Pegasus Project: Re-Questioning the Legality of the Cyber-Surveillance Mechanism
Abstract
:1. Introduction
2. Background—Tracing the Violation of Human Rights Owing to Cyber-Surveillance
“No one shall be subjected to arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation, and everyone has the right to the protection of the law against such interference or attacks”.5
3. Limitations under International Law in Tracing Corporate Liability for Violating Human Rights
3.1. State-Centric Mechanism of International Law
3.2. The Inefficiency of the Present Soft Laws
“First, state duties to protect against third party human rights violations through appropriate policies and regulation; second, corporate responsibility to respect human rights through the exercise of due diligence, including human rights impact assessments, tracking and monitoring and other measures; and third, access by victims of human rights abuses to effective remedies, both judicial and non-judicial”.
3.3. Other Hardships in Holding a Corporate Entity Liable for Human Rights Violations
4. Drawing a Parallel with the PMSC Industry: In Terms of Analyzing Inherent State Activity
5. The Feasibility of a Shared Responsibility Regime for Redressing the Human Rights Concerns: In Pursuance of the ICoC and ICoCA Mechanism
6. Other Required Solutions
6.1. Redefining the Concept of Privacy
6.2. Required Application of Human Rights Treaties in Instances of Extraterritorial Cyber Surveillance
“General Assembly is reaffirming the human rights and fundamental freedoms enshrined in the […] relevant international human rights treaties, including the ICCPR […] [d]eeply concerned at the negative impact that surveillance and/or interception of communications […and] [c]alls upon all states to review their procedures, practices and legislation regarding the surveillance of communications, their interception and the collection of personal data, including mass surveillance, interception and collection, with a view to upholding the right to privacy by ensuring the full and effective implementation of all their obligations under international human rights law”.(UNGA 2013).
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Baughen, Simon. 2015. Human Rights And Corporate Wrongs Closing: The Governance gap, rev. ed. Cheltenham: Edward Elgar Publishing, p. 172. [Google Scholar]
- Bellal, Annyssa. 2014. Arms Transfers and International Human Rights Law. In Weapons under International Human Rights Law. Cambridge: Cambridge University Press. [Google Scholar]
- Bromley, Mark. 2017. Export Controls, Human Security and Cyber-Surveillance Technology: Examining the Proposed Changes to the EU Dual-Use Regulation. Solna: Stockholm International Peace Research Institute, pp. 6–10. [Google Scholar]
- Cave, Danielle, Fergus Ryan, and Vicky Xiuzhong Xu. 2019. Mapping More of China’s Technology Giants: AI and Surveillance. Available online: https://www.aspi.org.au/report/mapping-more-chinas-tech-giants (accessed on 30 August 2022).
- Chan, Anna W. 2019. The Need for a Shared Responsibility Regime between State and Non-State Actors to Prevent Human Rights Violations Caused by Cyber-Surveillance Spyware. Brooklyn Journal of International Law 44: 795. [Google Scholar]
- Chawala, Ajay. 2021. Pegasus Spyware—“A Privacy Killer”. Available online: https://ssrn.com/abstract=3890657 (accessed on 30 August 2022).
- Coker, Margaret, and Paul Sonne. 2011. Life Under the Gaze of Gadhafi’s Spies. Wall Street Journal. Available online: https://www.wsj.com/articles/SB10001424052970203764804577056230832805896 (accessed on 5 January 2022).
- Commission on Human Rights. 2005. Promotion and Protection of Human Rights. Available online: https://www.ohchr.org/sites/default/files/Documents/HRBodies/SP/AMeetings/20thsession/UNODCGuidance_Item6.pdf (accessed on 30 August 2022).
- Convention on Cybercrime. 2001. Council of Europe. Available online: https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185 (accessed on 7 January 2022).
- Timberg, Craig, Michael Birnbaum, Drew Harwell, and Dan Sabbagh. 2021. On the list: Ten prime ministers, three presidents and a king. The Washington Post. Available online: https://www.washingtonpost.com/world/2021/07/20/heads-of-state-pegasus-spyware/ (accessed on 30 August 2022).
- d’Aspremont, Jean, André Nollkaemper, Ilias Plakokefalos, and Cedric Ryngaert. 2015. Sharing Responsibility Between Non-State Actors and States in International Law: Introduction. Netherland International Law Review 62: 49–67. [Google Scholar] [CrossRef] [Green Version]
- Daly, Emma. 2022. Why Tech is a Double-Edged Sword for Human Rights. Human Rights Watch. Available online: https://www.hrw.org/news/2014/01/06/whytech-double-edged-sword-human-rights (accessed on 2 February 2022).
- Daskal, Jennifer. 2016. Law Enforcement Access to Data Across Borders: The Evolving Security and Rights Issues. Journal of National Security and Law 8: 475–82. [Google Scholar]
- Deva, Surya. 2012. Guiding Principles on Business and Human Rights: Implications for Companies. EU Company Law 9: 101–9. [Google Scholar] [CrossRef]
- Electronic Frontier Foundation. 2012. Swedish Telcom Giant Teliasonera Caught Helping Authoritarian Regimes Spy on Their Citizens. Available online: https://www.eff.org/deeplinks/2012/05/swedish-telcom-giant-teliasonera-caught-helping-authoritarian-regimes-spy-its (accessed on 30 August 2022).
- Feldstein, Steven. 2019. The Global Expansion of AI Surveillance. Carnegie Endowment for International Peace, September 17. [Google Scholar]
- Fuchs, Christian. 2012. Implications of Deep Packet Inspection Internet Surveillance for Society: The Privacy & Security Research Paper Series. Issue 1. Uppsala: Department of Informatics and Meida, Uppsala University Kyrkogardsgatan. [Google Scholar]
- George, P. J. 2021. Explained: Pegasus and the laws of surveillance in India. The Hindu. Available online: https://www.thehindu.com/news/national/explained-pegasus-and-the-laws-on-surveillance-in-india/article61437972.ece (accessed on 30 August 2022).
- Georgieva, Ilina. 2015. The Right to Privacy under Fire-Foreign Surveillance under the NSA and the GCHQ and Its Compatibility with Article 17 ICCPR and Article 8 ECHR. Utrecht Journal of International and European Law 31: 104. [Google Scholar] [CrossRef]
- Global Internet Liberty Campaign. 2022. Privacy And Human Rights: An International Survey of Privacy Laws and Practice. Available online: http://gilc.org/privacy/survey/intro.html (accessed on 2 January 2022).
- Gupta, Rishi R. 2013. Germany’s Support of Assad: Corporate Complicity in the Creation of the Syrian Surveillance State Under the European Convention on Human Rights. American University International Law Review 28: 1359–60. [Google Scholar]
- Gwagwa, Arthur. 2018. Exporting Repression? China’s Artificial Intelligence Push into Africa. Net Politics. Available online: https://www.cfr.org/blog/exporting-repression-chinas-artificial-intelligence-push-africa (accessed on 5 June 2022).
- Human Rights Watch. 2014. They Know Everything We Do: Telecom and Internet Surveillance in Ethiopia. New York: Human Rights Watch. [Google Scholar]
- Jagers, Nicola. 2012. Regulating the Private Security Industry: Connecting the Public and the Private through Transnational Private Regulation. Human Rights & International Legal Discourse 6: 88. [Google Scholar]
- Karavias, Markos. 2013. Corporate Obligations Under International Law, rev. ed. Oxford: Oxford University Press, p. 10. [Google Scholar]
- Karavias, Markos. 2015. Shared Responsibility and Multinational Enterprises. Netherlands International Law Review 62: 106. [Google Scholar] [CrossRef] [Green Version]
- Khan, Irene. 2022. Spyware Scandal: UN Experts Call for Moratorium on Sale of ‘Life Threatening’ Surveillance Tech, UNHR. Available online: https://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=27379&LangID=E (accessed on 30 August 2022).
- Klabbers, Jan. 2017. Reflections on Role Responsibility: The Responsibility of International Organizations for Failing to Act. European Journal of International Law 28: 1133–61. [Google Scholar] [CrossRef]
- La Rue, Frank. 2013. Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression. UNGA. Available online: https://www.ohchr.org/sites/default/files/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf (accessed on 30 August 2022).
- Layne, Stephen R. 2015. Corporate Responsibility for Human Rights Violations: Redressability Avenues in the United States and Abroad. Gonzaga Journal of International Law 18: 7–8. [Google Scholar]
- Margulies, Peter. 2014. The NSA in Global Perspective: Surveillance, Human Rights, and International Counterterrorism. Fordham Law Review 82: 2139. [Google Scholar]
- Marquis-Boire, Morgan, Collin Anderson, Jakub Dalek, Sarah McKune, and John Scott-Railton. 2013. Some Devices Wander By Mistake: Planet Blue Coat Redux. Toronto: University of Toronto (Canada Centre for Global Security Studies). [Google Scholar]
- McBeth, Adam, and Justine Nolan. 2012. The International Protection and Human Rights and Fundamental Freedoms. In International Corporate Legal Responsibility, 1st ed. Alphen aan den Rijn: Kluwer Law International. [Google Scholar]
- McKune, Sarah. 2019. Submission to the United Nations Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression. March 2. Available online: https://www.ohchr.org/sites/default/files/Documents/Issues/Opinion/Surveillance/SARAH_MCKUNE.pdf (accessed on 30 August 2022).
- Mendel, Toby. 2012. Global Survey on Internet Privacy and Freedom of Expression. Paris: UNESCO, p. 43. [Google Scholar]
- Mihr, Anja. 2014. Good Cyber Governance: The Human Rights and Multi-Stakeholder Approach. Georgetown Journal of International Affairs 15: 28. [Google Scholar]
- Marko Milanovic. 2014. Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age. Harvard: Harvard University, p. 126. [Google Scholar]
- Milanovic, Marko. 2016. UK Investigatory Powers Tribunal Rules that Non-UK Residents Have No Right to Privacy under the ECHR. EJIL: Talk! Available online: https://www.ejiltalk.org/uk-investigatory-powers-tribunal-rules-that-non-uk-residents-have-no-right-to-privacy-under-the-echr/ (accessed on 17 January 2022).
- Mitsilegas, Valsamis. 2016. Surveillance and Digital Privacy in the Transatlantic ‘War on Terror:’ The Case for a Global Privacy Regime. Columbia Human Rights Law Review 2: 47. [Google Scholar]
- Mozur, P. J. M. Kessel, and M. Chan. 2019. Made in China, Exported to the World: The Surveillance State. The New York Times. Available online: https://www.nytimes.com/2019/04/24/technology/ecuador-surveillance-cameras-police-government.html (accessed on 5 June 2022).
- Nollkaempur, Andrew. 2013. Shared Responsibility in International Law: A Conceptual Framework. Michigan Journal of International Law 42: 436. [Google Scholar] [CrossRef] [Green Version]
- Nyst, Carly. 2013. Interface Based Jurisdiction Over Violations of the Right to Privacy. EJIL:Talk! Available online: http://www.ejiltalk.org/interference-based-jurisdiction-over-violations-of-the-right-toprivacy/ (accessed on 22 January 2022).
- Nyst, Carly. 2018. Secrets and Lies: The Proliferation of State Surveillance Capabilities and the Legislative Secrecy which Fortifies them—An Activist’s Account. State Crime Journal 7: 10–12. [Google Scholar]
- Penney, Jonathon, Sarah McKune, Lex Gill, and Ronald J. Deibert. 2018. Advancing Human Rights-By-Design In the Dual-Use Technology. Available online: https://jia.sipa.columbia.edu/advancing-human-rights-design-dual-use-technology-industry (accessed on 30 August 2022).
- Pirvan, Petruta. 2021. EU GDPR applicability to international organizations. International Association of Privacy Professionals. Available online: https://iapp.org/news/a/eu-gdpr-applicability-to-international-organizations/ (accessed on 5 January 2022).
- Privacy International. 2016. Open Season: Building Syria’s Surveillance State. London: Privacy International. [Google Scholar]
- Qiang, Xiao. 2019. The Road to Digital Unfreedom: President Xi’s Surveillance State. Journal of Democracy 30: 53–67. [Google Scholar] [CrossRef]
- Rengel, Alexandra. 2013. Privacy in the 21st Century. Leiden: Martinus Nijhof Publishers. [Google Scholar]
- Rivera, Humberto F. C. 2015. Business and Human Rights: From a ‘‘Responsibility to Respect’ to Legal Obligations and Enforcement. In Human rights And Business: Direct Corporate Accountability For Human Rights. Edited by Jernej LetnarCernic and Tara Van Ho. Chicago: Wolf Legal Publishers, p. 322. [Google Scholar]
- Rivera, Cantú. 2019. National Action Plans on Business and Human Rights: Progress or Mirage? Business and Human Rights Journal 4: 213–37. [Google Scholar] [CrossRef] [Green Version]
- Rolley, Chip. 2019. Is Chinese-Style Surveillance Coming to the West? Guardian. Available online: https://www.theguardian.com/commentisfree/2019/may/07/chinese-style-surveillance-exported-west (accessed on 30 August 2022).
- Ruggie, John. 2007. Business and Human Rights: Mapping International Standards of Responsibility and Accountability for Corporate Acts. UN Document A/HRC/4/035. February 19. [Google Scholar]
- Ruggie, John. 2011. Presentation of Report to United Nations Human Rights Council. Available online: https://www.ohchr.org/en/statements-and-speeches/2022/10/presentation-annual-report-united-nations-high-commissioner-human (accessed on 30 August 2022).
- Ryngaert, Cedric. 2015. Transnational Private Regulation and Human Rights: The Limitations of Stateless Law and the Re-Entry of the State. In Human rights and Business: Direct Corporate Accountability For Human Rights. Edited by Jernej LetnarCernic and Tara Van Ho. Chicago: Wolf Legal Publishers, p. 99. [Google Scholar]
- Saxena, Nipun. 2022. Pegasus is merely contractual, and while the consequences of breach may have a permanent devastating effect on human rights, the redressal under any municipal contractual remedy. Leaflet. Available online: https://www.theleaflet.in/is-it-the-last-flight-for-pegasus-part-i/ (accessed on 30 August 2022).
- Schaake, Marietje. 2015. Human Rights and Technology: The Impact of Intrusion and Surveillance Systems on Human Rights in Third Countries. Available online: https://www.accessnow.org/cms/assets/uploads/archive/Access%20input%20on%20HR%20and%20techonlogy%20draft%20report.pdf (accessed on 30 August 2022).
- Schechinger, Jessica. 2014. Principles of Shared Responsibility in International Law: An Appraisal of the State of the Art. Edited by Andrew Nollkaemper and I. Plakokefalos. Cambridge: Cambridge University Press. [Google Scholar]
- Shahbaz, Adrian. 2018. Freedom on the Net 2018: The Rise of Digital Authoritarianism. Freedom House, October 31. [Google Scholar]
- Silver, Vernon, and Ben Elgin. 2011. Torture in Bahrain Becomes Routine with Help of Nokia Siemens. New York: Bloomberg. [Google Scholar]
- SIPRI and Ecorys. 2015. Submission, European Commission for Impact Assessment. In Data and Information Collection for EU Dual-Use Export Control Policy Review. Stockholm: SIPRI, Rotterdam: Ecorys, p. 143. [Google Scholar]
- Sonne, Paul, and Margaret Coker. 2022. Firms Aided Libyan Spies First Look Inside Security Unit Shows How Citizens Were Tracked. Wall Street Journal. Available online: http://online.wsj.com/article/SB10001424053111904199404576538721260166388.html (accessed on 30 August 2022).
- Sullivan, Scott M. 2010. Private Force/Public Goods. Connecticut Law Review 42: 853. [Google Scholar]
- Thomsen, Roszel, and Philip Thomsen. 2015. Export Controls on Intrusion and Surveillance Items: Noble Sentiments Meet the Law of Unintended Consequences. Journal of Internet Law, 23–25. [Google Scholar]
- Timm, Trevor. 2012. Spy Tech Companies & Their Authoritarian Customers: Part I: FinFisher and Amesys Electronic Frontier Foundation. Available online: https://www.eff.org/deeplinks/2012/02/spy-tech-companies-their-authoritarian-customers-part-i-finfisher-and-amesys (accessed on 30 August 2022).
- UN. 1946. Convention on the Privileges and Immunities of the United Nations. Available online: https://treaties.un.org/Pages/ViewDetails.aspx?src=IND&mtdsg_no=III-1&chapter=3&clang=_en (accessed on 30 August 2022).
- UNCHR. 2019. Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, Surveillance and Human Rights. Available online: https://www.ohchr.org/en/special-procedures/sr-freedom-of-opinion-and-expression (accessed on 30 August 2022).
- UNGA. 2013. Res 68/167. Available online: https://documents-dds-ny.un.org/doc/UNDOC/GEN/N13/449/47/PDF/N1344947.pdf?OpenElement (accessed on 30 August 2022).
- UNGA. 2014. Report of the Office of the United Nations High Commissioner for Human Rights the Right to Privacy in the Digital Age. Available online: https://www.ohchr.org/en/calls-for-input/report-right-privacy-digital-age (accessed on 30 August 2022).
- UNHRC. 1988. The Right to Respect of Privacy, Family, Home and Correspondence and Protection of Honour and Reputation. Available online: https://www.refworld.org/docid/453883f922.html (accessed on 30 August 2022).
- UNHRC. 2009. Consideration of Reports Submitted by States Parties under Article 40 of the Covenant, Concluding Observations, Spain. Available online: https://www.refworld.org/docid/49ae42152.html (accessed on 30 August 2022).
- UNHRC. 2013a. Report by the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, Frank La Rue. Available online: https://digitallibrary.un.org/record/1304394?ln=en (accessed on 30 August 2022).
- UNHRC. 2013b. Written Statement by Reporters without Borders International, a Non-Governmental Organisation in Special Consultative Status. Available online: https://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/17/NGO/8 (accessed on 30 August 2022).
- UNHRC. 2014. Report of the Special Rapporteur on the Promotion and Protection of Human Rights and Fundamental Freedoms While Countering Terrorism, Ben Emmerson QC. Available online: https://www.ohchr.org/en/special-procedures/sr-terrorism (accessed on 30 August 2022).
- UNHRC. 2016. Report of the Special Rapporteur on the Right to Privacy, Joseph A. Cannataci. Available online: https://www.ohchr.org/en/special-procedures/sr-privacy (accessed on 30 August 2022).
- United Nations. 2010. Report of the Working Group on the Use of Mercenaries as a Means of Violating Human Rights and Impeding the Exercise of the Right of Peoples to Self-Determination. New York: United Nations. [Google Scholar]
- United Nations Global Compact. 2022. Our Participants. Available online: https://www.unglobalcompact.org/what-is-gc/participants (accessed on 10 January 2022).
- Vazquez, Carlos Manuel. 2005. Direct vs. Indirect Obligations of Corporations Under International Law. Columbia Journal of Transnational Law 43: 927. [Google Scholar]
- Wallace, Stuart. 2017. Private Security Companies and Human Rights: Are Non-Judicial Remedies Effective. Boston University International Law Journal 35: 72. [Google Scholar]
- White, Nigel D. 2011. The Privatization of Military and Security Functions and Human Rights: Comments on the UN Working Group’s Draft Convention. Human Rights Law Review 11: 137–40. [Google Scholar] [CrossRef]
1 | Forensic Methodology Report: How to catch NSO Group’s Pegasus. 2022. Amnesty International. Available online: https://www.amnesty.org/en/latest/research/2021/07/forensic-methodology-report-how-to-catch-nso-groups-pegasus/ (accessed on 30 August 2022). |
2 | “We license it only to the law enforcement and intelligence agencies of sovereign states. Nor do we have any knowledge of the individuals whom states might be investigating, nor the plots they are trying to disrupt, as is otherwise standard amongst our corporate peers.” Transparency and Responsibility Report of 2021 NSO Group. Available online: https://www.nsogroup.com/wp-content/uploads/2021/06/ReportBooklet.pdf (accessed on 30 August 2022). |
3 | Pegasus: Human rights-compliant laws needed to regulate spyware. 2022. United Nations. Available online: https://news.un.org/en/story/2021/07/1096142 (accessed on 30 August 2022). |
4 | Many of these countries have also signed onto China’s Belt and Road Initiative and its “smart city” projects, including the mass surveillance program. See (Feldstein 2019, pp. 13–15; Shahbaz 2018, pp. 6–9). |
5 | Article 17(1). International Covenant on Civil and Political Rights, 1966. |
6 | Although the language of the provisions of the latter two conventions is not exactly the same as Article 17 of ICCPR, the essence of the provision remains the same. |
7 | See, for example, Article 7, Charter of Fundamental Rights of the European Union, Art. 7. The American Convention on Human Rights, Art. 11., Article 8, The European Convention of Human Rights, Art. 8. Article 16 and 21, The Arab Charter on Human Rights, Art, 16,21. (Articles 16 and 21). |
8 | UNHRC. General Comment No. 16. Available online: https://www.refworld.org/docid/453883f922.html (accessed on 30 August 2022). Para. 10. |
9 | UN Human Rights Committee (HRC). 1988. CCPR General Comment No. 16: Article 17 (Right to Privacy), The Right to Respect of Privacy, Family, Home and Correspondence, and Protection of Honour and Reputation. Available online: https://www.refworld.org/docid/453883f922.html (accessed on 30 August 2022). Paras. 1, 8, 9, 31. |
10 | Human Rights Committee. General comment No. 16. Available online: https://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/a.hrc.17.27_en.pdf (accessed on 30 August 2022) Para. 16, Human Rights Committee. A/HRC/17/27. Para. 58. |
11 | App No. 19522/09 (2013) ECHR. |
12 | S & Marper v. the United Kingdom [GC] App. Nos. 21439/04 and 30566/04 (2008) ECHR. |
13 | Case C—362/14 (6 October 2015), para. 94. |
14 | Cornell Law School on Griswold. Privacy. Available online: https://www.law.cornell.edu/wex/privacy#:~:text=%E2%80%8BIn%20Griswold%2C%20the%20Supreme,to%20privacy%20in%20the%20Constitution (accessed 5 July 2022). |
15 | Edward Snowden. Leaks That Exposed US Spy Programme. BBC. Available online: http://www.bbc.com/news/world-us-canada-23123964 (accessed 5 January 2022). |
16 | The reason to make specific reference to International Humanitarian law is that it is mainly associated with criminal liability which is not often applicable against the legal persons like corporate. (Karavias 2013, p. 19; Vazquez 2005). |
17 | UNHR. 2012. The Corporate Responsibility to Respect Human Rights HR/PUB/12/02 (2012), 1. |
18 | (UN 1946). Convention on the Privileges and Immunities of the Specialized Agencies of the United Nations of 1947, 33 UNTS 261. |
19 | Kiobel v. Royal Dutch Petroleum Co., 569 US 108 (2013), Paras. 115–119. (Karavias 2015). |
20 | See, for example, (Convention on Cybercrime 2001). US Computer Fraud and Abuse Act, 18 USC, §1030. |
21 | International Code of Conduct for Private Security Service Providers’ Association (ICoCA). Available online: https://www.icoca.ch/en (accessed on 8 January 2022). |
22 | The International Code of Conduct for Private Security Service Providers (ICoC). Available online: https://www.icoca.ch/en/the_icoc (accessed on 8 January 2022). |
23 | ICoCA Articles of Association. Available online: https://www.icoca.ch/sites/default/files/resources/Articles%20of%20Association.pdf (accessed on 8 January 2022). |
24 | Principles and Procedures: Certification. ICOCA. Available online: https://www.icoca.ch/sites/default/files/uploads/ICoCA-Procedures-Article-11-Certification.pdf (accessed on 8 January 2022). |
25 | Procedures: Reporting, monitoring and assessing performance and compliance (ICoCA). Available online:https://www.icoca.ch/sites/default/files/uploads/ICoCA-Procedures-Article-11-Certification.pdf (accessed on 8 January 2022). |
26 | Article 13, ICoCA Principles and Procedures. |
27 | ICoCA’s complaint mechanism. Available online: https://icoca.ch/registering-a-complaint/ (accessed on 30 August 2022). |
28 | The International Code of Conduct for Private Security Service Providers’ Association (ICoCA), https://icoca.ch/private-security-companies/ (accessed on 30 August 2022). |
29 | UN Department of Safety and Security, Guidelines on the Use of Armed Security Services from Private Security Companies. 2012. UN Security Management System: Security Management Operations Manual. Available online: http://www.unsceb.org/content/action-safety-and-security (accessed on 30 August 2022). |
30 | United Nations Department of Safety. Guidelines on Use of Armed Security Services. Available online: https://www.ohchr.org/sites/default/files/Documents/Issues/Mercenaries/WG/StudyPMSC/GuidelinesOnUseOfArmedSecurityServices.pdf (accessed on 30 August 2022). |
31 | United Nations. Switzerland: Clarifying legal rules regarding Private Military and Security Companies (PMSCs). Available online:https://www.un.org/ruleoflaw/blog/portfolio-items/switzerland-clarifying-legal-rules-regarding-private-military-and-security-companies-pmscs/ (accessed on 5 July 2022). |
32 | Wassenaar Arrangement. What is the Wassenaar Arrangement? Available online: http://www.wassenaar.org/the-wassenaar-arrangement/ (accessed on 30 August 2022). |
33 | List of Dual-Use Goods and Technologies and Munitions List, Wassenaar Arrangement Secretariat. Available online: https://israel-trade.net/wp-content/blogs.dir/49/files/2020/10/WA-DOC-19-PUB-002-Public-Docs-Vol-II-2019-List-of-DU-Goods-and-Technologies.pdf (accessed on 30 August 2022). |
34 | What is the Wassenaar Arrangement? Wassenaar Arrangement. Available online: http://www.wassenaar.org/the-wassenaar-arrangement/ (accessed on 9 January 2022). |
35 | The definition cannot be entirely static as new technologies are introduced to the market, and a wider variety of communications devices and networks are involved in actual surveillance operations (Bromley 2017; SIPRI and Ecorys 2015). |
36 | “Legal frameworks must ensure that communications surveillance measures: (a) Are prescribed by law, meeting a standard of clarity and precision that insufficient to ensure that individuals have advance notice of and can foresee their application; (b) Are strictly and demonstrably necessary to achieve a legitimate aim, and adhere to the principle of proportionality and are not employed when less-invasive techniques are available or have not yet been exhausted.” (UNHRC 2013a), Para. 6. |
37 | Information Privacy in the Digital Age. American Civil Liberties Union. Available online: https://www.aclu.org/files/assets/informational_privacy_in_the_digital_age_final.pdf (accessed on 20 January 2022). |
38 | S and Marper v. the United Kingdom [GC] (App Nos. 30542/04 and 30566/04) (2008) ECHR; MK v. France (App No. 19522/09) (2013) ECHR. |
39 | Bensaid v. the United Kingdom (App No. 44599/98) (2001) ECHR [47]; Botta v. Italy (App No. 21439/93) (1994) ECHR. |
40 | Maximilan Schrems v. Data Protection Commissioner, CJEU, C-362/14, (2015). |
41 | The US National Security Agency’s widespread surveillance operation known as PRISM captures digital communications from numerous US-based corporations. |
42 | Maximilian Schrems v. Data Protection Commissioner, Case C-362/14 (6 October 2015), para. 94. |
43 | States must respect and to ensure’ the rights recognised in the treaty to all individuals within its territory and subject to its jurisdiction. International Covenant on Civil and Political Rights. 23 March 1976. 999 UNTS 171. Art. 2(1) and 17. |
44 | RIPA places the requirement of providing proof and a warrant, as indicated in section 8, outside the purview of external communications in order to prevent any arbitrary surveillance activity. Privacy International v. GCHQ, IPT/13/92/CH (16 May 2014). Additionally, the US has argued that it is obligated to respond, particularly when the victim is inside its territorial authority. United Nations Human Rights Commission. 24 April 1995. Summary Record. 1405th Meeting, UN Doc., CCPR/C/SR 1405, para. 20. |
45 | Foreign Intelligence Surveillance Act, 1978. Sec. 1881a(a) (United States). |
46 | Australian Intelligence Services Act, 2001, Sec. 9 (Australia). |
47 | Regulation of Investigatory Powers Act, 2000, Sec. 8(4) and Investigatory Powers Act, 2016 (United Kingdom). |
48 | Jaloud v. the Netherlands (App No. 47708/08) (2014). |
49 | “[I]n cases of surveillance the possible violation of privacy is entirely consummated by the act of surveillance itself, whether it takes place in an area under the state’s sovereignty, control, or beyond its control. My own preferred solution to such cases is hence the third model of jurisdiction that distinguishes between positive and negative obligations.” (Milanovic 2014). |
50 | Parliamentary Assembly of the Council of Europe. 2015. Mass Surveillance. Doc. 13734, para. 30–33. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alexander, A.; Krishna, T. Pegasus Project: Re-Questioning the Legality of the Cyber-Surveillance Mechanism. Laws 2022, 11, 85. https://doi.org/10.3390/laws11060085
Alexander A, Krishna T. Pegasus Project: Re-Questioning the Legality of the Cyber-Surveillance Mechanism. Laws. 2022; 11(6):85. https://doi.org/10.3390/laws11060085
Chicago/Turabian StyleAlexander, Atul, and Tushar Krishna. 2022. "Pegasus Project: Re-Questioning the Legality of the Cyber-Surveillance Mechanism" Laws 11, no. 6: 85. https://doi.org/10.3390/laws11060085
APA StyleAlexander, A., & Krishna, T. (2022). Pegasus Project: Re-Questioning the Legality of the Cyber-Surveillance Mechanism. Laws, 11(6), 85. https://doi.org/10.3390/laws11060085