Collection / Filtering

Suggest Good Practice

Overview

Once a warrant has been authorized or approved, an intelligence agency can proceed with the implementation of a particular surveillance measure. For this, it intercepts the relevant signals, for example by tapping an internet service provider’s (ISP) fiber optic backbone cable or diverting data at an internet exchange point. Afterwards, the collected data has to be filtered for two reasons: First, because of the huge volumes passing through, which would be far too much to be stored long term, gratuitous data that is extremely unlikely to yield any intelligence value is filtered out (e.g., all data from public video feeds); second, the collected data stream has to be filtered so as to abide by legal requirements. Certain data – for example the communications involving lawyers, journalists, priests, or other professions relying on the confidentiality of correspondence – may be offered higher levels of protection in national surveillance laws.

Filter

Categories
Access
International cooperation
Private sector involvement
Professionalism
Restriction
Countries
Denmark
France
Germany
Netherlands
Norway
Sweden
Switzerland
United Kingdom
USA
Dimensions
Legal Safeguard
Oversight Innovation

Good Practices

no results found

Nerd Corner

Extract from the BND ruling on filters: “The service is to be obliged to continuously develop the filtering methods and to keep them at the state of the art of science and technology.” German Federal Constitutional Court, BND Law Judgment of May 2020, 1 BvR 2835/17, Paragraph 173. https://data.guardint.org/en/entity/neb3eo8hl9h?page=81&searchTerm=.

CCC paper on technical capabilities of filters: Kay Rechthien. 2016. ”Sachverständigen-Gutachten gemäß Beweisbeschluss, 1. Untersuchungsausschuss (NSA-UA) der 18. Wahlperiode des Deutschen Bundestages.” September. https://www.ccc.de/system/uploads/220/original/beweisbeschluss-nsaua-ccc.pdf.

CTIVD report on the application of filters in “research assignment oriented” (OOG) interceptions by the Dutch intelligence services AIVD and MIVD (our translation), which is available in Dutch via the Review Committee on the Intelligence and Security Services: “Progress Report,” July 17, 2019 (CTIVD Nr. 63). https://www.ctivd.nl/documenten/rapporten/2019/09/03/index.

For a detailed analysis of potential applications for direct oversight access to operational surveillance systems, see: Kilian Vieth and Thorsten Wetzling. 2019. “Data-driven Intelligence Oversight: Recommendations for a System Update.” https://guardint.org/2019/11/28/data-driven-intelligence-oversight-recommendations-for-a-system-update/.

Electronic Frontier Foundation. 2013. “Yahoo’s Challenge to the Protect America Act in the Foreign Intelligence Court of Review.” October 22, 2013. https://www.eff.org/cases/yahoos-challenge-protect-america-act-foreign-intelligence-court-review. Other, more recent provider challenges include: Kate Conger. 2017. “An Unknown Tech Company Tried (and Failed) to Stop the NSA’s Warrantless Spying.” Gizmodo. June 14, 2017. https://gizmodo.com/an-unknown-tech-company-tried-and-failed-to-stop-the-1796111752.

Privacy and Civil Liberties Oversight Board (PCLOB). 2014. “Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act.” July 2, 2014. https://www.pclob.gov/library/702-Report.pdf.