BAILII is celebrating 24 years of free online access to the law! Would you consider making a contribution?
No donation is too small. If every visitor before 31 December gives just £1, it will have a significant impact on BAILII's ability to continue providing free access to the law.
Thank you very much for your support!
[Home] [Databases] [World Law] [Multidatabase Search] [Help] [Feedback] | ||
England and Wales Court of Appeal (Criminal Division) Decisions |
||
You are here: BAILII >> Databases >> England and Wales Court of Appeal (Criminal Division) Decisions >> Coulson & Anor v R [2013] EWCA Crim 1026 (28 June 2013) URL: http://www.bailii.org/ew/cases/EWCA/Crim/2013/1026.html Cite as: [2013] WLR(D) 262, [2013] EWCA Crim 1026, [2014] WLR 1119, (2013) 177 JP 513, [2013] 2 Cr App R 32, [2014] 1 WLR 1119, [2013] 3 CMLR 51, [2013] 4 All ER 999 |
[New search] [Printable RTF version] [Buy ICLR report: [2014] 1 WLR 1119] [View ICLR summary: [2013] WLR(D) 262] [Help]
ON APPEAL FROM SOUTHWARK CROWN COURT
The Hon Mr Justice Saunders
T2012/7351
Strand, London, WC2A 2LL |
||
B e f o r e :
LORD JUSTICE LLOYD JONES
and
MR. JUSTICE OPENSHAW
____________________
Andrew Coulson Stuart Kuttner |
Appellants |
|
- v - |
||
Regina |
Respondent |
____________________
Andrew Edis QC, Daniel Beard QC, Rebecca Chalkley and Ligia Osepciu for the Crown
Hearing date: Friday 14th June, 2013
____________________
Crown Copyright ©
Lord Judge, Lord Chief Justice:
This is the judgment of the Court. The major responsibility for its preparation was undertaken by Lloyd Jones L.J.
Jurisdiction
"At the beginning of a preparatory hearing, the court must:
(a) announce that it is such a hearing; and
(b) take the defendant's plea (unless already done)."
In fact the defendants were arraigned at some stage during that hearing and it is obviously sensible, and in accordance with the overriding objective, to hear this appeal now despite that fact that there was not scrupulous observance of Part 15.6 at the time.
The History of the Provisions
The Statutory Provisions
"1.— The offence of conspiracy.
(1) Subject to the following provisions of this Part of this Act, if a person agrees with any other person or persons that a course of conduct shall be pursued which, if the agreement is carried out in accordance with their intentions, either—
(a) will necessarily amount to or involve the commission of any offence or offences by one or more of the parties to the agreement, or
(b) would do so but for the existence of facts which render the commission of the offence or any of the offences impossible,
he is guilty of conspiracy to commit the offence or offences in question.
(2) Where liability for any offence may be incurred without knowledge on the part of the person committing it of any particular fact or circumstance necessary for the commission of the offence, a person shall nevertheless not be guilty of conspiracy to commit that offence by virtue of subsection (1) above unless he and at least one other party to the agreement intend or know that that fact or circumstance shall or will exist at the time when the conduct constituting the offence is to take place".
"1.— Unlawful interception.
(1) It shall be an offence for a person intentionally and without lawful authority to intercept, at any place in the United Kingdom, any communication in the course of its transmission by means of–
(a) a public postal service; or
(b) a public telecommunication system."
This provision follows closely the language of section 1(1) of ICA 1985 which RIPA replaced.
Section 2(1) defines "telecommunication system" as follows:
"telecommunication system" means that any system (including the apparatus comprised in it) which exists (whether wholly or partly in the United Kingdom or elsewhere) for the purpose of facilitating the transmission of communications by any means involving the use of electrical or electro-magnetic energy."
Section 2(2) provides:
"(2) For the purposes of this Act, but subject to the following provisions of this section, a person intercepts a communication in the course of its transmission by means of a telecommunication system if, and only if, he–
(a) so modifies or interferes with the system, or its operation,
(b) so monitors transmissions made by means of the system, or
(c) so monitors transmissions made by wireless telegraphy to or from apparatus comprised in the system,
as to make some or all of the contents of the communication available, while being transmitted, to a person other than the sender or intended recipient of the communication."
At the heart of this appeal is the effect of section 2(7) which provides:
"(7) For the purposes of this section the times while a communication is being transmitted by means of a telecommunication system shall be taken to include any time when the system by means of which the communication is being, or has been, transmitted is used for storing it in a manner that enables the intended recipient to collect it or otherwise to have access to it."
Systems used to transmit voicemail messages
(1) The mobile handset operates as a radio transmitter/receiver.
(2) Calls and messages sent to it are sent over the provider's standard network which is a public telecommunications system in the United Kingdom and routes communications to and from the phone through local transceiver base stations (cell sites).
(3) That network is connected to other similar networks operated by other public telecommunications providers.
(4) Calls and messages to the phone number are intended for the subscriber who is the sole user.
(5) In the event that a voice call goes unanswered, the network automatically diverts the call to a voicemail facility, which is housed at switching level within the system, and on which the caller leaves a digitally recorded voice message, the presence of which is later automatically notified to the subscriber.
(6) The subscriber may then access the recorded message by calling his voicemail facility, in practice with the use of a speed dial facility on his own handset but in fact by dialling a mobile phone number, which causes the network to route his call to his voicemail box. This can also be done from another telephone, subject to the use of a PIN code security feature. This call is automatically answered by the network and, by selecting options, he is able to listen to some or all of the recorded message. By selecting further options he may listen again, save or delete the recorded message. Unless he positively acts to delete the message, the recording remains stored within his voicemail box until either he later deletes it or the maximum period for retention is reached in which case it is deleted automatically.
(7) The relevant interception conduct ("hacking") involves remotely accessing the voicemail box by dialling, from another telephone, the telephone number relating to it and bypassing any security feature, so as to be able to listen to the content of the message, without the knowledge or consent of the subscriber, at a time when the recorded message is stored there, not yet having been deleted.
(8) It may be the case that the message either has or has not previously been heard in whole or in part by the subscriber. This will not be known by the hacker when the hack takes place and is outside his control.
(9) The hacker therefore achieves access to the message by "impersonating" the intended recipient. If the message is inaccessible to the intended recipient, it cannot be hacked. Whether before or after it has been listened to by the intended recipient, it will only be capable of being intercepted if it is stored in the system in a manner which means that the intended recipient has access to it.
The competing submissions
Authorities
"Sub-section (7) has the effect of extending the time of communication until the intended recipient has collected it. It is essential on the evidence in this case that if NTL are to preserve the material, they take action before the intended recipient has collected the e-mail. Sub-section (7) means that we are here concerned with what happens in the course of transmission." (at para. 19)
In that case the Divisional Court was considering an application by police officers for the production of the contents of e-mails that were said to be relevant to a fraud investigation. Compliance with a production order, made under the Police and Criminal Evidence Act 1984, required the company to interfere with the operations of its system so as to divert a copy of the e-mail message to a second e-mail address before it was downloaded or otherwise collected by the intended recipient. Accordingly, the case was concerned solely with the period before the e-mail was made available to the intended recipient and the observations of Lord Woolf cited above were made in that context. The court was not addressing the situation under consideration in the present case and, as Fulford L.J. observed, it is unsustainable to suggest that the case is authority for the proposition that, once the intended recipient has collected the communication, "transmission" has necessarily ceased. Furthermore we note, as did Fulford L.J., that the Divisional Court in NTL did not consider the effect of the words "or otherwise to have access to it" in section 2(7). We agree with the judge that it would be impossible to reach a proper determination of the issue raised on the present application without addressing the impact of those words.
"In our view the natural meaning of the expression "interception" denotes some interference or abstraction of the signal, whether it is passing along wires or by wireless telegraphy, during the process of transmission." (at para. 20)
The issue in that case was whether the use of a covert listening device placed in the appellant's car which recorded words spoken by the appellant, including words spoken when he was using a mobile phone, constituted an interception of the call. The Court of Appeal decided that it was not, because what was recorded was not the transmission but the appellant's words taken from the sound waves in the car. Accordingly the case says nothing about when a transmission ends by reference to section 2(7).
Reference to Hansard
The statutory language
"The use of the word "collect", no doubt in the sense of "fetch" or "obtain", suggests picking something up and taking it somewhere else. This is what occurs when an e-mail is downloaded from the service provider's server to the computer of the subscriber causing it to be deleted from the ISP's server. By contrast, the use of the words "to have access to it" can only mean, in the case of a voicemail, "listen to it". Voicemails are not "collected" they are "accessed". This is especially so when one considers the whole phrase "…enables the intended recipient to collect it or otherwise to have access to it". The addition of the last words appears positively to indicate a different kind of activity from collection, especially having regard to the use of the word "otherwise". "
"I accept, therefore, that the period of storage covered by the section does not come to an end on first access or collection by the intended recipient, but it continues for so long as the system is used to store the communication, and whilst the intended recipient has access to it in this way. In a comprehensive fashion, this covers the vice that in my view the provision was intended to address, namely unauthorized access to communications, whether oral or text, whilst they remain on the system by which they were transmitted. As the prosecution submits, unlawful access and intrusion is not somehow less objectionable because the message has been read or listened to by the intended recipient before the unauthorized access takes place."
The European Directives
"It follows that, in applying national law, whether the provisions in question were adopted before or after the Directive, the national court called upon to interpret it is required to do so, as far as possible, in the light of the wording and the purpose of the Directive in order to achieve the results pursued by the latter and therefore comply with the third paragraph of Article 189 of the Treaty." (emphasis added)
It follows therefore that in interpreting RIPA courts must do so, as far as possible, so as to achieve the results pursued by both the 1997 and the 2002 Directives.
"Article 1
Object and scope
1. This Directive provides for the harmonisation of the provisions of the Member States required to ensure an equivalent level of protection of fundamental rights and freedoms, and in particular the right to privacy, with respect to the processing of personal data in the telecommunications sector and to ensure the free movement of such data and of telecommunications equipment and services in the Community. …"
Article 2(c) defines "public telecommunications network":
"'public telecommunications network' shall mean transmission systems and, where applicable, switching equipment and other resources which permit the conveyance of signals between defined termination points by wire, by radio, by optical or by other electromagnetic means, which are used, in whole or in part, for the provision of publicly available telecommunications services"
Article 5(1) provides:
"Article 5
Confidentiality of the communications
1. Member States shall ensure via national regulations the confidentiality of communications by means of a public telecommunications network and publicly available telecommunications services. In particular, they shall prohibit listening, tapping, storage or other kinds of interception or surveillance of communications, by others than users, without the consent of the users concerned, except when legally authorised, in accordance with Article 14 (1)."
Article 6(1) provides:
"Article 6
Traffic and billing data
1. Traffic data relating to subscribers and users processed to establish calls and stored by the provider of a public telecommunications network and/or publicly available telecommunications service must be erased or made anonymous upon termination of the call without prejudice to the provisions of paragraphs 2, 3 and 4."
"Article 1
Scope and aim
1. This Directive harmonises the provisions of the Member States required to ensure an equivalent level of protection of fundamental rights and freedoms, and in particular the right to privacy, with respect to the processing of personal data in the electronic communication sector and to ensure the free movement of such data and of electronic communication equipment and services in the Community.
Article 2 includes the following definitions:
"(d) 'communication' means any information exchanged or conveyed between a finite number of parties by means of a publicly available electronic communications service. …
…
(h) 'electronic mail' means any text, voice, sound or image message sent over a public communications network which can be stored in the network or in the recipient's terminal equipment until it is collected by the recipient."
Article 5(1) provides:
"Article 5
Confidentiality of the communications
1. Member States shall ensure the confidentiality of communications and the related traffic data by means of a public communications network and publicly available electronic communications services, through national legislation. In particular, they shall prohibit listening, tapping, storage or other kinds of interception or surveillance of communications and the related traffic data by persons other than users, without the consent of the users concerned, except when legally authorised to do so in accordance with Article 15(1). This paragraph shall not prevent technical storage which is necessary for the conveyance of a communication without prejudice to the principle of confidentiality."
Article 6(1) provides:
"Article 6
Traffic data
1. Traffic data relating to subscribers and users processed and stored by the provider of a public communications network or publicly available electronic communications service must be erased or made anonymous when it is no longer needed for the purpose of the transmission of a communication without prejudice to paragraphs 2, 3 and 5 of this Article and Article 15(1)."
"(22) The prohibition of storage of communications and the related traffic data by persons other than the users or without their consent is not intended to prohibit any automatic, intermediate or transient storage of this information insofar as this takes place for the sole purpose of carrying out the transmission in the electronic communications network and provided that the information is not stored for any period longer than is necessary for the transmission and for traffic management purposes, and that during the period of storage the confidentiality remains guaranteed."
She submits that these provisions provide the key to understanding the scope of section 2(7) which was intended to extend the scope of the statutory protection only to communications in automatic, intermediate and transient storage for the purposes of transmission.
"In the result, the words of section 2(7) of RIPA should be interpreted as extending the concept of transmission in this context so as to include any period during which the transmission system itself stores the communication. Undoubtedly, this protection goes further than that seemingly envisaged in Directives 1997/66/EC or 2002/58/EC, but it is entirely a matter for Parliament to decide whether or not to provide a scheme which provides greater protection than that indicated by the European Parliament and Council in a particular Directive, for instance in order to ensure that an individual's right to privacy, when viewed broadly in this context, is substantively upheld…"
"(27) The exact moment of the completion of the transmission of a communication, after which traffic data should be erased except for billing purposes, may depend on the type of electronic communications service that is provided. For instance for a voice telephony call the transmission will be completed as soon as either of the users terminates the connection. For electronic mail the transmission is completed as soon as the addressee collects the message, typically from the server of his service provider."
However, we do not derive much assistance from this provision. First, Recital 27 is concerned with a different matter, the definition of the exact moment of the completion of transmission for the purposes of provisions concerning the erasure of traffic data and so, at best, can only be relevant by way of analogy to the scope of the protection conferred by Article 5(1). Secondly, as the recital itself points out, the precise point of completion of transmission for this purpose may depend on the type of service provided. That is clearly correct. This Recital does not specifically address voicemail messages. In addition in this regard, the appellants rely on the definition of "electronic mail" in Article 2(h) of the 2002 Directive which employs the concept of ability to be stored "until it is collected by the recipient". Article 2(h) clearly includes a voice message. However, this provision is not a definition of "transmission" nor does it necessarily indicate the point at which transmission ceases.
"(6) The legal and technical differences between national provisions concerning the retention of data for the purpose of prevention, investigation, detection and prosecution of criminal offences present obstacles to the internal market for electronic communications, since service providers are faced with different requirements regarding the types of traffic and location data to be retained and the conditions and periods of retention."
"(8) Legal, regulatory and technical provisions adopted by the Member States concerning the protection of personal data, privacy and the legitimate interest of legal persons, in the electronic communication sector, should be harmonised in order to avoid obstacles to the internal market for electronic communication in accordance with Article 14 of the Treaty. Harmonisation should be limited to requirements necessary to guarantee that the promotion and development of new electronic communications services and networks between Member States are not hindered."
We are not concerned here with exhaustive regulation by the EU of the protection of privacy in the electronic communications sector. Rather, this is a case of minimum harmonisation leaving Member States free to maintain more stringent regulatory standards than those required by the Directives, provided they are otherwise compatible with EU law. The Directives prescribe minimum standards, but it is open to Member States to set higher standards for the protection of privacy of electronic communications, provided that those additional obligations are compatible with EU law.
Legal certainty
Admissibility of evidence
Conclusion