Politech mailing list archives

FC: Privacy International asks South Africa to block wiretap bill


From: Declan McCullagh <declan () well com>
Date: Tue, 14 Aug 2001 10:55:44 -0400

Two views follow:

1. A letter to the S.A. Parliament from Privacy International's Dave Banisar suggesting "substantial" changes to the legislation
2. A contrary view from Bretton Vine <bretton () deepsouth co za>

Previous Politech message:
http://www.politechbot.com/p-02384.html

-Declan
        
********

Date: Tue, 14 Aug 2001 09:35:28 +0100
To: Declan McCullagh <declan () well com>
From: David Banisar <dbanisar () privacy org>
Subject: PI Letter on SA Interception and Monitoring Bill

Declan,

Here is PI submission to the SA Parliament on the Interception and Monitoring Bill for your list, if you're interested.

Dave


http://www.privacyinternational.org/countries/south_africa/pi-sa-intercept-letter.html

http://www.privacyinternational.org/countries/south_africa/pi-sa-intercept-letter.pdf


                         PRIVACY INTERNATIONAL
                           Washington Office
                   1718 Connecticut Ave, NW, Suite 200
                         Washington, DC 20009
                         202-483-1217 (phone)
                          202-483-1248 (fax)


August 13, 2001

Committee on Justice & Constitutional Development
c/o The Secretary to Parliament
PO Box 15
Cape Town 8000
South Africa

Attn: Ms Collette Herzenberg or Ms. Zodwa Zenzile

RE: Comments on Interception and Monitoring Bill

We are writing in response to your solicitation for comments on the
Interception and Monitoring Bill currently being reviewed by the
Committee. These comments are submitted on behalf of Privacy
International, a human rights group dedicated to the protection and
promotion of individuals' privacy interests worldwide.

PI represents member organizations and individuals from a wide variety
of backgrounds specializing in privacy, surveillance, data protection
and freedom of information in over 40 countries and has offices in
London and Washington, D.C. PI engages is a wide variety of educational
and other activities each year including testifying before many national
and international bodies, organizing campaigns, issuing reports, holding
conferences, and co-producing the annual international survey on Privacy
and Human Rights (available at
http://www.privacyinternational.org/survey). The organization and its
members have been actively involved in deliberations and campaigns on
electronic surveillance in many jurisdictions worldwide for over 10
years.

Overall, we find the bill lacking many basic safeguards found in other
countries' laws. We believe that the bill represents a step backwards
from the Interception and Monitoring Prohibition Act 1992 and is
inconsistent with international standards on human rights and the legal
requirements of the South African Constitution. On the basis of
international experiences, we believe that The lack of safeguards will
inevitably lead to abuses.

We recognize South Africa concerns over the issue of crime but the bill
threatens to undermines democratic principles enshrined in the South
African Constitution and is likely to reduce South African citizens'
confidence in their government because of its broad powers and lack of
protections.

We recommend that the Committee refrain from approving this bill until
these issues are addressed. Our specific comments are outlined below.


HUMAN RIGHTS AND ELECTRONIC SURVEILLANCE

It is recognized worldwide that wiretapping and electronic surveillance
is a highly intrusive form of investigation that should only be used in
limited and unusual circumstances. Nearly all major international
agreements on human rights protect the right of individuals from
unwarranted invasive surveillance.

Article 12 of the 1948 Universal Declaration of Human Rights states:

        No one should be subjected to arbitrary interference with his
        privacy, family, home or correspondence, or to attacks on his honour
        or reputation. Everyone has the right to the protection of the law
        against such interferences or attacks.

This language was adopted into Article 17 of the International Covenant
on Civil and Political Rights, which went into force in 1966. The U.N.
Commissioner on Human Rights in 1988 made clear that this broadly covers
all forms of communications:

        Compliance with article 17 requires that the integrity and
        confidentiality of correspondence should be guaranteed de jure and
        de facto. Correspondence should be delivered to the addressee
        without interception and without being opened or otherwise read.
        Surveillance, whether electronic or otherwise, interceptions of
        telephonic, telegraphic and other forms of communication,
        wire-tapping and recording of conversations should be prohibited.

A number of the regional human rights treaties make these rights legally
enforceable. Article 8 of the 1950 Convention for the Protection of
Human Rights and Fundamental Freedoms states:

Everyone has the right to respect for his private and family life, his
home and his correspondence. (2) There shall be no interference by a
public authority with the exercise of this right except as in accordance
with the law and is necessary in a democratic society in the interests
of national security, public safety or the economic well-being of the
country, for the prevention of disorder or crime, for the protection of
health of morals, or for the protection of the rights and freedoms of
others.

The European Court of Human Rights has heard numerous cases on the right
of the privacy of communications. It has ruled that countries must adopt
laws regulating electronic surveillance by both governments and private
parties and set out guidelines on the protections that countries must
follow.

Article 11 of the American Convention on Human Rights sets out the right
to privacy in terms similar to the Universal Declaration. In 1965, the
Organization of American States proclaimed the American Declaration of
the Rights and Duties of Man, which called for the protection of
numerous human rights, including privacy. The Inter-American Court of
Human Rights has begun to address privacy issues in its cases.

The right of privacy of communications is also equally recognized on the
national level worldwide. Nearly every country in the world recognizes
privacy as a fundamental human right in its constitution, either
explicitly or implicitly. Most include secrecy of communications.



LACK OF DEFINITION FOR SURVEILLANCE CONDUCTED FOR REASONS OF "COMPELLING NATIONAL INTEREST"

One of the most troublesome aspects of the bill is the broad allowance
for surveillance allowed under Article 4. The scope for authorizing
surveillance under this section does not include meaningful limitations
to prevent abuses.

The surveillance laws of most democracies either specifically define
which crimes electronic surveillance may be used to investigate (See
e.g. US law at 18 U.S.C. § 2516) or limit it to crimes that impose a
certain level of penalty (the Netherlands requires crimes that impose
imprisonment of at least 4 years, in Australia, the minimum is seven
years). In national security cases, it usually must be proven that the
target is acting on behalf of a foreign government or organization (See
U.S. Foreign Intelligence Surveillance Act 50 U.S.C. §§ 1801-11) or an
organization that poses a serious threat to the system of government of
the country.

This ensures that legitimate and normal activities in a democracy such
as journalism, civic protest, trade union organizing and political
opposition are not subjected to unwarranted surveillance because the
individuals involved have different interests and goals than those in
power. It also ensures that relatively minor crimes, especially those
that would not generally involve telecommunications for facilitation,
are not used a pretexts to conduct intrusive surveillance for political
or other reasons.

In contrast, Article 4(2)(b) authorizes surveillance to protect the
"security or other compelling national interest" without defining it or
placing any limitations on that broad discretion. Article 1(g)'s
definition for surveillance of "serious crime" for 4(2)(a) repeats that
authorization as an additional justification for surveillance under that
section without further defining its scope.



LOW STANDARD FOR SURVEILLANCE ORDERS

The standard set out in Article 4(2) that a judge is required to be only
be "satisfied" that, "there are reasonable grounds to believe" before
authorizing surveillance establishes an inadequate threshold to prevent
its use in questionable or marginal cases. Most other democratic
countries' laws require a higher standard. In English-language
countries, "probable cause" or a similar level of finding is generally
required. The standard proposed would appear to be below what is
required under Section 36 of the South African Constitution.

In addition, the procedures set out under 4.2(a) that a judge only is
required to determine that the offense "cannot be investigated in
appropriate manner" provide little protection. Under 4(2)(b), even that
minor finding is not required. This is a considerably lower level of
protection than found in many other democratic countries that generally
require detailed findings before an authorization can be issued. For
instance, in the United States, 18 U.S.C. § 2518 requires: a statement
that one of the crimes that electronic surveillance is authorized for is
being committed; the identity of the location and persons being
targeted; certification that normal investigative procedures have been
tried and failed or are likely to fail or are too dangerous; and a
promise to minimize the interception of conversations to only those
relevant to the investigation. Other countries including Canada and New
Zealand have similar procedural requirements.



TECHNICAL STANDARDS AND REQUIREMENTS

This bill imposes significant burdens on an extremely wide range of
private persons, organizations and companies. There are few, if any,
computer or communications systems that would not fall under this
definition. Every new communications tool and system would be required
to implement surveillance capabilities.

We are very concerned about the impact of Article 7(1) which prohibits
all telecommunications and service providers from making available new
services that are not wiretap capable. We believe that is inconsistent
with basic human rights for a government to demand that no conversation
should ever be free from being overheard. While we recognize that many
telecommunications networks have the capability for interception, making
it a primary function of the system changes the nature of the network
and places a chill on free speech and other human rights.

This will also negatively affect the development of new technologies and
efforts to provide access to telecommunications to all citizens in South
Africa. In the United States, the Communications Assistance for Law
Enforcement Act (CALEA) has delayed the development of new telephone,
cellular and satellite communications technologies as conflicts over the
development and implementation of surveillance standards have continued.
Similar problems have occurred in the Netherlands and Australia.

Article 7 also fails to include many of the important stakeholders in
the creation of the document on technical surveillance standards. 7(4)
authorizes the Minister to discuss the standards with Service Providers
but not with independent technical experts, human rights groups and
others with an interest in the implementation of the legislation. This
closed process ensures that privacy interests will be sacrificed to real
other goals.

The list of criteria in Article 7(5) is unbalanced and places the
interests of surveillance over all others. It fails to include factors
such as cost effectiveness and assurances that privacy and human rights
will be protected by technical measures from unauthorized interceptions.
In contrast, CALEA requires that any standards:

        (1) meet the assistance capability requirements Š by cost-effective
        methods;

        (2) protect the privacy and security of communications not
        authorized to be intercepted;

        (3) minimize the cost of such compliance on residential ratepayers;

        (4) serve the policy of the United States to encourage the provision
        of new technologies and services to the public; and

        (5) provide a reasonable time and conditions for compliance with and
        the transition to any new standard, including defining the
        obligations of telecommunications carriers during any transition
        period.

This bill will also likely cause more Internet security problems and
crime. Internet security is a major concern and there are frequent
reports that network security flaws are being exploited. By requiring
these capabilities, the bill will cause the introduction of more
security flaws into telecommunications networks. Any protocol that
requires methods of ensuring surveillance will create new security holes
that can be exploited. In addition, the increased complexity of the
systems will further undermine security and increase costs of
development and implementation. The U.S. National Research Council's
1999 "Trust in Cyberspace" report identified increasing complexity as a
core cause of decreasing security. The new security holes will likely
cause more economic and personal harm than any interceptions facilitated
will prevent.



LEGAL STANDARDS FOR TRANSACTIONAL AND LOCATION INFORMATION

In Article 1, the bill defines "call-related information" very broadly
to include a wide variety of information that is not considered content,
including web traffic and mobile telephone location information. Under
Article 9, this information can be obtained without requiring a court
order at the written request of representatives of the police, military
and intelligence services. The information can be routed to the
government monitoring centers for real-time surveillance or in other
forms. It is crucial for the protection of privacy and human rights that
transactional data created by new technologies is given greater
protection under law than traditional telephone calling records. We
recommend that a court order be required due to the sensitivity of the
information.

When surfing the net, a user can visit dozens of sites in just a few
minutes and reveal a great deal about their personal situation and
interests. This can include medical, financial, social interests and
other highly personal information. The detailed and potentially
sensitive nature of the data makes it more similar to content of
communications than telephone records and it should be treated as
content.

Even if the actual pages viewed are considered content and given greater
legal protections, the transactional information still can reveal a
great deal of information. For example in a standard visit to
www.google.com, a search engine site, the content of that communication
is the packets returned which consists of graphics and text; but this
does not include the actual request to www.google.com, which would be:

   http://www.google.com/search?hl=en&q="Aids+treatment"&btnG=Google+Search

which quickly becomes as invasive as the interception of content
information for the purpose of investigations because it reveals the
interests of the user and the details of the content they are reading.

The same concerns apply to the interception of email header information.
While superficially this would appear analogous to the collection of
telephone calling records, there are important differences which make
the information more sensitive and thus requiring greater legal
protections: 1) unlike the telephone system, which is a point to point
system between two fixed devices that can be used by anyone with
physical access, email is usually a person to person system; 2) email
communications usually include a subject which gives an indication of
the content; and 3) the size of the communication can also reveal the
nature of the content (i.e. a media file or long text or a short
answer).

The need for greater protection is recognized by many countries around
the world. The European Union's 1997 Directive Concerning the Processing
of Personal Data and the Protection of Privacy in the Telecommunications
Sector requires that telecommunications providers delete signaling
information once it is no longer for the communications. The Council of
Europe's working group on cyber-crime in their recent final report on
the COE Cybercrime Convention, noted:

        Some states consider the collection of traffic data as being
        equivalent to the collection of content data in terms of privacy and
        intrusiveness. The right of reservation would permit these states to
        limit the application of the measures to collect traffic data, in
        real-time, to the same range of offences to which it applies the
        powers and procedures of real-time interception of content data.

Location information generated by mobile communications is similarly
sensitive and a court order should be required. Location information can
provide details of an individuals' movements and activities and whom
they have met with. This affects a wide variety of civil liberties
protected by the SA Constitution beyond the right of privacy including
the rights of free speech and assembly.

Finally, under this Article and under Article 11, there is no limitation
set on the duration for which this information can be held. South Africa
is still lacking a law protecting personal data as required by the
Constitution and as was originally included in the Open Democracy Bill.
We urge the Parliament to move forward on adopting that act.



COSTS

The bill requires that industry providers bear the costs of upgrading
and maintaining their networks to make them wiretap capable. This will
result in increased surveillance, a stifling of innovation, the reducing
the availability of services, and higher costs on consumers. Industry
commentators in many countries around the world have consistently asked
for the inclusion of a reimbursement requirement, and the privacy
community has supported those requests.

Requiring that law enforcement pay for their surveillance capabilities
provides an important level of accountability through the budget
process. The lack of reimbursement significantly lowers the barriers to
law enforcement surveillance by removing budgetary limits that would
require that new surveillance capabilities be cost effective before they
are implemented. Without it, it has been the experience from many
countries that law enforcement places unreasonable demands on providers
for expansive surveillance capabilities without justifying their
demands.

The imposition of these requirements will be difficult and very
expensive. Most equipment does not come with the capability for
surveillance, so no off-the-shelf solution is available. For many new
technologies where innovative approaches are being developed, adding in
capabilities can be quite difficult. While it is thought that a market
for technologies with embedded surveillance capabilities may emerge and
lessen the costs, there are three intertwined problems with this
resolution. First, particularly within ISPs, each network is very
different and introducing these technologies may harm the effectiveness
and efficiency of the networks. Second, these technologies are being
developed within closed standards bodies (ETSI for example with its
Internet and mobile telephony efforts); meanwhile the Internet
Engineering Taskforce (IETF), a relatively open body, has refused to
develop such technologies. And third, such a market has failed to
emerge, perhaps because of the technical burdens and substantial public
opposition in many countries to facilitating more electronic
surveillance.

Countries that have attempted to impose all of law enforcement's costs
on the industry have seen delays and loss of new companies and jobs. In
the Netherlands, the Telecommunications Act imposes a similar burden on
providers as the SA bill and the costs for creating this capability are
not compensated by the government. The government did not assess the
probable costs and it was particularly difficult for ISPs to implement
as there is little experience in creating such capabilities in networks.
The industry organization of internet service providers in the
Netherlands (NLIP) has estimated that the costs will range from half to
several million Euros, and there are strong concerns as to how this will
affect small local and regional ISPs. NLIP expects an increase in the
price of internet access in the Netherlands as a result and a mass
closing of small ISPs. After much lobbying, the deadline for lawful
interception implementation was delayed for ISPs and it is expected that
the majority of the ISPs will not meet the extended deadline.

In Australia, carriers are also obliged to develop and implement at
their own expense an interception capability. The costs and burden upon
the operators have proven more difficult and expensive than anticipated.
As a result, the carriers were given both a waiver from the requirement
for several years and, it is understood, a subsidy towards the cost.

There is also the issue of the unquantifiable opportunity cost. While
technological researchers and network experts expend time and resources
on intercept capability, they are losing time that could be spent
researching network efficiency and operations. As a result, the costs
incurred by the interception capability work are enormous, particularly
with the lack of skilled workers available. A study conducted by Privacy
International and the London School of Economics on the economic impact
of the UK's wiretap bill concluded that opportunity costs were major
part of the economic costs of the legislation.



LACK OF PUBLIC ACCOUNTABILITY

Another important oversight measure missing in the bill is a provision
requiring annual public reporting of information about the use of
electronic surveillance by government departments. This is a common
feature of wiretap laws in English-speaking countries and many others in
Europe and should be included in the South African law.

Countries that issue annual reports on the use of surveillance include
the U.S., U.K., Sweden, Canada, Australia, New Zealand and France. These
reports typically provide summary details about the number of uses of
electronic surveillance, the types of crimes that they are authorized
for, their duration and other information. In the U.S., the
Administrative Office of the U.S. Courts produces the report and submits
it to Congress. In Australia and Canada, an annual report to the
Attorney General must be tabled in Parliament. In the U.K., the
Interception of Communications Commissioner publishes the report.

These countries recognize openness and transparency are essential to
limit abuses. They are widely used in many countries by the Parliaments
for oversight and also by journalists, NGOs and others to examine the
activities of law enforcement.

A number of countries including the United Kingdom and France also have
special commissions that review wiretap usage and monitor for abuses.
These bodies have expertise that most judges who authorize surveillance
do not have. They also have the ability to conduct follow up
investigations once a case is complete. In other countries, the Privacy
Commission or Data Protection Commission also has some ability to
conduct oversight of electronic surveillance.

In addition, there are no provisions in the bill to inform individuals
who have had their communications intercepted or their transactional
information collected once the investigation has been completed. Nor is
there any timetable set for expunging information once it is no longer
necessary. This is an important feature found in many laws around the
world that provides another level of oversight, especially in those
cases where innocent parties' communications are intercepted.



CONCLUSION

While we understand the importance of combating serious crime in South
Africa, we believe that the lack of legal protections in this bill will
invite abuse and have a severe impact on human rights and privacy. We
recommend that substantial modifications be made before there is any
further consideration of approving it.

We thank you for this opportunity to comment. If you have any questions,
please feel free to contact David Banisar, deputy director at +1 202
483-1217 or by email at dbanisar () privacy org.



Sincerely,


/sig

David Banisar
Deputy Director

********

Date: Mon, 13 Aug 2001 22:04:03 +0200
From: Bretton Vine <bretton () deepsouth co za>
Subject: Re: FC: South Africa moves to increase Net-surveillance, limit encryption
In-reply-to: <5.0.2.1.0.20010813103910.00a1cbc0 () mail well com>
To: declan () well com

On Monday 13 August 2001 17:31, Declan McCullagh uttered:
> A quick summary of South Africa's "Interception and Monitoring" bill, which
> has cleared the Cabinet and is heading for a vote in the Parliament:

Hi Declan

There has been quite a furore over this bill in the past few weeks and a lot
of misinformation on the process/bill in the press.

>  Opponents say the Interception and Monitoring Bill is draconian,
>  describing it as a charter for government snooping.

There isn't much difference in terms of what can already be done by law.
However, the changes have been made to reflect other technologies (such as
cellphones and the internet)

It also makes it illegal for anyone but the government / law enforcement to
conduct electronic surveillance. i.e. private investigators (etc) are no
longer allowed to tap phones .
(There have been a few public outcry's already over private eavesdropping of
political party's and commercial interests)

>  Given only three weeks to make submissions on the Bill, non-government
>  organisations have been making last-ditch attempts to garner more time
>  to respond before the 13 August deadline.

The whole process has taken three years already and has been through two
public comment phases already. The South African Law Commission has done a
good job to date with this. Industry players and various effected parties
have been aware of the process from start till now.

It's only been the outcry of an alleged right-wing aligned group
(censorbugbear.com) over claims that the bill was akin to censorship as
practiced in China that led to press reports claiming it was being quietly
introduced or that the government was trying to get away with something.

Ivo Vegter (journalist) has a thorough breakdown of the hooha at:
http://www.itweb.co.za/sections/columnists/doubletake/vegter010806.asp

> It provides for state monitoring of all telecommunications systems,
> including mobile phones, internet and e-mail, once permission has been
> granted by relevant authorities.

There is a the question of abuse of infrastructure available to any central
monitoring facility. Many claim the bill does not have sufficient controls in
place to prevent abuse and this has been a talking point on a variety of
mailing lists.

Of particular interest is the requirement for service providers to cover the
cost of installing monitoring equipment in order to comply with the law. This
would be impossible for many ISPs in South Africa and would especially hurt
the small/medium ISPs who do not have the funds to do this, nor would they be
able to turn a profit for some time if they did.

The South African Internet Service Providers Association has prepared a
submission to the bill which is available at http://www.ispa.org.za under the
Submissions category of the Regulatory section of the site.

********

Date: Mon, 13 Aug 2001 22:13:26 +0200
From: Bretton Vine <bretton () deepsouth co za>
Subject: (2) Re: South Africa moves to increase Net-surveillance,
To: Declan McCullagh <declan () well com>

http://www.itweb.co.za/sections/columnists/doubletake/vegter010806.asp
Ivo Vegter (06 August 2001)

Sparked by an online article, a frenzy of anger has been whipped up in the
local media about a non-existent "Censorship Bill" being sneaked through
Parliament.

A  brief period of madness and self-righteous anger last week surrounded the
Interception and Monitoring Bill, tabled in Parliament on 18 July 2001.

The hysterics were sparked by an article on a Web site,
www.censorbugbear.com, under the tabloid-style headline "S-Africa plans to
block Internet access!".

The facts

"The Bill, which none of the journalists in question seem to have read, is
quite specific about when and how communication may be intercepted."

The site warns that a "draconian Internet censorship law" is being sneaked
through Parliament "with only 21 days allowed for public comment".

The same august Web publication - whose designers cleverly disguised the site
to look like a student pamphlet - yelps, "New racist laws in SA telecomms
Act", and "United Nations warned of Afrikaner Genocide".

Now I'll admit that I went for a few drinks on Friday night and might have
missed an important public broadcast, but being a keen follower of the
legislative process, especially as it applies to information and
communications technology, I probably would have noticed if a new
Telecommunications Act had been passed.

(For the record, SA hasn't had a new Telecommunications Act since 1996, and
will in all likelihood only see some amendments to the current Act later this
year.)

Several local radio stations, IT publications and Web sites picked up on the
"Censorship Bill", and responded with sensational reports of their own.
Sa.internet.com chimed in with "under the auspices of the nefarious Bill lie
the censoring of any postal communications, telecommunications, and online
channels (such as e-mail and Web sites)".

The Censor Bugbear article refers to an article on WorldNetDaily, which warns
that "a new draconian censorship law to control and monitor all postal and
Internet communications is being pushed through the South African Parliament
by the ruling Marxist African National Congress party".

The dire news continues: "According to Harry Wu, the world's leading
human-rights dissident, China has a new friend in SA, and Mbeki is a
communist to be reckoned with."

Of course, journalists have a duty to protect the rights of civil society
against abuses, or inept legislation that may lead to abuses. And protecting
the populace from evil communists that want to establish a police state and
overturn the constitution is probably something the media should oppose - in
the interests of its readers, of course.

But journalists also have a duty to check their facts, and not unduly scare
their readers or listeners.

And the fact is that the censorbugbear.com article, which seems to be the
only source for this sensationalist outcry, can at best be described as a
misinterpretation of the Bill.

[...]

********




-------------------------------------------------------------------------
POLITECH -- Declan McCullagh's politics and technology mailing list
You may redistribute this message freely if you include this notice.
Declan McCullagh's photographs are at http://www.mccullagh.org/
To subscribe to Politech: http://www.politechbot.com/info/subscribe.html
This message is archived at http://www.politechbot.com/
-------------------------------------------------------------------------


Current thread: