Ireland is preparing sweeping surveillance reforms that would explicitly let police deploy spyware on targeted devices, marking a significant shift in how the state accesses encrypted communications. The government’s planned Communications (Interception and Lawful Access) Bill would update decades-old interception rules, extend to encrypted apps, and formalize the use of covert surveillance software under court oversight.
What Ireland’s surveillance bill authorizes and changes
Officials say the bill is designed to cover “all forms of communications,” allowing Gardaí to obtain both the content of messages and related metadata. Crucially, it proposes a legal basis for deploying covert surveillance software — the state’s term for government-grade spyware — as an “alternative means” to tap communications when network interception is ineffective.
- What Ireland’s surveillance bill authorizes and changes
- Why the government is acting now on encrypted communications
- Safeguards and oversight features to watch in the bill
- European context, precedents, and recent spyware scandals
- Human rights implications and broader security trade-offs
- What happens next in Ireland’s surveillance legislation

The Justice Department frames the move as an overdue modernization to confront serious crime and national security threats. Ministers have pledged judicial authorization, strict necessity and proportionality tests, and a case-by-case approach, while signaling that full operational details will be set out in the legislative text.
Why the government is acting now on encrypted communications
Ireland’s existing framework dates to 1993, long before end-to-end encryption became the norm for everyday calling and messaging. When communications are encrypted, authorities cannot rely on network taps; instead, they must access data at the source by compromising a device. The market for such capabilities is dominated by vendors like Intellexa, NSO Group, and Paragon, alongside forensic toolmakers used for physical device extraction.
By codifying how on-device access may be used, Dublin aims to replace ad hoc practices with clear thresholds and oversight. The move carries particular weight given Ireland’s role as the EU base for many technology companies and as the home of the bloc’s lead privacy regulator, ensuring close scrutiny from industry and civil society.
Safeguards and oversight features to watch in the bill
The government has signaled guardrails, but privacy advocates will look for specifics. Strong regimes in Europe typically require prior judicial approval, strict definitions of “serious crime,” time limits, data minimization, and robust audit logs. Post-operation notification, once it no longer risks investigations, is increasingly viewed as a vital check that enables redress.
Procurement and vendor governance will also be pivotal. Policymakers face pressure to bar untargeted tools, avoid exploit stockpiling that undermines device security, and mandate vulnerability disclosure where possible. Recent Court of Justice of the European Union rulings against indiscriminate data retention underscore the need for targeted, strictly necessary measures, a standard many will expect this bill to meet.
European context, precedents, and recent spyware scandals
Spyware is no longer a distant concern for Europe. In Greece, the Predator affair exposed abuse of commercial spyware against journalists and political figures. In Poland, investigations found Pegasus used against opposition figures and prosecutors. Allegations have surfaced elsewhere in the bloc, fueling parliamentary and judicial scrutiny.

European precedent stretches back years. Germany’s “Bundestrojaner” controversy erupted after the Chaos Computer Club analyzed a police trojan in 2011 and flagged overreach capabilities. Germany later codified “source telecommunications surveillance” with tighter oversight. Italy’s early contracts with Hacking Team, revealed through subsequent leaks, illustrated how quickly Western law enforcement agencies embraced the technology and the reputational risks that followed.
The European Parliament’s PEGA inquiry urged strict safeguards and, in some cases, moratoriums until controls are in place. France recently authorized limited remote activation of device cameras and microphones under judge’s orders for serious offenses, a reminder that EU states are moving ahead with targeted device access but embedding judicial checks.
Human rights implications and broader security trade-offs
On-device spyware can pierce the most sensitive protections, from journalist-source confidentiality to legal privilege. Rights groups warn of chilling effects and the ease with which exceptional tools can be repurposed for political surveillance if oversight falters. Citizen Lab and Amnesty International’s Security Lab have documented repeated spyware abuses worldwide, including within Europe, underscoring the stakes.
There is also a technical trade-off: government use of zero-day flaws can keep vulnerabilities unpatched, placing the broader public at risk. Major platform providers have issued repeated threat notifications to high-risk users targeted by state actors, reflecting an ongoing cat-and-mouse cycle between vendors, governments, and security teams.
What happens next in Ireland’s surveillance legislation
The full bill text will move through Ireland’s legislative process, where definitions, thresholds, and oversight architecture will be hashed out. Key questions include how “serious crime” is scoped, who authorizes and audits operations, what transparency reporting is mandated, and how individuals can seek redress if wrongly targeted.
Interoperability with EU instruments, such as the European Investigation Order, and alignment with the European Convention on Human Rights will be critical. The outcome will determine whether Ireland can equip investigators to reach data on hardened devices while preserving trust in encryption, the rule of law, and the security of everyone’s phones.