The UK’s Metropolitan Police obtained the “telecommunications data” of the political editor of the Sun. They did this without his consent, and possibly even without his knowledge. They also did this without any warrant or other court order. And this intrusion has caused a media sensation.
The revelation was buried in the “Operation Alice” report of the Metropolitan Police into the so-called “Plebgate” affair about what was said (and not said) by the then chief whip of the government, Andrew Mitchell, at the gates of Downing Street in September 2012. This incident led to a senior ministerial resignation, and to four police officers losing their jobs with one also being prosecuted. There are accusations and counter-accusations, and an ongoing libel case. The published report set out part of the Metropolitan Police’s own investigation; on whether Mr Mitchell called the police “plebs” the report is inconclusive.
But deep in the report, comprising paragraph 5.120, is this short and, for many, worrying sentence:
The telecommunications data in respect of Tom Newton Dunn was applied for and evidenced.
What the Metropolitan Police appear to have done was to issue a “RIPA request” (under the Regulation of Investigatory Powers Act 2000) to Mr Newton Dunn’s mobile telephone company for “telecommunications data”. This is not the same as obtaining “intercept” evidence of live calls and voicemails – that would need a warrant. Instead the request would have been for the accompanying data which would be held by the telecommunications provider: the relevant numbers and other details of incoming and outgoing calls, their duration, their times — even the geographical location of the mobile telephone when the calls were received or made. As one can imagine, with this amount of data, obtaining an intercept of the actual content of the calls becomes less important.