This page is lawful political and civic-education commentary. Statutory quotations are taken from the publicly published Equipment Interference Code of Practice issued under the Investigatory Powers Act 2016. Polling figures are from public reporting. The page does not incite, glorify, instruct or recruit for any criminal offence, including violence, harassment, sedition or any unlawful act against any person or institution. Criticism of named public officials — including Scottish Ministers and the First Minister — is expressed on matters of public interest and is protected speech under Article 10 ECHR and the common-law right of fair comment.
1. The Statutory Architecture — Who Authorises State Hacking
"Equipment interference" is the polite UK term for state hacking: kernel-level access to a computer or phone, keylogger installation, data exfiltration, remote command. The Investigatory Powers Act 2016 (IPA 2016) put it on a statutory footing for the first time, and the accompanying Equipment Interference Code of Practice spells out who can sign off on it.
For warrants relating to operations whose authorisation falls within devolved Scottish competence, Scottish Ministers themselves sign the paperwork that licences MI5, SIS or GCHQ to break into a UK citizen's device. The signature is not symbolic. It is the operative legal act that converts what would otherwise be a Computer Misuse Act offence into "authorised activity."
2. What The State Is Authorising — Examples From The Code Itself
The Code doesn't talk in abstractions. It gives worked examples of the conduct being licensed. Two of them, quoted directly:
If a private citizen did any of the above — covertly downloaded another person's smartphone data, installed a keylogger to capture login credentials, or exploited a software vulnerability to gain control of someone else's device — they would be charged under the Computer Misuse Act 1990 (s.1, s.2, s.3, s.3ZA) with offences carrying up to life imprisonment in the most serious cases.
3. The "No Offence" Clause — Legalised Crime
The same act — installing a keylogger, exfiltrating a phone's data, exploiting a vulnerability — is a criminal offence with a prison sentence attached when an ordinary person does it, and no offence at all when a state operator does it with a piece of paper signed by a minister. The statute reaches the result by the simple expedient of stating that the Computer Misuse Act does not apply. The conduct is identical; only the signature is different.
4. The Human Rights Layer — Words On Paper
The Code makes the appropriate gestures toward the Human Rights Act 1998 and the ECHR:
- Article 8 — private and family life, home and correspondence. The whole point of equipment interference is to read what is in a person's correspondence, see what is in their home through their camera, and follow their family life through their device. The right is "qualified," which in practice means "balanced against national security in a courtroom the subject is never told about."
- Article 1 of the First Protocol — peaceful enjoyment of possessions. The Code itself concedes the device subject to interference is a possession. Installing malware on it is not peaceful enjoyment by any plain reading.
- Article 10 — freedom of expression. Capturing what a person writes, types, says or shares is precisely the chilling effect Article 10 was drafted to prevent.
- Article 3 — absolute prohibition on inhuman or degrading treatment. Equipment interference combined with the other techniques described on this site (psychological pressure, family targeting, swatting) can cross into Article 3 territory. Article 3 admits no qualification. The Code does not engage with that.
5. Scottish Ministers, Prestwick, and the Politics of the Signature
The signature on an equipment-interference warrant is not abstract bureaucracy. It is signed by a named, accountable, elected (or appointed) minister. In Scotland's case, by Scottish Ministers. The same political class is currently making other signed decisions affecting Scottish sovereignty — including the use of Prestwick Airport, which is owned by the Scottish Government, as a transit hub for US military flights linked to operations in the Middle East.
Prestwick is owned by the Scottish Government. First Minister John Swinney has reportedly sought UK-level talks on the matter and faced pressure from anti-war groups to restrict access. The polling is unambiguous: the Scottish public, by a substantial majority, does not want their state-owned airport used as a refuelling station for foreign military operations they did not vote for.
The Scottish Ministers signing equipment-interference warrants are, in many cases, the same political class deciding whether to challenge the use of a Scottish-Government-owned airport for foreign military operations the Scottish public has clearly told them it does not support. On both files the pattern looks the same to me: spineless, deferential to Westminster and Washington, and shameless about the gap between the polling and the policy.
If, as has been alleged in public reporting, US military flights from Prestwick have contributed to operations producing civilian casualties — including civilian children — then the moral weight of every Prestwick refuelling decision falls partly on Scotland's elected leaders. The majority of Scots do not want these wars. That majority is on the public record. The ministers signing the paperwork are also on the public record.
This is a personal opinion offered as protected political speech. It is not a call to any unlawful action. It is a call for ministers who hold a public mandate to behave in accordance with the mandate they were given.
6. Why It Matters — The Signature Joins Up Two Stories
Cynics will say "the warrants and the airport are different files, signed by different people, in different teams." Strictly true. But the political culture that produces both is one culture — a culture in which a minister's signature on a document affecting somebody else's rights is treated as a routine clerical act, and the substantive accountability for what flows from that signature is deferred indefinitely to inquiries, tribunals, and inspector-general reports that arrive years after the harm has been done. See Complaints & Suggestions.
7. What "Equipment Interference" Looks Like In Practice — On Me
I describe in detail elsewhere on this site (My Experience, Spyware Capabilities, Digital Wiretap) the operational pattern I have lived through:
Direct device access
Consistent with EI Code Example 1 — covert downloads from a smartphone, including periods when the device was unattended.
Keystroke capture
Consistent with EI Code Example 2 — behaviour suggestive of keylogger-style capture across login flows.
Exploited vulnerabilities
Consistent with the Code's "more complex" tier — remote control of devices via existing software vulnerabilities. See also Pegasus / BLASTPASS in Spyware Capabilities.
Network & account access
Patterns consistent with use of stolen credentials and account-level access — email rerouting, session anomalies, platform-level interference.
Lateral spread
Anomalies on devices belonging to close family members consistent with deliberate lateral access through contact relationships.
Persistence beneath protections
Continuation of anomalies even with iOS Lockdown Mode enabled — suggestive of either pre-existing persistence or higher-tier exploitation.
8. The Bottom Line
A country that lets its ministers sign keylogger-installation warrants in the morning, refuels foreign bombers at a state-owned airport in the afternoon, and tells the citizens whose devices were keylogged and whose airport was used that none of this can be discussed in open court — has not abolished the rule of law. It has simply moved most of it indoors, behind a single signature, with no door the public is allowed through.
Primary Sources & Further Reading
- Investigatory Powers Act 2016 — Part 5 (Equipment Interference)
- Equipment Interference Code of Practice (Home Office, statutory code under IPA 2016)
- Computer Misuse Act 1990 — s.1, s.2, s.3, s.3ZA
- Human Rights Act 1998 — incorporating ECHR Articles 3, 8, 10 and Protocol 1 Article 1
- Investigatory Powers Tribunal — published judgments
- Big Brother Watch v United Kingdom, Grand Chamber, ECtHR (2021)
- Public polling on Prestwick / US military flights and Middle East policy
- Reporting on First Minister John Swinney's engagement with UK government on Prestwick
- Citizen Lab and Amnesty Tech publications on Pegasus and similar mercenary spyware
- European Parliament PEGA Committee — report and recommendations on commercial spyware