Introduction
The ability to assemble, dissent and protest peacefully is a key element in every society, democratic or otherwise.Footnote 1 In 2019 alone, there were more than 100 protests in numerous countries around the globe.Footnote 2 Digital technologies have to a certain degree enabled and facilitated these movements as they have been used to coordinate conversations, raise awareness, encourage participation and generate support.Footnote 3 At the same time, these same technologies and other means have been increasingly used to surveil and suppress such movements.
A peaceful assembly, including the right to protest,Footnote 4 is understood here as “a gathering of persons for a purpose such as expressing oneself, conveying a position on a particular issue or exchanging ideas”.Footnote 5 The emphasis here is put on the collective exercise of an individual right irrespective of the means used to that end, whether social media is the main platform of expression or assembling physically.Footnote 6 The #MeToo movement is an example of the use of the online space to mobilize women's activities and whole populations on a global scale.Footnote 7 While the boundaries of when an online campaign is or becomes part of an assembly will depend on the particularities of each specific case, it is better to retain an inclusive approach at a definitional level.Footnote 8 Certain forms of expression online, including online protests, will also be protected by freedom of assembly, while others may primarily enjoy other human rights protections, such as freedom of expression.Footnote 9
The close connection between surveillance and interference with internet communications and freedom of assembly has been highlighted in, inter alia, the 2020 report of the United Nations (UN) High Commissioner for Human Rights. The report focused on the “impact of new technologies on the promotion and protection of human rights in the context of assemblies, including peaceful protests”.Footnote 10 However, the accent has primarily been on how digital technologies are used to interfere with privacy and expression, which as a result negatively affects the right to assemble. There has been less analysis of direct interference with freedom of assembly itself.
It is argued here that there is further room to analyze how surveillance and other interferences with internet communications, carried out by governments, may directly infringe on people's freedom of peaceful assembly. This understanding not only enables us to preserve the distinct nature of freedom of assembly as a right that protects collective action, but also allows for better regulation of surveillance and internet communications interference in protests and other forms of assembly.Footnote 11
In the following pages, the author provides a brief overview of common protest surveillance and interference with internet communications; outlines the close relationship between the right to privacy, freedom of expression and freedom of assembly; and provides a legal analysis on why some of those measures directly infringe on freedom of assembly.
Surveillance of peaceful assembly and interference with internet communications
People take over the streets and online spaces in order to assemble for a collective cause and to show solidarity, but also to criticize or protest against their government's policies and measures. State authorities have been responding with the deployment of technology-enabled surveillance, censorship and violent oppression. This article focuses on the first two.Footnote 12 Governments have been invoking their positive obligations to protect freedom of assembly, as well as their prerogative to limit protests in the name of public order and national security, as justifications to impose general and indiscriminate surveillance and interference with internet communications.Footnote 13
General and indiscriminate surveillance of peaceful assembly
Digital technologies have significantly expanded the capabilities of authorities to surveil assemblies, including protests. Technologies are used to monitor the planning and organization of protests, to conduct surveillance during protests and even to continue surveillance after protests. This information is obtained in bulk and indiscriminately from public and private spaces,Footnote 14 irrespective of whether the persons involved are suspected of committing a crime.Footnote 15
“Safe and confidential communications play a key role in the planning and holding of peaceful protests”,Footnote 16 and yet through the availability of data and tools to process it, public authorities are increasingly collecting and analyzing the personal information of those planning or organizing protests, as well as of protesters themselves, just for the mere fact of planning or participating in an assembly. Many of these surveillance methods are invisible to protesters and can be used without the knowledge, consent or participation of those surveilled.
Each new protest has been a testament to the fact that the list of tools used to surveil protests is only becoming longer. Online, authorities may monitor social media communications and collect all information posted in relation to the protest indiscriminately.Footnote 17 This includes accessing and collecting information from both public and private digital spaces. They even infiltrate private online groups by creating false accounts to monitor conversations, and impersonate protest organizers in order to influence discussions and planning and even arrest dissenters.Footnote 18 They may further request that user data be provided by social media platforms and mobile phone applications that track movement, including information on who has carried out an internet search about a protest and on discussions between the organizers or the protesters.Footnote 19 Finally, they use hacking techniquesFootnote 20 either to infiltrate the social media accounts of organizers and protesters in order to get their contacts and private messages, or to infiltrate their devices by tricking them into, for example, downloading malicious software that gives the authorities unhindered access to contacts, messages, pictures, videos and all other personal information on their phones.Footnote 21
General and indiscriminate surveillance intensifies during protests. Fake mobile phone towers, facial recognition software and sentiment analysis softwareFootnote 22 – and more recently, the deployment of military-grade drones reportedly equipped with some of these tools – are all used in concert to ensure that if authorities so decide, not a single person remains anonymous during a protest. For instance, interference with protesters’ mobile phones is facilitated by a variety of devices impersonating mobile phone traffic towers that intercept and track all mobile phones in their vicinity. Such devices typically collect International Mobile Subscriber Identity (IMSI) and International Mobile Equipment Identity (IMEI) data that are unique to each mobile phone and SIM card – this is where they get one of their names, IMSI catchers.Footnote 23 However, they can do more than that: once connected, some devices also have the capability to block or intercept data transmitted and received by mobile phones, including the content of calls, text messages and websites visited.Footnote 24 They can potentially indiscriminately capture the mobile activity of thousands of people.
Authorities do not necessarily need to monitor mobile phones to capture everyone that was at an assembly. It is becoming a regular practice for authorities to make audio-visual recordings of assembly participants and often combine it with facial recognition technology, in real time (live facial recognition) or at a later point.Footnote 25 In the process, the authorities may indiscriminately collect images of everyone at a protest. The technology allows the comparison of the digital representation of a face captured in a digital image with other images in a database to determine whether a given passer-by was a person of interest.Footnote 26
Additionally, some authorities have also been reported to be using military-grade surveillance equipment that could have been equipped with IMSI catchers, facial recognition cameras and other tools to monitor protestors.Footnote 27 Other reported technology deployed during assemblies or protests includes automated number plate recognition software, credit card monitoring, mobile phone extraction technology used during stop and search or remotely,Footnote 28 sentiment recognition software, body-worn cameras, data from telecommunications providers, and cloud analytics. These are all used in concert to surveil protests, along with a series of aggregation tools that can combine data from all these sources into one record.
Interference with internet communications in peaceful assemblies
On top of these surveillance measures, other tactics used by authorities to interfere with assemblies (before, during and after) include filtering of content related to protests; blocking of websites or platforms used to plan, organize and mobilize protests; closing accounts that belong to organizers, activists or journalists; and shutting down of the Internet and communications networks.
Internet shutdowns describe complete shutdowns of telecommunications and mobile services and internet traffic.Footnote 29 These are measures that intend to prevent or disrupt access to or dissemination of information online.Footnote 30 Shutdowns may affect an entire country or multiple countries, specific regions, towns, or specific areas or neighbourhoods. Their duration varies from a couple of hours to months.Footnote 31 Internet shutdowns are becoming almost a common practice in times of public unrest and protests.Footnote 32 They “involve measures to intentionally prevent or disrupt access to or dissemination of information online in violation of human rights law”.Footnote 33 At least sixty-five internet shutdowns reportedly took place during protests in 2019.Footnote 34
Additionally, governments have been blocking, throttling or rendering effectively unusable entire websites, social platforms (such as Facebook and Twitter) and mobile applications (such as WhatsApp and Telegram).Footnote 35 Another more refined way of blocking and filtering information that the population receives is by blocking keywords or web pages.Footnote 36 Occasionally, authorities have been demanding that social platforms block specific users’ accounts, claiming that they contain illegal content. This is a common practice targeting key figures of peaceful assemblies and associations in the making.
Other reported reactions include the removal of content related to protests and introducing new legislation that obliges intermediaries (telecommunications companies and service providers) to comply with such requests during protests or otherwise holding them accountable for these protests.Footnote 37 All these measures indicate that governments feel entitled to block digital means of communication in an era when they are often the only means of communication available to people.Footnote 38
In addition to the above, governments are gradually introducing legal frameworks that criminalize uses of internet communications technologies, setting indirect barriers to the organization of and participation in assemblies. Increasingly, users of social media and other platforms used to organize protests have been targeted, arrested, prosecuted and even convicted exclusively for their online activities.Footnote 39 For instance, in certain States, a number of administrative and legislative measures have been taken to target non-violent involvement with protests,Footnote 40 with laws that include online acts expressly or implicitly. An example of the latter is the prohibition of the use of social media for the organization of protests in Brazil.Footnote 41 Implicitly, the inclusion of broad terms in some laws allows the authorities to target organizers for disturbing public order, incitement to disturb public order, terrorism, or threats to national security.Footnote 42 In parallel, there is also an increasing tendency to criminalize activities that could fall under the protection of freedom of assembly, such as certain forms of electronic civic disobedience.Footnote 43
The right to privacy, freedom of expression and freedom of assembly
The impact of general and indiscriminate protest surveillance and interference with internet communications that facilitate the planning and organization of protests has been increasingly considered in recent years. As the UN High Commissioner for Human Rights has concluded, “the use of [new] technologies to surveil or crack down on protesters can lead to human rights violations, including infringement of the right to peaceful assembly”.Footnote 44 This development is welcome, as often concerns regarding surveillance of assemblies and protests have been primarily identified as infringements of the right to privacyFootnote 45 or freedom of expression.Footnote 46
The European Court of Human Rights (ECtHR) has found, for instance, that the retention of data of a peace movement activist who had never been convicted of any offence, concerning a peaceful protest, had been shown to be neither generally necessary nor necessary for the purposes of a particular inquiry. It was therefore a violation of his right to privacy.Footnote 47 Also, in a judgment of 25 June 2020, the Economic Community of West African States (ECOWAS) Community Court of Justice ruled that the September 2017 internet shutdown ordered by the Togolese government during protests was illegal and an affront to the applicants’ right to freedom of expression.Footnote 48
Undoubtedly, the three rights of assembly, expression and privacy converge to a great degree when it comes to assemblies, and the lines between them inevitably blur. It is a long-standing principle of the administration of justice that a court often will not examine violations of closely linked rights once it has found a violation of one. This is not unique to freedom of assembly – the ECtHR, for example, has repeatedly declared that it was not necessary to examine whether there had been a violation under another right.Footnote 49 There are also cases where the Court found a violation of freedom of assembly and declared that it was unnecessary to examine whether there had been a violation of freedom of expression. Nonetheless, these cases relate to instances where protesters were arrested before, during or immediately after a protest or where the State banned a protest from taking place or unjustifiably restricted the organization of an assembly.Footnote 50
At the UN level, freedom of assembly has been increasingly added next to privacy and freedom of expression when considering the impact of surveillance and interference with internet communications on human rights, precisely in order to underline specific concerns that are raised by the surveillance of peaceful assemblies.Footnote 51 There are also resolutions, reports and other documents focusing on freedom of assembly in the digital age that underline the impact of surveillance on assembly.Footnote 52
However, it is maintained here that despite the increasing attention given to freedom of assembly, international and regional bodies (judicial, quasi-judicial, political and independent experts) have not fully explored and captured the full extent to which general and indiscriminate surveillance and interference with internet communications – before, during and after – directly interfere with and potentially infringe on freedom of assembly.
For instance, when examining the impact of assembly surveillance, the UN Human Rights Committee's General Comment 37 focuses on the right to privacy. It states:
The mere fact that a particular assembly takes place in public does not mean that participants’ privacy cannot be violated. The right to privacy may be infringed, for example, by facial recognition and other technologies that can identify individual participants in a crowd.Footnote 53
The in-depth consideration of the impact of surveillance and interference with internet communications on assemblies is key both for ensuring that the distinct nature of freedom of assembly is preserved, and for the better regulation, implementation and enforcement of surveillance measures around protests.
Freedom of assembly incorporates the right of every individual to hold opinions without interference, an element that also describes freedom of expression.Footnote 54 However, assembly also encompasses a social component, the sense of acting to pursue a common interest or purpose. It protects the collective nature of protests brought together by a common aim.Footnote 55 When freedom of assembly is attacked, the societal network that is united under the specific aim is damaged.Footnote 56 As such, freedom of assembly helps to develop and strengthen democratic societies.Footnote 57 In equal measure, while surveillance may be primarily an interference with the right to privacy, such interference often provides a gateway to violations of other rights, including freedom of assembly.Footnote 58 A violation of the right to privacy, more often than not, is not an end in itself; it rather offers the means for infringing on other rights.Footnote 59 In that sense, it often becomes the enabler for infringing on, among others, freedom of assembly.
Mass surveillance and interference with internet communications as an infringement of freedom of assembly
Direct interference with freedom of assembly
Many of the surveillance and internet communications interference measures referred to above can be used to directly interfere with the exercise of freedom of assembly. For example, as mentioned above, so-called IMSI catchers can be used to monitor and intercept ingoing and outgoing communications, but can also edit or reroute mobile communications, as well as block service. Governments may use an IMSI catcher to send a message to mobile phones in the area as a way of intimidating protesters or manipulating them into disbanding or conducting some other activity. Similarly, internet shutdowns or placing restrictions on secure and confidential communications may constitute a direct interference with freedom of assembly insofar as they represent an attempt by the government to prevent a protest from being organized or disperse an already ongoing protest. These actions directly hinder the ability of individuals to attend a gathering, to communicate with one another and to organize further.Footnote 60
Freedom of assembly is indeed a qualified right and may be restricted when necessary in a democratic society for a legitimate aim – in the interests of national security, public safety etc.Footnote 61 However, as the Human Rights Committee has repeatedly underlined, it may only be limited under strict conditions.Footnote 62 Restrictions can be imposed only if prescribed by law and necessary and proportionate in the circumstances, but more often than not these interferences are not even prescribed by law. For instance, in many countries there is no legal framework regulating the use of mass surveillance tools, such as IMSI catchers, and often protesters will not even be aware of their presence during a protest.Footnote 63
Additionally, restrictions to freedom of assembly need to be specific and necessary to achieve a specific legitimate aim;Footnote 64 there needs to be a rational connection between the measure and the prescribed aim, meaning that a measure cannot be based on an abstract aspiration that it might facilitate the aim.Footnote 65 However, it is arguably impossible to find such a link when imposing general and indiscriminate surveillance measures,Footnote 66 or indeed to justify such mass interferences in any circumstances. When protests turn violent or in other situations of violence, certain targeted surveillance and investigatory measures may be taken, but generalized measures against an abstract threat cannot tilt the balance. For instance, governments often claim that internet shutdowns are necessary for public safety when a peaceful protest is about to turn violent, but such kill switches “may well exacerbate, rather than curtail, tensions”;Footnote 67 they can stress the gathered crowds, who are no longer able to be informed about what is happening around them.Footnote 68 In addition, internet shutdowns affect not only the assemblers but also those who are living in, working in and passing through the area where the assembly takes place.
Following a blockage of Twitter and YouTube, the Commissioner for Human Rights of the Council of Europe underlined that although illegal content could be blocked, applying this measure to entire platforms was a disproportionate response. Accordingly, he requested that such blockages should be lifted.Footnote 69 The UN Special Rapporteur on the Rights to Freedom of Peaceful Assembly and of Association has emphasized that shutdowns and the blocking of entire websites constitute an extreme and disproportionate measure that cannot be justified in any circumstances.Footnote 70 He has also called for the prohibition of indiscriminate and untargeted surveillance of those exercising their right to peaceful assembly, in both physical and digital spaces.Footnote 71
Certainty of surveillance amounts to an infringement of freedom of assembly
The certainty of surveillance and interference with communications technologies, particularly due to the general and indiscriminate nature of such measures, arguably infringes on the obligation not to interfere with protests as such, irrespective of whether the information collected is used to further directly interfere with the organization of an assembly, as argued above.
Undoubtedly, when attending a public assembly there may be a reasonable expectation that individuals might be identified, either because police conduct an investigation or because their face appears in a newspaper photograph. However, current surveillance of assemblies, particularly protests, has gone far beyond the expectation of some degree of publicity.Footnote 72 It is now becoming a certainty that protesters could be identified through the data collected by the authorities when it is processed and analyzed. As such, the general and indiscriminate surveillance of protests amounts to an unjustified interference not only with the right to privacy but also with the right to peacefully assemble, and in turn violates freedom of assembly.
For instance, the regular audio-visual recording of protests in combination with facial recognition technology requires the collection and processing of facial images of all persons captured by the camera (irrespective of whether the authorities use facial recognition in real time or at a later stage). The permanent record that can be created by these recordings could allow authorities, if they so decide, to identify all those that participated in a protest even at a later time.Footnote 73 The UN High Commissioner for Human Rights has recommended that States “[n]ever use facial recognition technology to identify those peacefully participating in an assembly”.Footnote 74
Similarly, identity catchers, such as IMSI catchers, can capture the call activity of thousands of people indiscriminately. These are interferences on a mass scale.Footnote 75 Additionally, the aggregation of information acquired from different means and methods of surveillance before, during and after protests gives police forces the power to de-anonymize and identify everyone involved in the protest, irrespective of whether they are suspected of having committed a crime.Footnote 76 At the same time, the duration of the consequence of surveillance has also radically changed, as there is little indication of how long law enforcement and other agencies involved in protest surveillance will be keeping a record of the collected data.Footnote 77
Inherent to freedom of assembly is the ability to participate in a protest without retribution. Anonymity plays a key role for safe and confidential communications in the planning and holding of protests, as well as for participating in protests.Footnote 78 Individuals rely on the anonymity of the crowd to protect themselves against retribution, particularly in contexts where any form of dissent is suppressed.Footnote 79 This is no longer an option, however, as people's mere participation in a protest today promises the erosion of their privacy, particularly as the cumulative use of these surveillance systems and methods guarantees that the information of individual protesters will be captured by at least one of them, leading to the individual's potential identification. It is argued here that the inevitability of surveillance, as such, becomes a barrier to the organization of and participation in assemblies, including protests, and thus constitutes an unjustified interference that infringes on freedom of assembly.
Infringement of the obligation to facilitate assemblies
General and indiscriminate assembly surveillance and interference with internet communications violate the positive obligations of States to facilitate assemblies and protect assemblers, as well as their positive obligation to take precautionary measures to prevent violations and abuses of the different rights at stake.
States need to secure the effective enjoyment of freedom of assembly.Footnote 80 Therefore, they have a positive obligation to take reasonable and appropriate measures to facilitate, protect and enable lawful demonstrations to proceed peacefully.Footnote 81 Undoubtedly, in order to fulfil these obligations, they have to take certain measures – for instance, redirecting traffic or providing security.Footnote 82 However, the need to adopt such measures is not without limits. The measures must never impair the essence of the right and cannot serve as a justification for measures that violate freedom of assembly, among other rights.Footnote 83
If the network that enables the organization and holding of assemblies is shut down before a demonstration takes place, such a measure directly violates the positive obligation of States to facilitate the exercise of freedom of assembly. Associated activities that happen online in advance of an assembly are equally protected under freedom of assembly.Footnote 84 As the ECtHR has repeatedly underlined, “a system of secret surveillance set up to protect national security may undermine or even destroy democracy under the cloak of defending it”.Footnote 85
Undermining the privacy of communications as such infringes on freedom of assembly, because the capacity to use communications technologies securely and privately is vital to the organization and conduct of assemblies.Footnote 86 Therefore, any general and indiscriminate surveillance or internet communications interference, including blocking internet connectivity or monitoring social media and other online communications, should also be understood as a violation of the obligation of States to facilitate assemblies.Footnote 87
Infringement of the obligation to ensure a legal framework that safeguards freedom of assembly
Mass surveillance and interference with internet communications infringe on the positive obligation of States to promote an enabling environment for the exercise of the right to peaceful assembly.
Part of this obligation is the overarching obligation to ensure that there is an appropriate, accessible and foreseeable legal and institutional framework that regulates the exercise of freedom of assembly.Footnote 88 The legal framework must clearly set out the duties and responsibilities of all those acting in an official capacity – including private companies contracted to provide security – involved in managing assemblies in accordance with international standards, including who can surveil protests or interfere with new technologies, and when they can do so.Footnote 89 For instance, the use of IMSI catchers without any framework or of military-grade predator drones, or interference with internet communications by intercepting, redirecting or blocking the use of specific platforms or pages, should all be also understood as ipso facto violations of freedom of assembly.Footnote 90
More often than not nowadays, police are deploying surveillance measures and interfering with communications technologies without necessarily abiding by a specific legal framework, either because such a framework does not exist or because the existing one is interpreted too broadly. The absence of a legal framework regulating the use of new technologies for surveillance or interference before, during and after protests, or the existence of one that gives very broad and excessive powers to authorities, should be understood as a direct violation of the obligation to safeguard the exercise of freedom of assembly.
Violation of the obligation to respect freedom of assembly
General and indiscriminate surveillance and interference with internet communications violate the obligation to respect freedom of assembly, due to the chilling effect that their use causes.
As part of the obligation to respect freedom of assembly, States have a negative obligation to refrain from actions that will undermine the enjoyment of this right.Footnote 91 General and indiscriminate surveillance and interference with internet communications have the capacity to “chill” the exercise of freedom of assembly, as the monitoring and recording of participants at an assembly may prevent them from joining.Footnote 92 In the Big Brother Watch case, the ECtHR accepted that any perceived interference with the confidentiality of communications without any limitations may result in a “chilling effect” – that is, a self-restraint – on the lawful exercise of a right, particularly freedom of expression; hence it found a violation of Article 10 of the European Convention on Human Rights.Footnote 93 The inevitability of surveillance (see above) should thus be understood as a violation of the obligation to respect freedom of assembly, and not only as an interference with freedom of assembly.
Also, these newer forms of government surveillance, where practices (such as employing facial recognition technologies) lack foreseeability and transparency, exacerbate the negative impact on the exercise of freedom of assembly.Footnote 94 As warned by the UN Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression, “even a narrow, non-transparent, undocumented, executive use of surveillance may have a chilling effect without careful and public documentation of its use, and known checks and balances to prevent its misuse”.Footnote 95
Attacking the essence of freedom of assembly
Finally, general and indiscriminate surveillance and interference with internet communications undermine the essence of freedom of assembly.
Human rights instruments that guarantee freedom of assembly permit certain interferences with this right, so long as those interferences abide by certain strictly interpreted principles, including legality, necessity and proportionality, to the extent that they do not undermine the essence or core of this right. As the Human Rights Committee has emphasized, “[i]n no case may the restrictions be applied or invoked in a manner that would impair the essence of a Covenant right”.Footnote 96
This obligation is embedded in the core provisions of each human rights instrument, which guarantee that nothing in their provisions may be interpreted as implying that a State or other entity can engage in any act that will lead to the destruction of any of the rights of freedom set forth therein, including freedom of assembly.Footnote 97 The ECtHR, on a case relating to measures restricting assembly, held
that notification, and even authorisation procedures, for a public event do not in general encroach upon the essence of the right [of freedom of assembly], as long as the purpose of regulating the assembly is to allow the authorities to take reasonable and appropriate measures in order to guarantee its smooth conduct.Footnote 98
It went on to add, though, that “the enforcement of such rules cannot become an end in itself”.Footnote 99
In another case, the Court has noted
that the very essence of the right to freedom of peaceful assembly would be impaired, if the State was not to prohibit a demonstration but was then to impose sanctions on its participants, even one at the lower end of the scale of penalties, for the mere fact of attending it, without committing anything reprehensible, as happened in the applicant's case.Footnote 100
In other words, what this reasoning suggests is that blanket surveillance and other interferences that dissuade individuals from participating in assemblies could be regarded as adversely affecting the essence of freedom of assembly.
The restrictions imposed upon this right should not unacceptably weaken the protection afforded by it. Freedom of assembly guarantees the right to collectively and peacefully meet, demonstrate or protest without retribution. Read together with the arguments provided in the previous sections, we can conclude that the erosion of participants’ anonymity, the inevitability of surveillance, and blanket interference with people's communications for the mere fact of having participated in a gathering adversely affect the essence of freedom of assembly.
Conclusion
New forms of control through the use of surveillance, as well as interference with internet communications, have been increasingly deployed by States to control assemblies, including general and indiscriminate surveillance, internet shutdowns, and the blocking of social media platforms, web pages and mobile applications. Undoubtedly, the new digital reality requires governments to adapt and use the tools at their disposal to assist them in ensuring the safe and free administration of assemblies and movements. However, there has always been one condition – they should always safeguard the enjoyment of human rights in the process.
The use of any such measures should comply with the legal requirements not only of the right to privacy and freedom of expression, but also of the right to freedom of assembly. General and indiscriminate surveillance and blanket interferences with internet communications amount to a direct infringement of the right to freedom of assembly on multiple grounds, and as such should not be used in the context of assemblies – if at all, though that is a separate conversation.Footnote 101 General and indiscriminate surveillance and interference with internet communications infringe on freedom of assembly when they are used for direct, unjustified interference with assemblies; they render surveillance inevitable, instead of a possibility; they violate the obligation to facilitate assemblies and the obligation to have a legal framework that facilitates assemblies, as well as the obligation to respect freedom of assembly; and, last but not least, they attack the essence of the right.
Undoubtedly, some of these acts can be and have on occasion been understood as violations of the right to privacy and/or freedom of expression. However, examining their impact on other rights allows for more effective protection of the core values that each protects. This separate legal analysis is needed not only to preserve the distinct nature of freedom of assembly that protects collective action, but also to allow for better regulation of surveillance and interference with internet communications in assemblies, demonstrations and protests. Freedom of assembly is only the beginning – other human rights and their distinct nature stand in line, including freedom of religion and belief and the right to participate in public affairs.