Please ensure you are using the correct version of the Manual and Q&A for the exam you will be sitting. Find out more.
Dismiss
Show Summary Details
Covert Investigation

Covert Investigation

Clive Harfield and Karen Harfield
Page of

date: 13 December 2024

p. 16410 Obtaining Communications Datalocked

p. 16410 Obtaining Communications Datalocked

  • Clive Harfield
  • , and Karen Harfield

Abstract

This chapter talks about obtaining communications data, which is not, strictly speaking, a covert investigation and does not involve the active monitoring of a suspect's self-incriminating conduct as it happens. It details how communications data establishes the fact that a communication has taken place but does not reveal the content or meaning of the communication. It also highlights communications data analysis which exposes patterns of communications and networks of associations and provides enhanced corroborated and inferential information about the investigation subject and third parties with whom the investigation subject has communicated. The chapter looks at the potential for significant intrusion against the privacy of both investigation subjects and third parties from communications data analysis which necessitates an authorization regime for obtaining communications data. It describes the authorization regime for obtaining communications data, which is set out in the same legislation that governs the authorization and undertaking of interception of communications.

You do not currently have access to this chapter

Sign in

Please sign in to access the full content.

Subscribe

Access to the full content requires a subscription