Tables of Cases . . xvii Tables of Legislation . . xxi Abbreviations . . xxv Special Features . . xxvii Introduction . . xxix 1. Covert Investigation in Context . . 1 2. Directed Surveillance . . 29 3. Intrusive Surveillance . . 49 4. Interference with Property or Wireless Telegraphy and Entry onto Land . . 69 5. Covert Investigation and Computers . . 85 6. Examining Mobile Phones . . 99 7. Communications Data . . 107 8. Interception of Communications . . 119 9. Covert Human Intelligence Sources . . 137 10. Covert Investigation Abroad . . 163 11. Risk Management . . 179 12. Managing Covert Investigation . . 195 APPENDICES . . 215 Index . . 369