with privacy also arises in the

security screening and searching of persons.38

Any act which has an impact on a person’s privacy must be

lawful, i.e., it must be prescribed by law. This means that any search,

surveillance or collection of data about a person must be authorized by

law. The extent to which this occurs must not be arbitrary, which in

turn requires that the legislation must not be unjust, unpredictable or

unreasonable. The law authorizing interference with privacy must

specify in detail the precise circumstances in which the interference is

permitted and must not be implemented in a discriminatory

37 Id, at 1338 http://www.ohchr.org/Documents/Publications/Factsheet32EN.pdf. Accessed on March 30, 2015, at 45.

16

manner.103 This does not mean, however, that States enjoy an

unlimited discretion to interfere with privacy, since any limitation on

rights must be necessary to achieve legitimate purposes and be

proportionate to those purposes. Regard must also be had to the

obligation of States to protect against the arbitrary exercise of such

authorizations. Thus, in Klass v. Germany for example, the European

Court of Human Rights stated that it must be satisfied that any system

of secret surveillance conducted by the State must be accompanied by

adequate and effective guarantees against abuse. Where personal

information is collected, the data must be protected against unlawful

or arbitrary access, disclosure or use. Although jurisprudence on this

duty is scarce, the Human Rights Committee, in its general comment

N° 16 (1988), has explained that States must take effective measures

to ensure that information concerning a person’s private life does not

reach the hands of persons who are not authorized by law to receive,

process and use it, and is never used for purposes incompatible with

the International Covenant on Civil and Political Rights. Effective

protection should include the ability of every individual to ascertain in

an intelligible form, whether and, if so, what personal data are stored

in automatic data files, and for what purposes, with a corresponding

right to request rectification or elimination of incorrect data.39

Unlike a number of the qualified rights protected by the

Covenant, article 17 does not enumerate an exhaustive list of

legitimate public policy objectives that may form the basis of a

justification for interfering with the right to privacy. Nonetheless, the

prevention, suppression and investigation of acts of terrorism clearly

amount to a legitimate aim for the purposes of article 17. Terrorism

39 Id.

17

can destabilize communities, threaten social and economic

development, fracture the territorial integrity of States, and undermine

international peace and security. Under article 6 of the Covenant,

States are under a positive obligation to protect citizens and others

within their jurisdiction against acts of terrorism. One aspect of this

obligation is the duty to establish effective mechanisms for identifying

potential terrorist threats before they have materialized. States

discharge this duty through the gathering and analysis of relevant

information by intelligence and law enforcement agencies.40

The enhanced capacity of States to monitor all Internet traffic is

said to be of particular significance in the counter-terrorism context

because communications via the Internet have played an important

part in the financing and perpetration of acts of international terrorism;

because the Internet has been used for the purpose of recruitment to

terrorist organizations; and because the identification in advance of

those involved in the planning or instigation of acts of terrorism may

otherwise be hampered by intelligence limitations. Since terrorism is a

global activity, the search for those involved must extend beyond

national borders. The prevention and suppression of terrorism is thus a

public interest imperative of the highest importance and may in

principle form the basis of an arguable justification for mass

surveillance of the Internet.41

Mass surveillance programmes pose a significant challenge to

the legality requirements of article 17 of the Covenant. Where bulk

access programmes are in operation, there are no limits to the

categories of persons who may be subject to surveillance, and no limits

40 https://firstlook.org/theintercept/document/2014/10/15/un-report-human-rights-terrorism/, Accessed on March 7, 2015, at 14.41 Id.

18

on its duration. These conditions cannot therefore be spelled out in

legislation. The detailed legal and administrative frameworks for mass

surveillance often remain classified, and little is still publicly known

about the ways in which captured data are operationalized. Very few

States have so far enacted primary legislation explicitly authorizing

such programmes. Instead, outdated domestic laws that were

designed to deal with more rudimentary forms of surveillance have

been applied to new digital technology without modification to reflect

the vastly increased capabilities now employed by some States.

Indeed, it has been suggested that certain States have “intentionally

sought to apply older and weaker safeguard regimes to ever more

sensitive information”42

It is incumbent upon States to demonstrate that any interference with the

right to pivacy under article 17 of the Covenant is a necessary means to

achieving a legitimate aim. This requires that there must be a rational connection

between the means employed and the aim sought to be achieved. It also

requires that the measure chosen be “the least intrusive instrument among those

which might achieve the desired result” The related principle of proportionality

involves balancing the extent of the intrusion into Internet privacy rights against

the specific benefit accruing to investigations undertaken by a public authority in

the public interest. However, there are limits to the extent of permissible

interference with a Covenant right. As the Human Rights Committee has

emphasized, “in no case may the restrictions be applied or invoked in a manner

that would impair the essence of a Covenant right”.37 In the context of covert

surveillance, the Committee has therefore stressed that any decision to allow

interference with communications must be taken by the authority designated by

law “on a case-by-case basis”.38 The proportionality of any interference with the

42 Id, at 15.

19

right to privacy should therefore be judged on the particular circumstances of the

individual case. 43

None of these principles sits comfortably with the use of mass surveillance

technology by States. The technical ability to run vast data collection and

analysis programmes undoubtedly offers an additional means by which to pursue

counterterrorism and law enforcement investigations. But an assessment of the

proportionality of these programmes must also take account of the collateral

damage to collective privacy rights. Mass data collection programmes appear to

offend against the requirement that intelligence agencies must select the

measure that is least intrusive on human rights (unless relevant States are in a

position to demonstrate that nothing less than blanket access to all Internet-

based communication is sufficient to protect against the threat of terrorism and

other serious crime). Since there is no opportunity for an individualized

proportionality assessment to be undertaken prior to these measures being

employed, such programmes also appear to undermine the very essence of the

right to privacy. They exclude altogether the “case-by-case” analysis that the

Human Rights Committee has regarded as essential, and they may thus be

deemed to be arbitrary, even if they serve a legitimate aim and have been

adopted on the basis of an accessible legal regime (see A/HRC/27/37, para. 25).

The Special Rapporteur, accordingly, concludes that such programmes can be

compatible with article 17 of the Covenant only if relevant States are in a position

to justify as proportionate the systematic interference with the Internet privacy

rights of a potentially unlimited number of innocent people in any part of the

world.44

43 Id, at 19.44 Id.

20

In the absence of special safeguards, there is virtually no secret

dimension of a person’s private life that would withstand close metadata analysis.

Automated data-mining thus has a particularly corrosive effect on privacy.45

It follows that any capture of communications data is potentially an

interference with privacy and, further, that the collection and retention of

communications data amounts to an interference with privacy whether or not

those data are subsequently consulted or used. Even the mere possibility of

communications information being captured creates an interference with

privacy,6 with a potential chilling effect on rights, including those to free

expression and association. The very existence of a mass surveillance

programme thus creates an interference with privacy. The onus would be on the

State to demonstrate that such interference is neither arbitrary nor unlawful.46

Mass or “bulk” surveillance programmes may thus be deemed to be

arbitrary, even if they serve a legitimate aim and have been adopted on the basis

of an accessible legal regime. In other words, it will not be enough that the

measures are targeted to find certain needles in a haystack; the proper measure

is the impact of the measures on the haystack, relative to the harm threatened;

namely, whether the measure is necessary and proportionate.47

45 Id, at 20.46 http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf. Accessed on March 30, 2015, at 7.

47 Id, at 9.

21

CHAPTER VI

CONCLUSION AND RECOMMENDATION

Relative to the problem statement of this study, we can conclude that:

Mass digital surveillance for counter-terrorism violates the

right to privacy under Article 17 the International Covenant on Civil

and Political Rights.

International human rights law provides a clear and universal framework

for the promotion and protection of the right to privacy, including in the context of

domestic and extraterritorial surveillance, the interception of digital

communications and the collection of personal data. Practices in many States

have, however, revealed a lack of adequate national legislation and/or

enforcement, weak procedural safeguards, and ineffective oversight, all of which

have contributed to a lack of accountability for arbitrary or unlawful interference in

the right to privacy.48

States’ obligations under article 17 of the International Covenant on Civil

and Political Rights include the obligation to respect the privacy and security of

digital communications. This implies in principle that individuals have the right to

share information and ideas with one another without interference by the State,

secure in the knowledge that their communication will reach and be read by the

intended recipients alone. Measures that interfere with this right must by

authorized by domestic law that is accessible and precise and that conforms with

the requirements of the Covenant. They must also pursue a legitimate aim and

meet the tests of necessity and proportionality. 49

48 http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf. Accessed on March 30, 2015, at 15.49 https://firstlook.org/theintercept/document/2014/10/15/un-report-human-rights-terrorism/. Accessed on March 7, 2015, at 22.

22

The prevention and suppression of terrorism is a public interest

imperative of the highest importance and may in principle form the basis of an

arguable justification for mass surveillance of the Internet. However, the technical

reach of the programmes currently in operation is so wide that they could be

compatible with article 17 of the Covenant only if relevant States are in a position

to justify as proportionate the systematic interference with the Internet privacy

rights of a potentially unlimited number of innocent people located in any part of

the world. Bulk access technology is indiscriminately corrosive of online privacy

and impinges on the very essence of the right guaranteed by article 17. In the

absence of a formal derogation from States’ obligations under the Covenant,

these programmes pose a direct and ongoing challenge to an established norm

of international law.50

Effectively addressing the challenges related to the right to privacy in the

context of modern communications technology will require an ongoing, concerted

multi-stakeholder engagement. This process should include a dialogue involving

all interested stakeholders, including Member States, civil society, scientific and

technical communities, the business sector, academics and human rights

experts. As communication technologies continue to evolve, leadership will be

critical to ensuring that these technologies are used to deliver on their potential

towards the improved enjoyment of the human rights enshrined in the

international legal framework. 51

There is a clear and pressing need for vigilance in ensuring the

compliance of any surveillance policy or practice with international human rights

law, including the right to privacy, through the development of effective

safeguards against abuses. As an immediate measure, States should review

their own national laws, policies and practices to ensure full conformity with

50 Id.51 http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf. Accessed on March 30, 2015, at 16.

23

international human rights law. Where there are shortcomings, States should

take steps to address them, including through the adoption of a clear, precise,

accessible, comprehensive and non-discriminatory legislative framework. Steps

should be taken to ensure that effective and independent oversight regimes and

practices are in place, with attention to the right of victims to an effective

remedy.52

There are a number of important practical challenges to the promotion and

protection of the right to privacy in the digital age. Building upon the initial

exploration of some of these issues in the present report, there is a need for

further discussion and in-depth study of issues relating to the effective protection

of the law, procedural safeguards, effective oversight, and remedies. An in-depth

analysis of these issues would help to provide further practical guidance,

grounded in international human rights law, on the principles of necessity,

proportionality and legitimacy in relation to surveillance practices; on measures

for effective, independent and impartial oversight; and on remedial measures.

Further analysis also would assist business entities in meeting their responsibility

to respect human rights, including due diligence and risk management as well as

on their role in providing effective remedies.53

The Special Rapporteur concured with the High Commissioner for

Human Rights that there is an urgent need for States using this

technology to revise and update national legislation to ensure

consistency with international human rights law. Not only is this a

requirement of article 17, but it also provides an important opportunity

for informed debate that can raise public awareness and enable

individuals to make informed choices. Where the privacy rights of the

entire digital community are at stake, nothing short of detailed and

explicit primary legislation should suffice. Appropriate restrictions 52 Id, at 16.53 Id

24

should be imposed on the use that can be made of captured data,

requiring relevant public authorities to provide a legal basis for the

reuse of personal information.54

States should establish strong and independent oversight bodies

that are adequately resourced and mandated to conduct ex ante

review, considering applications for authorization not only against the

requirements of domestic law, but also against the necessity and

proportionality requirements of the Covenant. In addition, individuals

should have the right to seek an effective remedy for any alleged

violation of their online privacy rights. This requires a means by which

affected individuals can submit a complaint to an independent

mechanism that is capable of conducting a thorough and impartial

review, with access to all relevant material and attended by adequate

due process guarantees. Accountability mechanisms can take a variety

of forms, but must have the power to order a binding remedy. States

should not impose standing requirements that undermine the right to

an effective remedy. 55

The Special Rapporteur calls upon all States that currently

operate mass digital surveillance technology to provide a detailed and

evidence-based public justification for the systematic interference with

the privacy rights of the online community by reference to the

requirements of article 17 of the Covenant. States should be

transparent about the nature and extent of their Internet penetration,

its methodology and its justification, and should provide a detailed

public account of the tangible benefits that accrue from its use.56

54 https://firstlook.org/theintercept/document/2014/10/15/un-report-human-rights-terrorism/. Accessed on March 7, 2015, at 22.55 Id, at 23.56 Id.

25

Security and human rights are not alternatives; they go hand in hand. Respect for

human rights is the route to security, not an obstacle to it. The route to security is

through respect for human rights, not their violations.”57

57 Senator Jamby Madrigal her negative vote to the Human Security Act. Legislative Journal, Senate of the Philippines, 13th Congress, February 7, 2007.

26

BIBLIOGRAPHY

Laws

International Covenant on Civil and Political Rights.

The 1987 Constitution of the Republic of the Philippines.

Books

Bernas, Joaquin G., S.J. 2009. The 1987 Constitution of the Republic of the Philippines: A Commentary. Manila, Philippines: REX Book Store.

Cruz, Isagani A. 2007. Constitutional Law. Quezon City, Philippines: Central Book Supply, Inc.

Online Sources

https://firstlook.org/theintercept/document/2014/10/15/un-report-human-rights-terrorism/ . Accessed on March 7, 2015.

http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf March 3, 2015.

https://www.eff.org/issues/mass-surveillance-technologies Accessed on March 30, 2015.

https://www.eff.org/nsa-spying/timeline . Accessed on March 6, 2015.

http://en.wikipedia.org/wiki/Mass_surveillance.

http://www.futureofprivacy.org/wp-content/uploads/De-Hert-Boulet-Cloud-Computing-and-Transborder-Law-Enforcement.pdf . Accessed on March 3, 2015.

http://www.ohchr.org/Documents/ProfessionalInterest/ccpr.pdf Accessed on March 30, 2015.

http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf. Accessed on March 30, 2015.

http://www.ohchr.org/Documents/Publications/Factsheet32EN.pdf . Accessed on March 30, 2015.

http://www.slate.com/blogs/future_tense/2013/09/26/article_17_surveillance_update_countries_want_digital_privacy_in_the_iccpr.html . Accessed on March 30, 2015.

http://www.spiegel.de/international/world/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html. Accessed on March 2, 2015.

27

https://www.techdirt.com/articles/20150303/09253030197/eff-grabs-two-more-docs-nsa-detailing-expanded-post-911-surveillance-powers-section-702-justifications.shtml . Accessed on March 6, 2015.

http://www.theguardian.com/us-news/2015/mar/05/new-zealand-spying-on-pacific-allies-for-five-eyes-and-nsa-snowden-files-show . Accessed on March 6, 2015.

Balderama, Gilbert D. Dénouement of the Human Security Act: Tremors in the Turbulent Odyssey of Civil Liberties. Philippines. http://ustlawreview.com/pdf/vol.LII/Denoument_of_the_Human_Security_Act.pdf. Accessed on March 5, 2014.

Boumghar, Mouloud, Frédéric Ceuppens and Nabeel Rajab. 2008. Terrorism and Human Rights in the Philippines Fighting Terror or Terrorizing? France: Federation Internationale de ligues des droits de I’Homme. http://www.fidh.org/IMG/pdf/ph493a.pdf. Accessed on March 5, 2014.

Cabalza, Chester B. Deconstructing Human Security in the Philippines. https://www.academia.edu/2137055/Deconstructing_Human_Security_in_the_Philippines. Accessed on March 5, 2014.

28