All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "1340566",
"signature": "Article:1340566",
"url": "https://staging.dailymaverick.co.za/article/2022-07-28-the-awful-state-of-lawful-interception-in-sa-part-two-surveillance-technology-thats-above-the-law/",
"shorturl": "https://staging.dailymaverick.co.za/article/1340566",
"slug": "the-awful-state-of-lawful-interception-in-sa-part-two-surveillance-technology-thats-above-the-law",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Shower head video cameras: How Rica fails to regulate state surveillance of citizens",
"firstPublished": "2022-07-28 22:44:46",
"lastUpdate": "2022-07-29 12:01:51",
"categories": [
{
"id": "9",
"name": "Business Maverick",
"signature": "Category:9",
"slug": "business-maverick",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/business-maverick/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "38",
"name": "World",
"signature": "Category:38",
"slug": "world",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/world/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 18072,
"contents": "<span style=\"font-weight: 400;\">In 2021, the Constitutional Court ordered major changes to Rica (the Regulation of Interception of Communications and Provision of Communication-related Information Act of 2002). These include better privacy protections for journalists and lawyers, compelling the state to inform you, after the fact, if you have been surveilled. This comes after a </span><a href=\"https://amabhungane.org/stories/210204-advocacy-release-amab-wins-battle-against-spying-abuse-as-concourt-declares-bulk-surveillance-unlawful-rica-surveillance-provisions-unconstitutional/\"><span style=\"font-weight: 400;\">lengthy court battle</span></a><span style=\"font-weight: 400;\"> and years of media reports about illegal state surveillance. </span>\r\n\r\n<i><span style=\"font-weight: 400;\">Read more in </span></i><span style=\"font-weight: 400;\">Daily Maverick</span><i><span style=\"font-weight: 400;\">: “</span></i><a href=\"https://www.dailymaverick.co.za/article/2022-07-12-the-awful-state-of-sas-lawful-telecoms-interception-part-one/\"><i><span style=\"font-weight: 400;\">The awful state of SA’s lawful telecoms interception, Part One</span></i></a><i><span style=\"font-weight: 400;\">”</span></i><span style=\"font-weight: 400;\"> </span>\r\n\r\n<span style=\"font-weight: 400;\">At first glance, one might assume Rica’s faults result from its origin in the palaeolithic era of telecoms; 20 years after it was penned, we’ve moved on from SMSes and 2G calls to smartphones doubling as personal computers. But the truth is that the technologies to circumvent Rica and intercept without the operator’s knowledge were available long before the act’s inception. These include computer hacking, satellite signals interception and equipment that can connect directly to mobile devices to siphon off communications. And although Rica makes it clear that any form of state interception is illegal without a court order, it doesn’t provide much detail about how state use of these highly secretive, cloak-and-dagger technologies is to be overseen. </span>\r\n\r\n<span style=\"font-weight: 400;\">This state of affairs is no accident. </span>\r\n\r\n<span style=\"font-weight: 400;\">After apartheid, South Africa’s new ANC-led government </span><a href=\"https://www.parliament.gov.za/storage/app/media/Docs/hansard/88235_1.doc\"><span style=\"font-weight: 400;\">was keen to establish</span></a><span style=\"font-weight: 400;\"> the state’s capability to monitor the communication networks of private mobile and internet service providers. The keyword here: </span><i><span style=\"font-weight: 400;\">private</span></i><span style=\"font-weight: 400;\">. Rica’s predecessor, the Interception and Monitoring Prohibition Act of 1992, didn’t take into account the likes of Vodacom or MTN. During apartheid, the state-owned post office (later to spawn a privatised Telkom) controlled all landlines, then most South Africans’ only telecommunications option. If the apartheid state wanted to monitor phone calls, it only needed to place the right equipment on its own telephone network. Modernity destroyed this convenience. </span>\r\n\r\n<span style=\"font-weight: 400;\">Rica addressed this dilemma by prescribing the terms of lawful interception, a legally regulated partnership between state law enforcement and the mobile operator. This arrangement was common in democracies at the time, and still is. </span>\r\n<h4><b>Checks and balances</b></h4>\r\n<span style=\"font-weight: 400;\">Lawful interception is a very specific method of communications surveillance. It requires a so-called handover interface. This is a piece of equipment that’s locked away in a highly secure enclosure on the premises of a mobile operator. Usually, only a handful (fewer than five) of government-vetted staff members have physical access. </span>\r\n\r\n<span style=\"font-weight: 400;\">This interface can create a digital copy of a suspect’s cellular communications and send it to a special law enforcement surveillance facility: the Office for Interception Centres (OIC) in Sandton, Johannesburg. The OIC is specifically named in Rica, and the act clearly prescribes the processes of lawful interception tied to it. Only in life-and-death emergencies and cases of serious criminal offences (such as high treason, murder and drug smuggling) can intelligence services and police intercept. They will need an interception direction (a special court order) from a special Rica judge which they must then serve on a mobile operator, thus legally obliging cooperation. The Rica judge must be satisfied that the interception is being used as a last resort, when other methods of intelligence gathering are unfeasible or too dangerous. </span>\r\n\r\n<span style=\"font-weight: 400;\">The mobile operator, to an extent, figures into the checks and balances to prohibit misuse of interception by state officials. For instance, in life-and-death emergencies, police may orally request a mobile operator to track a phone even if there is no interception direction from the Rica judge. Afterwards, both law enforcement and the operator have to provide separate documentation relating to the case to the judge to ensure Rica compliance. The new version of Rica will require the state to inform a surveillance subject that their communications were intercepted, as long as that doesn’t jeopardise the case. With the lawful interception process, the operator will also have a record of the interception request, and it may even be possible to rope in the assistance of operators in notifying people that the state was intercepting their data. </span>\r\n\r\n<span style=\"font-weight: 400;\">But the operator isn’t always a part of the interception process. It’s possible to tap into the communications network covertly, without their knowledge. Yet Rica is vague about state use of these secretive technologies. </span>\r\n<h4><b>To pinpoint defects</b></h4>\r\n<span style=\"font-weight: 400;\">A few government entities were responsible for the half-baked version of Rica that was so </span><a href=\"http://www.saflii.org/cgi-bin/disp.pl?file=za/cases/ZACC/2021/3.html&query=amabhungane\"><span style=\"font-weight: 400;\">heavily criticised</span></a><span style=\"font-weight: 400;\"> by then Chief Justice Mogoeng Mogoeng in his Constitutional Court judgment on the act. In the late 1990s, the Department of Justice and Constitutional Development was primarily responsible for drafting the new legislation. But other players, including the securocrats, got a chance to weigh in first. </span>\r\n\r\n<span style=\"font-weight: 400;\">To draft the new law, the Justice Department received guidance from the South African Law Reform Commission (SALRC). Established by the South African Law Reform Commission Act 19 of 1973, the SALRC is part of the department and its sole purpose is to research and pinpoint defects in existing laws – and make recommendations to fix them. It did just that with the Interception and Monitoring Prohibition Act of 1992.</span>\r\n\r\n<iframe id=\"doc_1712\" class=\"scribd_iframe_embed\" title=\"SALRC Brochure\" src=\"https://www.scribd.com/embeds/584519449/content?start_page=1&view_mode=scroll&access_key=key-z4jJevP2QavXpaane6NJ\" width=\"100%\" height=\"600\" frameborder=\"0\" scrolling=\"no\" data-auto-height=\"false\" data-aspect-ratio=\"1.4160125588697017\"></iframe>\r\n\r\n<span style=\"font-weight: 400;\">The SALRC looked at interception legislation in several other democracies, and consulted broadly and at length with many South African government departments, academia, the banking sector, the legal fraternity, mobile operators like Vodacom and MTN, landline provider Telkom, internet service provider Mweb Connect and satellite comms company Globalstar Southern Africa. It also spoke to various police departments, the Intelligence Ministry and the National Intelligence Agency (today the domestic branch of the State Security Agency). Late in 1999, a year after its investigation was initiated, the SALRC published its final report, which mentions a number of technologies nation states use to intercept without the service provider’s knowledge. </span>\r\n\r\n<iframe id=\"doc_35956\" class=\"scribd_iframe_embed\" title=\"r_prj105_1999oct\" src=\"https://www.scribd.com/embeds/584519905/content?start_page=1&view_mode=scroll&access_key=key-UFdhLSbR0i8Cev07Amk0\" width=\"100%\" height=\"600\" frameborder=\"0\" scrolling=\"no\" data-auto-height=\"false\" data-aspect-ratio=\"0.7074509803921568\"></iframe>\r\n\r\n<span style=\"font-weight: 400;\">One such technology that didn’t make it into Rica is mass interception. The government’s National Communications Centre (NCC) is a cluster of satellite dishes outside Pretoria run by the State Security Agency (SSA). The NCC performs what is known as bulk communications monitoring – essentially “listening” to masses of satellite communications traversing the country’s borders to identify suspicious conversations. It’s meant to aid the police, intelligence services and the Financial Intelligence Centre. </span>\r\n\r\n<span style=\"font-weight: 400;\">The mobile provider isn’t involved with the NCC; whereas lawful interception described in Rica is part of a criminal investigation, where evidence must be collected before a Rica judge approves interception of a specific suspect’s communications, mass interception works the other way around: you can find new suspects and then target them – all without a warrant or the service provider’s knowledge. In fact, vendors of interception equipment clearly distinguish between the two very different products – lawful interception and bulk monitoring – on this basis. </span>\r\n\r\n<span style=\"font-weight: 400;\">Along with the other changes ordered to Rica, the ConCourt ruled that the NCC’s activities are illegal, since the act doesn’t explicitly provide for it. The SSA said the NCC subsequently closed down. (When we asked the SSA if the facility was indeed closed, spokesperson Mava Scott confirmed this, saying that the parliamentary watchdog, the Joint Standing Committee on Intelligence, “has on more than one occasion visited the NCC as part of its oversight functions, among others to get an assurance that the Constitutional Court judgment is being implemented”. </span>\r\n\r\n<span style=\"font-weight: 400;\">The committee did not respond to a request for comment. </span>\r\n<h4><b>CIA, 1954</b></h4>\r\n<span style=\"font-weight: 400;\">The order to close down the NCC wasn’t entirely out of the blue. A 2008 </span><a href=\"https://www.r2k.org.za/wp-content/uploads/Matthews-Commission-Report-10-Sept-2008.doc\"><span style=\"font-weight: 400;\">ministerial review of state intelligence services</span></a><span style=\"font-weight: 400;\"> found that the facility “fails to comply” with Rica. Then minister of intelligence and the man who called for the review, Ronnie Kasrils, tried to introduce </span><a href=\"https://legal.sabinet.co.za/articles/two-intelligence-bills-set-up-new-communications-centre/\"><span style=\"font-weight: 400;\">legislation reining in the NCC</span></a><span style=\"font-weight: 400;\">, but retired before changes materialised. Then, with Jacob Zuma becoming president in May 2009, both the 2008 review findings and the regulation of the NCC dropped off the radar. See also the Joint Standing Committee’s 2008 annual report </span><a href=\"https://pmg.org.za/tabled-committee-report/54/\"><span style=\"font-weight: 400;\">here</span></a><span style=\"font-weight: 400;\">. </span>\r\n\r\n<span style=\"font-weight: 400;\">Yet the concept of mass interception – monitoring </span><i><span style=\"font-weight: 400;\">all</span></i><span style=\"font-weight: 400;\"> communications entering or exiting a country – far predates the Nineties. In 1954, the US Central Intelligence Agency dug an underground highway from the small West Berlin village of Rudow across the border to the Soviet zone. The aim: to reach and secretly tap into a terminus of telephone cables that could simultaneously carry 432 calls from East German officials. American war reporter Andrew Tully recounted this in </span><i><span style=\"font-weight: 400;\">CIA: The Inside Story</span></i><span style=\"font-weight: 400;\">, his bestselling book about the infamous intelligence gatherers’ bizarre endeavours, first published in 1961. </span>\r\n\r\n<span style=\"font-weight: 400;\">The Law Reform Commission’s report also shows that legislators were clearly aware of mass interception efforts like the US’s Echelon. None of this was top secret. Echelon was first reported on in detail by investigative reporter </span><a href=\"https://www.icij.org/journalists/nicky-hager/\"><span style=\"font-weight: 400;\">Nicky Hager</span></a><span style=\"font-weight: 400;\"> in his 1996 book </span><i><span style=\"font-weight: 400;\">Secret Power. </span></i><span style=\"font-weight: 400;\">The book shocked the European Union into action; the European Parliament started a major investigation into Echelon, with their report in January 1998 describing the system as a global satellite interception network “indiscriminately intercepting very large quantities of communications and then siphoning out what is valuable using artificial intelligence aids like Memex”. These communications included “most of the world’s satellite phone calls, internet, email, faxes and telexes”. Benefiting from the results was the so-called Five Eyes intelligence alliance – the US, Britain, Canada, New Zealand and Australia.</span>\r\n\r\n<iframe id=\"doc_2734\" class=\"scribd_iframe_embed\" title=\"Steve Wright Stoa Rep\" src=\"https://www.scribd.com/embeds/584523181/content?start_page=1&view_mode=scroll&access_key=key-3iy0SQQpoLzv3YJIFc9i\" width=\"100%\" height=\"600\" frameborder=\"0\" scrolling=\"no\" data-auto-height=\"false\" data-aspect-ratio=\"1.2074966532797857\"></iframe>\r\n\r\n<span style=\"font-weight: 400;\">Closer to home, the 1996 Pikoli commission made recommendations for what intelligence services should be doing in the new democratic South Africa. </span><a href=\"https://www.r2k.org.za/wp-content/uploads/Matthews-Commission-Report-10-Sept-2008.doc\"><span style=\"font-weight: 400;\">One of those recommendations</span></a><span style=\"font-weight: 400;\"> was to establish the NCC. It is not clear whether the commission’s suggestion was inspired by Hager’s revelations of Echelon, but </span><a href=\"https://pmg.org.za/tabled-committee-report/54/\"><span style=\"font-weight: 400;\">in 2000 Cabinet approved the NCC’s mandate</span></a><span style=\"font-weight: 400;\">, and by 2002 it was up and running. Still, the SALRC made no clear recommendations about the lawful use of mass interception.</span>\r\n\r\n<iframe id=\"doc_65452\" class=\"scribd_iframe_embed\" title=\"High Level Review Panel State Security Agency\" src=\"https://www.scribd.com/embeds/584523490/content?start_page=1&view_mode=scroll&access_key=key-iFLqyaI06qHVCIFll8Cg\" width=\"100%\" height=\"600\" frameborder=\"0\" scrolling=\"no\" data-auto-height=\"false\" data-aspect-ratio=\"0.7068965517241379\"></iframe>\r\n<h4><b>A shower head</b></h4>\r\n<span style=\"font-weight: 400;\">By October 1999, the month that the SALRC released its final recommendations for Rica, a second report from the European Parliament was clear: interception technology was rapidly advancing to include all new electronic communication methods. It spelt out details of satellite signal interception, submarine cable interception, space interception of inter-city networks, internet interception...” The list goes on. By comparison, the list of equipment the SALRC saw as worrisome was reminiscent of a James Bond film: miniature tape recorders concealed inside cigarette packets; sub-miniature transmitters smaller than sugar cubes; a video camera in the form of a shower head.</span>\r\n\r\n<iframe id=\"doc_69570\" class=\"scribd_iframe_embed\" title=\"Development.of.Surveillance.vol.2 5\" src=\"https://www.scribd.com/embeds/584523826/content?start_page=1&view_mode=scroll&access_key=key-xg4AewNWto9KGwpcwWw2\" width=\"100%\" height=\"600\" frameborder=\"0\" scrolling=\"no\" data-auto-height=\"false\" data-aspect-ratio=\"0.7080062794348508\"></iframe>\r\n\r\n<span style=\"font-weight: 400;\">But, over the years, South Africa’s intelligence services have used interception technologies far surpassing modified everyday objects. </span>\r\n\r\n<span style=\"font-weight: 400;\">Take, for example, the grabber, which allows the state to intercept without a service provider’s assistance or knowledge. It’s a portable device (picture a Pelican case with an oversized 1990s laptop) and can be housed in a van or the back of a bakkie. It acts like a cellphone tower, and “fools” a cellphone into connecting to it. One basic function of a grabber is to identify phones within a certain area – like those of protesters marching through a city centre. More sophisticated grabbers can track a phone’s location, and intercept calls, texts, chats, emails and internet activity. </span>\r\n\r\n<span style=\"font-weight: 400;\">Although the use of grabbers, just like the NCC, can be strictly monitored within the law enforcement environment, oversight ultimately depends only on honest state actors.</span>\r\n\r\n<span style=\"font-weight: 400;\">Grabbers have been around for almost three decades. </span><a href=\"https://slate.com/technology/2013/02/stingray-imsi-catcher-fbi-files-unlock-history-behind-cellphone-tracking-tool.html\"><span style=\"font-weight: 400;\">Documents released</span></a><span style=\"font-weight: 400;\"> by the US Federal Bureau of Investigation show that the bureau was already using grabbers in 1995 – perhaps earlier. Rohde & Schwarz unveiled their first grabber in 1996. </span>\r\n\r\n<iframe id=\"doc_3127\" class=\"scribd_iframe_embed\" title=\"EAS499Honors-IMSICatchersandMobileSecurity-V18F\" src=\"https://www.scribd.com/embeds/584524453/content?start_page=1&view_mode=scroll&access_key=key-7Kt6ptFY2zUCFC7u99cW\" width=\"100%\" height=\"600\" frameborder=\"0\" scrolling=\"no\" data-auto-height=\"false\" data-aspect-ratio=\"0.7729220222793488\"></iframe>\r\n\r\n<span style=\"font-weight: 400;\">However, the SALRC didn’t make specific recommendations for state use of devices such as grabbers. It was, however, concerned with the private security sector performing illegal interceptions, and looked into regulating the “manufacture, distribution, possession and advertising of wire or oral communication intercepting devices”. </span>\r\n\r\n<span style=\"font-weight: 400;\">But ultimately, the SALRC took its cue from the Intelligence Ministry, which advised that separate legislation should deal with such equipment, arguing that “the matter has policy implications, which require further discussion with the Security Ministers and the Joint Standing Committee on Intelligence”. </span>\r\n\r\n<span style=\"font-weight: 400;\">Once again, this separate legislation never saw the light of day. </span>\r\n<h4><b>‘Moonlighting without permission’</b></h4>\r\n<span style=\"font-weight: 400;\">Back in 2015, the JSCI </span><a href=\"https://www.polity.org.za/article/sa-jscii-notes-suspension-of-mr-paul-scheepers-2015-11-20\"><span style=\"font-weight: 400;\">considered tightening up Rica’s regulations</span></a><span style=\"font-weight: 400;\"> to address the grabber issue. This happened only after police crime intelligence officer Paul Scheepers had been suspended for allegedly “moonlighting without permission” (as the JSCI effectively put it) with a state-owned grabber. As with the 2008 attempt to legislate the NCC, nothing came of it. Scheepers is yet to be prosecuted. </span>\r\n\r\n<span style=\"font-weight: 400;\">The JSCI did not respond when we reached out for comment. The SSA’s Scott said, however, that the “matter is currently receiving attention at the level of the JSCI and with the joint participation of all the law enforcement agencies and intelligence structures”. </span>\r\n\r\n<span style=\"font-weight: 400;\">Up next: </span><a href=\"https://www.sciencedirect.com/topics/computer-science/malware\"><span style=\"font-weight: 400;\">Spyware</span></a><span style=\"font-weight: 400;\"> – software designed to surreptitiously infiltrate your computer or smartphone. It gives the spies access to your information, communications and much more. In 2021, it </span><a href=\"https://www.dailymaverick.co.za/article/2021-08-04-pegasus-and-the-nso-group-the-dark-world-of-cyber-mercenaries/\"><span style=\"font-weight: 400;\">emerged that Pegasus</span></a><span style=\"font-weight: 400;\">, spyware from Israel’s NSO Group, may have been used to target President Cyril Ramaphosa’s phone. The European Parliament launched an inquiry into the software’s use in the EU earlier in 2022, and in June, </span><a href=\"https://www.theregister.com/2022/06/24/nso_customers_eu_pegasus/\"><span style=\"font-weight: 400;\">NSO Group told an EU parliamentary committee</span></a><span style=\"font-weight: 400;\"> that at least five EU nations had used Pegasus. The spyware is supposedly only sold to government agencies. </span>\r\n\r\n<span style=\"font-weight: 400;\">Closer to home, in 2016, Canadian research entity Citizen Lab discovered a master server of the powerful spyware product, FinFisher, in South Africa. We also know, thanks to Wikileaks that the </span><a href=\"https://www.dailymaverick.co.za/article/2017-02-21-cyberspying-the-ghost-in-your-machine/\"><span style=\"font-weight: 400;\">South African government has bought FinFisher</span></a><span style=\"font-weight: 400;\"> licences in the past. </span>\r\n\r\n<span style=\"font-weight: 400;\">Cyberspying is old. In the 1980s, Russia’s KGB </span><a href=\"https://www.latimes.com/archives/la-xpm-1990-02-16-mn-667-story.html\"><span style=\"font-weight: 400;\">roped in Markus Hess</span></a><span style=\"font-weight: 400;\">, a German hacker, to break into computers at US universities and military facilities. The </span><a href=\"https://eugene.kaspersky.com/2014/06/15/10-years-since-the-first-smartphone-malware-to-the-minute/\"><span style=\"font-weight: 400;\">first smartphone virus</span></a><span style=\"font-weight: 400;\"> surfaced in 2004, well predating Rica’s promulgation in 2009. </span>\r\n\r\n<span style=\"font-weight: 400;\">During the consultative processes, the South African Banking Council told the SALRC that hacking should be included in interception legislation, advising that the hacking of computer networks often “involves illegal interception of legal transmissions over telecommunications networks, and in almost all cases telecommunication networks are used to perpetrate the crime”. However, after considering input from private IT consultants, the SALRC recommended that the issue be dealt with in separate legislation dealing with the internet and computer-related crimes. That legislation would take another two decades to fully materialise, in the form of the Cybercrimes Act of 2020. </span>\r\n\r\n<b>Hindsight</b>\r\n\r\n<span style=\"font-weight: 400;\">Despite the SALRC’s recommendations, in 2005, spyware and the grabber did make it into Rica. Sort of. Then justice and constitutional development minister Brigitte Mabandla gazetted a schedule of “listed equipment” in terms of Rica. Although neither spyware nor the grabber is explicitly named, the schedule contains broad descriptions of interception technologies that could include them.</span>\r\n\r\n<iframe id=\"doc_15855\" class=\"scribd_iframe_embed\" title=\"Gg28371 r1263 Interception-notice\" src=\"https://www.scribd.com/embeds/584528075/content?start_page=1&view_mode=scroll&access_key=key-ARmwLlAiwJpDxOuFIlt6\" width=\"100%\" height=\"600\" frameborder=\"0\" scrolling=\"no\" data-auto-height=\"false\" data-aspect-ratio=\"0.7271993543179984\"></iframe>\r\n\r\n<span style=\"font-weight: 400;\">Yet the schedule didn’t prescribe what legal state use should look like; it only makes it illegal for anyone to manufacture, assemble, possess, sell, purchase or advertise listed equipment without a certificate of exemption gazetted by the justice minister (after approval by the National Assembly). Yet, to this day, no such exemption certificates have been issued. </span>\r\n\r\n<span style=\"font-weight: 400;\">The SALRC’s recommendations, however, were just that. Its final 350-page report contained mountains of information to guide the Justice Department. When we asked the department about the shortcomings of the SALRC’s recommendations, it pointed out – correctly – that the commission had got a lot right: For one, its recommendations emphasised that the state should never be allowed to intercept without a warrant, and that no agencies other than state intelligence and law enforcement should ever be allowed to do so. (It was suggested during consultation processes that the President’s office, as well as private investigators, should have interception powers. The commission shot that down.) Notably, the SALRC also recommended that the act make special provisions to protect attorney-client privilege. That idea never made it into Rica, and it was one of the changes ordered by the ConCourt in 2021. </span>\r\n\r\n<span style=\"font-weight: 400;\">Now, the Justice Department is once again rewriting the country’s interception legislation to bring it on par with powerful modern surveillance technologies. Although the SALRC will not be assisting it this time, the department has two other major advantages that weren’t available 20 years ago: the benefit of hindsight, and Google. Let’s hope it has used them. </span><b>DM</b><span style=\"font-weight: 400;\"> </span>\r\n\r\n<span style=\"font-weight: 400;\">*</span><i><span style=\"font-weight: 400;\">We sent detailed questions to the Department of Justice and Constitutional Development. Spokesperson Steve Mahlangu said the department was in the process of finalising the bill to update Rica and did not want to comment at this stage. </span></i>\r\n\r\n<i><span style=\"font-weight: 400;\">Heidi Swart is a journalist who reports on surveillance, security and data privacy. This report was commissioned by the Media Policy and Democracy Project, an initiative of the University of Johannesburg’s Department of Journalism, Film and TV and Unisa’s Department of Communication Science.</span></i>",
"teaser": "Shower head video cameras: How Rica fails to regulate state surveillance of citizens",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "509",
"name": "Heidi Swart",
"image": "http://local.dailymaverick.co.za/wp-content/uploads/heidiswart.jpg",
"url": "https://staging.dailymaverick.co.za/author/heidiswart/",
"editorialName": "heidiswart",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "366888",
"name": "SALRC",
"url": "https://staging.dailymaverick.co.za/keyword/salrc/",
"slug": "salrc",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "SALRC",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "381624",
"name": "cyberspying",
"url": "https://staging.dailymaverick.co.za/keyword/cyberspying/",
"slug": "cyberspying",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cyberspying",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "381623",
"name": "high treason",
"url": "https://staging.dailymaverick.co.za/keyword/high-treason/",
"slug": "high-treason",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "high treason",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "381622",
"name": "Office for Interception Centres",
"url": "https://staging.dailymaverick.co.za/keyword/office-for-interception-centres/",
"slug": "office-for-interception-centres",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Office for Interception Centres",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "381621",
"name": "cellular communications",
"url": "https://staging.dailymaverick.co.za/keyword/cellular-communications/",
"slug": "cellular-communications",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cellular communications",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "381620",
"name": "satellite signals interception",
"url": "https://staging.dailymaverick.co.za/keyword/satellite-signals-interception/",
"slug": "satellite-signals-interception",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "satellite signals interception",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "381619",
"name": "computer hacking",
"url": "https://staging.dailymaverick.co.za/keyword/computer-hacking/",
"slug": "computer-hacking",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "computer hacking",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "381618",
"name": "interception technologies",
"url": "https://staging.dailymaverick.co.za/keyword/interception-technologies/",
"slug": "interception-technologies",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "interception technologies",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "367977",
"name": "South African Law Reform Commission",
"url": "https://staging.dailymaverick.co.za/keyword/south-african-law-reform-commission/",
"slug": "south-african-law-reform-commission",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "South African Law Reform Commission",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "3985",
"name": "Apartheid",
"url": "https://staging.dailymaverick.co.za/keyword/apartheid/",
"slug": "apartheid",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Apartheid",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "357992",
"name": "telecoms",
"url": "https://staging.dailymaverick.co.za/keyword/telecoms/",
"slug": "telecoms",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "telecoms",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "354292",
"name": "surveillance technology",
"url": "https://staging.dailymaverick.co.za/keyword/surveillance-technology/",
"slug": "surveillance-technology",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "surveillance technology",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "109703",
"name": "Joint Standing Committee on Intelligence",
"url": "https://staging.dailymaverick.co.za/keyword/joint-standing-committee-on-intelligence/",
"slug": "joint-standing-committee-on-intelligence",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Joint Standing Committee on Intelligence",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "80779",
"name": "Rica",
"url": "https://staging.dailymaverick.co.za/keyword/rica/",
"slug": "rica",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Rica",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "78941",
"name": "Department of Justice",
"url": "https://staging.dailymaverick.co.za/keyword/department-of-justice/",
"slug": "department-of-justice",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Department of Justice",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "51657",
"name": "Internet service providers",
"url": "https://staging.dailymaverick.co.za/keyword/internet-service-providers/",
"slug": "internet-service-providers",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Internet service providers",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "13109",
"name": "Spyware",
"url": "https://staging.dailymaverick.co.za/keyword/spyware/",
"slug": "spyware",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Spyware",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "7279",
"name": "Ronnie Kasrils",
"url": "https://staging.dailymaverick.co.za/keyword/ronnie-kasrils/",
"slug": "ronnie-kasrils",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Ronnie Kasrils",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "94470",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2022/07/iStock-1263285756.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/s7VqL8JlVrs6HOuZqBxgSaOaBUs=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/07/iStock-1263285756.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/qpBNGFSUpn4tmUg7A98OCCgC_rc=/450x0/smart/file/dailymaverick/wp-content/uploads/2022/07/iStock-1263285756.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/-gGRkK7AdQUkarsS6H7v-EwOS38=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/07/iStock-1263285756.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/dgYhGIDkVWvrjjy3XlYt67wqBvc=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/07/iStock-1263285756.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/D-yHpxhxPhRa-TVEGzNEuce9O_c=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/07/iStock-1263285756.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/s7VqL8JlVrs6HOuZqBxgSaOaBUs=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/07/iStock-1263285756.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/qpBNGFSUpn4tmUg7A98OCCgC_rc=/450x0/smart/file/dailymaverick/wp-content/uploads/2022/07/iStock-1263285756.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/-gGRkK7AdQUkarsS6H7v-EwOS38=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/07/iStock-1263285756.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/dgYhGIDkVWvrjjy3XlYt67wqBvc=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/07/iStock-1263285756.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/D-yHpxhxPhRa-TVEGzNEuce9O_c=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2022/07/iStock-1263285756.jpg",
"type": "image"
}
],
"summary": "Rica legislation was designed to compel mobile operators to help police fight crime, clearly spelling out the obligations of both sides to keep communications interception above board. Yet the state has never needed a special law nor mobile operators’ assistance to intercept; there always were powerful alternatives. Legislators always knew this, but somehow several surreptitious interception technologies fell through the regulatory cracks. Now the 20-year-old act is getting a much-needed update. But will it catch up to the surveillance technology that’s always been ahead of it?",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Shower head video cameras: How Rica fails to regulate state surveillance of citizens",
"search_description": "<span style=\"font-weight: 400;\">In 2021, the Constitutional Court ordered major changes to Rica (the Regulation of Interception of Communications and Provision of Communication-related Information Act",
"social_title": "Shower head video cameras: How Rica fails to regulate state surveillance of citizens",
"social_description": "<span style=\"font-weight: 400;\">In 2021, the Constitutional Court ordered major changes to Rica (the Regulation of Interception of Communications and Provision of Communication-related Information Act",
"social_image": ""
},
"cached": true,
"access_allowed": true
}