Injunction 4 sex pics on mob

12 January 2012 by

AMP v Persons unknown – read judgment

If you lose your mobile phone with highly confidential and private information on it, all may  not be lost. The unscrupulous finder may be prevented from blurting its contents all over the web, even if the identity of that person is unknown to you or the court. It requires considerable input of computer expertise, but it is possible, as this case (cleverly taken in the Technology and Construction Court) illustrates. 

The applicant’s mobile phone was reported to the police as stolen after she lost it at university in 2008. It contained digital images of an explicit sexual nature which were taken for the personal use of her boyfriend at the time. The applicant was alone in the photos and her face was clearly visible.

Invoking the right to privacy under Article 8, and the Protection from Harassment Act 1997, she applied for an interim injunction to prevent transmission, storage and indexing of any part or parts of certain photographic images taken from the phone, and an anonymity order under CPR r.39.2(4), which meant that the application, which was heard in private  on the basis that publicity would defeat the object of the hearing, would preserve the anonymity of the applicant. Both applications were granted.


The series of events following shortly after the loss or theft of the phone were stressful indeed. The digital images were uploaded to a free online media hosting service that is used to upload and share images. The applicant  was contacted on Facebook by someone threatening to post the images widely online and tell her friends about them if she did not add him as a friend on Facebook. Even though she deleted those Facebook messages and blocked the sender, the persecution continued. Her father’s business public relations team were also contacted and allegedly threatened and blackmailed about some images. The images were uploaded to a Swedish website that hosted files known as “BitTorrent” files and were downloaded an unknown number of times by persons unknown. The images were uploaded so that the applicant’s name was appended to each of the images and could therefore readily be searched for when using online search engines. As a result, the link to the BitTorrent files were at the top of the list of search engine searches for her name.

The use of BitTorrent technology raised complex technical issues, which was why this claim was brought in the Technology and Construction Court. This  “peer-to-peer” form of file-sharing is a type of technology which is much more difficult for authorities to stop than individual websites that host illegal files themselves. The way the “Bit.torrent” process works is complex but the key thing is that the person downloading files must first download BitTorrent client software.  By using BitTorrent client software each user who downloads the file becomes, in turn, a seeder facilitating the distribution of a particular file by allowing pieces of that file to be uploaded by other users downloading the file.

Expert evidence before the court demonstrated how it could be possible to identify the unique IP Address of every computer  helping to share the images thereby making it possible to contact their broadband provider to find their name and address. If enough of these “seeders” were contacted and ordered to stop their account being used, it would become harder for anyone to download the pictures.

As far as the claim under the harassment Act was concerned, the judge considered that there was sufficient evidence in this case that the conduct by the applicant’s unknown persecutors caused alarm and distress, thus amounting to “harassment” under the Act (Thomas v News Group Newspapers Ltd (2001) EWCA Civ 1233. Equally, the circumstances of the case were such that X’s identity should be protected under CPR 39.2(4) (para.46).

As a result, the injunction was granted against “persons unknown”, so a forensic computer company instructed by her lawyers could track down anyone hosting the files. Although it was most unlikely that any of the file sharers were outside the jurisdiction of this country, anyone in the EU could be bound by the order.


It is hardly surprising that the judge upheld the applicant’s claim under Article 8.  The leading authority on privacy under the Convention is still Campbell v Mirror Group Newspapers Ltd (2004) UKHL 22, according to which the applicant had a reasonable expectation of privacy both in relation to the explicit sexual photographs which she had taken for transmission to her boyfriend and also of the images taken of family and friends. All the circumstances of the case, including her attributes, the nature of the activity in which she was engaged, the place at which it was happening, the nature and purpose of the intrusion, the absence of consent and whether it was known or could be inferred, the effect on the applicant herself and the circumstances in which and the purposes for which the information came into the hands of the publisher, all engaged the right to privacy under Article 8.  Put in terms of the ordinary common law of confidentiality,  information which was stored on a person’s mobile phone would generally be information for which there would be a reasonable expectation of privacy.  Whilst rights under Article 8 would normally have to be balanced against those under Article 10, this case was clearly not one where press freedom was at issue.  The balance fell strongly in favour of the applicant’s right to have her privacy respected. Since the material at issue could not described as journalistic, literary or artistic material, or conduct connected with such material, the provisions in the Human Rights Act 1998 preserving the interests of the press in claims for interim injunctions (sections 12(2) and s.12(4)) did not apply to prevent an interim order from being made.  The users of the BitTorrent client software who were downloading and uploading those digital images had no rights in that information and the information was of a personal, private and confidential nature which the courts should protect. Accordingly, it was appropriate to grant interim relief in the form of an injunction.

The most significant feature of this case is that the claim was brought against “Persons Unknown”. The reason for that is, as Ramsay J explains it,

that until seeders of the relevant digital photographic image files have been identified by way of their IP Addresses whilst they are seeding and their addresses have been obtained from their Internet Service Provider, they cannot be made a party to these proceedings. It is submitted on behalf of the Claimant that the number of potential Defendants and the need to move rapidly to prevent increasing numbers of seeders militates against identifying individual defendants at the present time.

A conventional procedure which required further applications to add additional defendants when they are identified, would be cumbersome and lead to unnecessary costs and time being spent which would be contrary to the overriding objective of anonymity. Instead the judge accepted the applicant’s submission that, by identifying the class of persons unknown by reference to their particular characteristic, namely any person in possession of any of the relevant files containing the images, would be a sufficient description of the defendants to enable them to be served with any order which the court might make. The judge therefore considered it appropriate for the application to be granted in the name of “Persons Unknown”.

According to Professor Andrew Murray, the applicant’s expert on computer technology in this case, the judgment could have far-reaching consequences for social media and the attempt to bring users of it within the reach of the law:

the impact it may have is far reaching in terms of an alternative to orders being sought against essentially unregulatable (for the UK courts) offline platforms such as Twitter or Facebook.

Sign up to free human rights updates by email, Facebook, Twitter or RSS

Related reading:

1 comment;

  1. John D says:

    A very interesting case. Will it be possible to know of any further developments relating to this case?

Welcome to the UKHRB

This blog is run by 1 Crown Office Row barristers' chambers. Subscribe for free updates here. The blog's editorial team is:
Commissioning Editor: Jonathan Metzer
Editorial Team: Rosalind English
Angus McCullough QC David Hart QC
Martin Downs
Jim Duffy

Free email updates

Enter your email address to subscribe to this blog for free and receive weekly notifications of new posts by email.




This blog is maintained for information purposes only. It is not intended to be a source of legal advice and must not be relied upon as such. Blog posts reflect the views and opinions of their individual authors, not of chambers as a whole.

Our privacy policy can be found on our ‘subscribe’ page or by clicking here.


Aarhus Abortion Abu Qatada Abuse Access to justice adoption ALBA Al Qaeda animal rights anonymity Article 1 Protocol 1 Article 2 article 3 Article 4 article 5 Article 6 Article 8 Article 9 article 10 Article 11 article 13 Article 14 Artificial Intelligence Asbestos assisted suicide asylum Australia autism benefits Bill of Rights biotechnology blogging Bloody Sunday brexit Bribery Catholicism Chagos Islanders Children children's rights China christianity citizenship civil liberties campaigners climate change clinical negligence Coercion common law confidentiality consent conservation constitution contempt of court Control orders Copyright coronavirus costs Court of Protection crime Cybersecurity Damages data protection death penalty defamation deportation deprivation of liberty Detention disability disclosure Discrimination disease divorce DNA domestic violence duty of care ECHR ECtHR Education election Employment Environment Equality Act Ethiopia EU EU Charter of Fundamental Rights EU costs EU law European Court of Justice evidence extradition extraordinary rendition Family Fertility FGM Finance foreign criminals foreign office France freedom of assembly Freedom of Expression freedom of information freedom of speech Gay marriage Gaza genetics Germany Google Grenfell Health HIV home office Housing HRLA human rights Human Rights Act human rights news Huntington's Disease immigration India Indonesia injunction Inquests international law internet Inuit Iran Iraq Ireland Islam Israel Italy IVF Japan Judaism judicial review jury trial JUSTICE Justice and Security Bill Law Pod UK legal aid Leveson Inquiry LGBTQ Rights liability Libel Liberty Libya Lithuania local authorities marriage mental capacity Mental Health military Ministry of Justice modern slavery music Muslim nationality national security NHS Northern Ireland nuclear challenges Obituary ouster clauses parental rights parliamentary expenses scandal patents Pensions Personal Injury Piracy Plagiarism planning Poland Police Politics pollution press Prisoners Prisons privacy Professional Discipline Property proportionality Protection of Freedoms Bill Protest Public/Private public access public authorities public inquiries rehabilitation Reith Lectures Religion RightsInfo right to die right to family life Right to Privacy right to swim riots Roma Romania Round Up Royals Russia Saudi Arabia Scotland secrecy secret justice sexual offence Sikhism Smoking social media South Africa Spain special advocates Sports Standing statelessness stop and search Strasbourg Supreme Court Supreme Court of Canada surrogacy surveillance Syria Tax technology Terrorism tort Torture travel treaty TTIP Turkey UK Ukraine USA US Supreme Court vicarious liability Wales War Crimes Wars Welfare Western Sahara Whistleblowing Wikileaks wind farms WomenInLaw YearInReview Zimbabwe
%d bloggers like this: