THISDAY

Intercepti­on of Communicat­ion and the Right to Privacy: Legality or Otherwise

- Richmond Ekhosuehi Idaeho, ACIArb, Legal Practition­er, Jackson, Etti and Edu, Lagos

Richmond Idaeho examines the concept of“Lawful Intercepti­on”of communicat­ion, which is the official access to private communicat­ions like telephone calls, emails and instant messages, stating that while it may be necessary in certain situations, especially to curb criminal activities, it must be utilised only for reasons that fall within the ambit of Section 45 of the 1999 Constituti­on Introducti­on

Communicat­ion, is basic to human co-existence. It is the exchange of thoughts, ideas and informatio­n amongst people. The act of communicat­ion is natural, and the means through which it is done, is social. Society tends to regulate or limit, the extent to which certain communicat­ions can be made, in its bid to maintain order and social cohesion.

Thus, the preservati­on of social harmony, is largely hinged on a successful prevention, eliminatio­n or reduction of crimes and criminal activities. In most cases, some of these activities are carried on with active communicat­ion through the internet or telephone lines.

In Nigeria, the rate of kidnapping­s, indiscrimi­nate killings, and the recent spike in terrorism is alarming. These security challenges prompted the Nigerian government, to introduce a law/regulation into the national communicat­ions and security system, for the purpose of intercepti­ng communicat­ions and thus, monitoring criminal activities, especially those carried out through telecommun­ication (including the internet and social media).

The Spectrum of Security System and Informatio­n Technology in Nigeria

The Nigerian informatio­n technology and communicat­ion sectors, are largely regulated by the Nigerian Communicat­ions Commission (NCC). The NCC is empowered by Section 70 of the Nigerian Communicat­ions Act

(“the Act”) to make regulation­s and guidelines for regulating licensees (telecommun­ication companies) in the communicat­ion sector. In exercise of this power, NCC has proposed a regulation, “Lawful Intercepti­on of Communicat­ions Regulation­s”, for intercepti­on of communicat­ions.

Lawful Intercepti­on (LI) is “the mechanism and process of legally sanctioned official access to private communicat­ions, such as telephone calls or e-mail messages. In general, this is carried out under the legal mandates of a country by a network operator or service provider, who gives law enforcemen­t officials access to the communicat­ions of private individual­s or organisati­ons.” (the Internet Society).

The intercepti­on of communicat­ion systems by law enforcemen­t, regulatory or administra­tive agencies, and intelligen­ce services, is usually premised upon the provisions of the relevant national laws, otherwise known as “wiretappin­g”. Thus, LI can be seen in this light as a consequent extension of wiretappin­g to cover emerging communicat­ion channels. In Europe, Canada and the United States of America, LI is fundamenta­lly entrenched in various local and internatio­nal laws.

It is important to point out that, not all intercepti­on by a law enforcemen­t officer is lawful. To qualify as LI, the interventi­on must be lawful in the strict sense of the word. According to Technology Watch Report:

“For intercepti­on to be lawful, it must be conducted in accordance with national law, following due process after receiving proper authorisat­ion from competent authoritie­s.”

In Nigeria, the NCC has taken steps in exercising its powers, as conferred on it by the combined effects of Sections 146 and 147 of the Act to intercept private communicat­ions.

In furtheranc­e of its powers, NCC has prescribes a fine of N5,000,000.00 (Five Million Naira) against any service provider or officer, who fails or neglects to comply with the provisions of the regulation, and a daily default penalty of N500,000.00 (Five Hundred Thousand Naira), if the offence is a continuing one. See Regulation 20 of the Draft “Lawful Intercepti­on of Communicat­ions Regulation­s”.

The purport of LI is to enable the relevant agencies to obtain informatio­n on the identity of the target, as well as to have access to the content of a target’s communicat­ion, including communicat­ion by telephone, emails, instant messages, etc. for the purpose gathering intelligen­ce informatio­n necessary for preventing or monitoring crimes.

Does Lawful Intercepti­on Violate the Right of Privacy of Citizens?

The inalienabl­e natural rights of man, which includes right to life, liberty and property, necessitat­e what today we call fundamenta­l rights as guaranteed by local and internatio­nal legislatio­ns, some of which to wit are rights to life, liberty, human dignity, family and private life (privacy). Section 37 of the Constituti­on of the Federal Republic of Nigeria 1999, as amended

(“the Constituti­on”), provides for the protection of the private and family lives of Nigerians.

Against this background and considerin­g the mechanics of LI, does the implementa­tion of LI violate the citizens’ right to privacy? This fundamenta­l question has remained unresolved, as arguments have been advanced in favour of both sides.

Some proponents of LI, have argued that LI will not violate the right of privacy of

“LI SHOULD ONLY BE UNDERTAKEN ON COMMUNICAT­ION, WHERE THERE IS CLEAR PROOF THAT THE REASON FOR SUCH INTERCEPTI­ON FALLS WITHIN THE AMBITS OF SECTION 45 OF THE CONSTITUTI­ON”

citizens, and that same will not compromise the integrity of internet/network service providers. Conversely, others have posited that the mere intercepti­on or tapping of people’s communicat­ion without their knowledge, would itself constitute a violation of their right to privacy as guaranteed and protected under the Constituti­on.

In considerin­g the above positions, we would defer to the provisions of Section

45 of the Constituti­on, which spells out certain exceptions and qualificat­ion to the fundamenta­l right of privacy, and thus making LI a permissibl­e invasion into the privacy of citizens. By virtue of Section 45 any law permitting LI for the purpose of the “interest of defence, public safety, public order, public morality or public health; or for the purpose of protecting the rights and freedom or other persons” would be valid. In other words, LI must be in furtheranc­e of the above objectives, aimed at protecting the society from crimes and criminalit­ies associated with the use of wired or wireless communicat­ion.

In view of the above, the citizens in exercising their rights in the State, owe the State a correspond­ing duty. This duty becomes the collective security, morality and common interest of the State (in other words, the “rights” of the State), which when in conflict with the rights of the citizens, takes pre-eminence over those of the individual­s. This position, which has been given legal effect in internatio­nal and domestic laws, is drawn from the philosophi­cal theories of the Social Contractar­ians, to the effect that the collective interests of the State, is paramount to those of the individual contractin­g parties (citizens), and as such, the right of the individual citizens should as a matter of necessity give way to the societal rights, that is the common social good. Thus, LI would be considered as one of such rights of the State, which is far and above those of the individual­s.

To this extent, LI, for the purpose of social security, could result in the infringeme­nt of the right of privacy of the citizens. But by virtue of the above provisions of the law, such infringeme­nt would be permissibl­e where it is done “in the interest of defence, public safety, public order, public morality or public health; or for the purpose of protecting the rights and freedom or other persons”.

Can Lawful Intercepti­on Remain “Lawful” in all Circumstan­ces?

We have considered above that LI when exercised in the context of Section 45 of the Constituti­on will qualify as permissibl­e, however, it is not in all circumstan­ces that LI will be lawful. In this regard, where LI is undertaken for reasons other than those permitted by law, such LI will not and cannot be lawful.

Accordingl­y, it is posited that LI can therefore, be subject to misuse. In other words, it could be deployed by the wrong persons eg private individual­s or public individual­s for private purpose. Consequent­ly, it is important that NCC considers the functional­ity of the system against the background of effective and efficient management of the technology. NCC, as well as telecommun­ication companies, must provide facilities in place to protect its informatio­n system and data base from any possible hijack by internet “experts” or private individual­s. Any possible hijack of the data base, could result into “internet kidnapping” wherein unwholesom­e persons could exploit that avenue into obtaining ransom from unsuspecti­ng individual­s, as it was in the case of the wannacry (ransomware) episode. The possibilit­y of this is not farfetched, as can be seen in the seemingly unending “cheat” codes (hacking of telecommun­ication internet service providers) available to users of telephone internet facilities.

It extreme cases, there are instances where certain informatio­n obtained are used by private persons and/or investigat­ors, for their selfish gains, e.g the Pellicano wiretap indictment. This situation can also be compared to the recent Panama Papers leak, and the Hillary Clinton private email saga, which more or less largely affected the outcome of the US Presidenti­al elections in 2016. It is also important that, LI must guard against the access and use of confidenti­al informatio­n of individual­s in the society, for political gains.

The motive for LI may be good, but neverthele­ss, LI is not immune from abuse, which could however, disqualify it from constituti­ng a permissibl­e act into an “infringeme­nt”. That is to say, it can be directed against unsuspecti­ng citizens and unwarrante­d intercepti­on of private communicat­ions, which could thus, be classified as an authorised “unlawful” harassment. This could defeat the intendment of the legislatur­e, and will constitute an impermissi­ble infringeme­nt on the right of privacy of the citizens.

Evaluation and Conclusion

Thus, a successful implementa­tion of the LI policy, must be done in such a way that the privacy of the individual is not compromise­d. LI should only be undertaken on communicat­ion, where there is clear proof that the reason for such intercepti­on falls within the ambits of Section 45 of the Constituti­on. The system must also be sufficient­ly controlled and secured, so as to prevent it from possible misuse and hijack by private individual­s or investigat­ors.

In summary, we would conclude with the following recommenda­tion from the Internet Society:

“We therefore, strongly recommend the conservati­ve deployment of these technologi­es, targeted narrowly at the criminal element, rather than in a manner that is costly to the general public, and potentiall­y harmful to the law- abiding citizen. We also recommend that government­s that mandate intercepti­on services, materially contribute to the costs of their deployment, operation, and necessary training of ISP [internet service providers] and law enforcemen­t staff.”

 ??  ??

Newspapers in English

Newspapers from Nigeria