top of page
  • Writer's pictureThe DigitalBank Vault

#Encrochat: Unlawful interception

3(1) Investigatory Powers Act 2016 establishes a criminal offence of unlawful interception.

(1) A person commits an offence if—

(a) the person intentionally intercepts a communication in the course of its transmission by means of—

(i) a public telecommunication system,

(ii) a private telecommunication system, or

(iii) a public postal service,

(b) the interception is carried out in the United Kingdom, and

(c) the person does not have lawful authority to carry out the interception.

Given the primacy of the French authorities in this activity, there is a question as to whether s3(1)(b) — that any interception was "carried out in the United Kingdom" — was met. However, the Court felt it did not need to address it in detail, given the conclusion it reached on what it termed its "key question". If the Court had ruled differently, and found that the conduct in question could not be done lawfully under a targeted equipment interference warrant, this point would likely have more prominence.

Not all acts of interception amount to the offence of "unlawful interception". Leaving aside the issue that the interception must be "intentional" (not an issue discussed in the case), interception falls outside the scope of the offence if the person carrying it out has "lawful authority".

s6 defines what is "lawful authority". and the two key elements of the s6(1) definition are these:

a person has lawful authority to carry out an interception if, and only if—

(I have removed the bits about "other forms of lawful interception", and the bits about bulk powers or court orders or other statutory powers, since they are not relevant here.)

The outcome is that, if conduct is "interception", a person does it with lawful authority, and does not commit an offence of unlawful interception, if they have a TI warrant or, if the communication is a "stored communication", they have a TEI warrant.

Under s99 Investigatory Powers Act 2016, a TEI warrant authorises the interference with equipment for the purpose of obtaining communications, equipment data, and other information. "interference" is not a defined term.

A TEI warrant does not authorise in relation to a communication other than a stored communication conduct which would (unless done with lawful authority) constitute the offence of unlawful interception (s99(6)).



Offline “ Air Gapped” Super Encryption Mobile Machines.

Ultra Encrypted Text Messaging with No Cellular or Internet Connection. No Servers.

Encryption Keys generated offline by the user , never exchanged with third parties and erased permanently after each session.

More Secure than a Face To Face Meeting.

More details?

Consult with our

Cyber Defense Experts at :


Offline “ Air Gapped” Super Encryption Mobile Machines.


Offline “ Air Gapped” Super Encryption Mobile Machines.

Full technical details:

Cyber War Grade, Mathematically UnCrackable, Quantum Safe, Air Gapped (Offline) Encryption Machines More details ? Click here: .

“ If you need to communicate top classified information or you need to store secret data and be absolutely sure that no state-sponsored hackers, no foreign Governments , no intelligence agencies will be ever able to decipher the files, you need an Above Military Level Offline SuperEncryption System” 

Cyber War Ultra Encrypted Communications.

This is an encrypted text message, that has been encrypted with an OTP cipher (quantum safe encryption- mathematically unbreakable) , on a DBV “ Air Gapped “ Offline SuperEncryption Machine. The Encrypted message is then exported from the offline device by visual means( no connections , not even physical) by scanning the QR code with an online device for then sending it safely online.

The QR code at is arrival, is scanned by the second DBV offline encryption machine , directly from the receiving online device. Afterwards , it’s deciphered safely offline. This form of super encrypted offline communications is safer than a face to face meeting .

More details? Consult with our cyber defense advisors at or visit

9 views0 comments


bottom of page