Cell confession evidence – evidence from inmates alleging that the accused has confessed to the crime – is a discrete but controversial covert policing resource. This type of evidence can be volunteered to investigators by the source, though rarely is it done so unconditionally. In other cases, it is a result of the deliberate use and conduct of a covert human intelligence source, authorized under the Regulation of Investigatory Powers Act 2000.
The post The perils of cell confession evidence: principles and pitfalls appeared first on OUPblog.
By Simon McKay
In 1928 the iconic United States Supreme Court Justices Holmes and Brandeis dissented in a judgment that ruled the product of telephone conversations derived from “wiretapping” admissible. With characteristic eloquence, Mr Justice Brandeis held that “the confined criminal is as much entitled to redress as his most virtuous fellow citizen; no record of crime, however long, makes one an outlaw”. The judges could be forgiven for thinking that, at least in terms of the English law, eighty years on, things haven’t changed much.
There is a connection between the phone hacking row, which appears to be the preserve of celebrities who fear their calls may have been listened into and the changes to control orders, inelegantly re-named Terrorism Prevention and Investigatory Measures. On the one hand, there is a gaggle of media lawyers and their clients complaining that the Metropolitan Police has failed to take action against individuals eavesdropping on the most private of conversations and on the other the same material is secretly relied upon by the State to confine individuals, who have not been convicted of any offence, to effective house arrest and to impose other Orwellian sanctions. The apparent juxtaposition becomes manifest; the police and agencies rely on the material to counter terrorism, yet appear impotent in terms of investigating allegations of what is given the seemingly neutral term of phone hacking.
There needs to be some attempt to de-mystify what is meant by phone hacking, sometimes referred to as phone tapping. It is clear that practically what is meant is eavesdropping on voicemail messages.
Previously the police have asserted they could not rely on the evidence provided on the ground that it is not admissible. This is a reference to a legal provision in the Regulation of Investigatory Powers Act 2000 that prohibits the use of intercept product in court proceedings. However, it has been misunderstood. The prohibition largely relates to product of intercept warrants that the State obtains to protect national security and investigate other threats as well as serious crime – this is why terror suspects aren’t prosecuted in the criminal courts – the intelligence implicating them cannot be used for this purpose. It expressly does not apply where an illegal interception has occurred.
But is a third party listening to a voicemail an interception? The simple answer is that it might be, particularly if it has not been listened to (if it is, it is a criminal offence) but if it is not, it is almost certainly an offence under the Computer Misuse Act 1990. Where such offences may have been committed there is no question that the incident and evidence of interception or hacking is admissible and capable of being used by the police. Even if there was an argument to the contrary, the consent of the “victim” alleviates any remaining difficulty concerning the issue (if an individual consents to their calls being intercepted the prohibition on admissibility no longer applies).
To fair to the police, the highest courts in the land have found the question of what may amount to an interception “particularly puzzling” and the legislation “difficult to understand”. It is almost impenetrable but that is not really any excuse.
Add to this the fact that the law in this area is under review (again). A cynic could muse what all the fuss is about; surely the simplest thing would be to make the product of intercept admissible, even i