Mass Surveillance, Counterterrorism and Privacy: The Way Forward

Similar documents
Privacy And? Surveillance

The Role of Local Government in Addressing the Impact of Syrian Refugees: Jordan Case Study

Ethiopia s Foreign Policy: Regional Integration and International Priorities

Governing the DRC: Balancing Local, Provincial and National Concerns

Investigatory Powers Bill

Ghana s 2016 Election: Processes and Priorities of the Electoral Commission

Human Rights and Ethical Implications of Approaches to Countering Violent Extremism in Europe January 2018

APPENDIX. 1. The Equipment Interference Regime which is relevant to the activities of GCHQ principally derives from the following statutes:

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

Regulation of Investigatory Powers Bill

IN THE EUROPEAN COURT OF HUMAN RIGHTS Application no /15. -v- UNITED KINGDOM SUBMISSIONS MADE IN LIGHT OF THE THIRD IPT JUDGMENT OF 22 JUNE 2015

China's Perspectives on the South China Sea Verdict

INVESTIGATORY POWERS BILL EXPLANATORY NOTES

Law Commission Review of the Search and Surveillance Act 2012

Letter from Rt Hon Theresa May MP, Home Secretary, to the Chair of the Committee, 26 April Communication Data

Plea for referral to police for investigation of alleged s.1 RIPA violations by GCHQ

1 June Introduction

Regulation of Investigatory Powers Act 2000

Mexico s Foreign Policy: Leveraging the Domestic Transformation

I. REGULATION OF INVESTIGATORY POWERS BILL

The Evolution of Australian Foreign Policy

On 4 November the government published the draft Investigatory Powers Bill, set to be. Understanding the Investigatory Powers Bill.

HAUT-COMMISSARIAT AUX DROITS DE L HOMME OFFICE OF THE HIGH COMMISSIONER FOR HUMAN RIGHTS PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND

Submission to the Joint Committee on the draft Investigatory Powers Bill

Investigatory Powers Bill. How to make it fit-for-purpose

Covert Human Intelligence Sources Code of Practice

ANDREW MARR SHOW APRIL 9 TH 2017 PRITI PATEL

NGOS, GOVERNMENTS AND THE WTO

KEYNOTE STATEMENT Mr. Ivan Šimonović, Assistant Secretary General for Human Rights. human rights while countering terrorism ********

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden.

Submission to the Foreign Affairs, Defence and Trade Committee on the New Zealand Intelligence and Security Bill

(Straw) Man in the Middle:

THE PRIME MINISTER'S LUNCHEON FOR

TekSavvy Solutions Inc.

Statelessness: The Impact of International Law and Current Challenges

I. Does International Law Prohibit the U.S. Government from Monitoring Foreign Citizens in Foreign Countries?

The Right to Privacy in the Digital Age: Meeting Report

Consistency with the New Zealand Bill of Rights Act 1990: Outer Space and High Altitude Activities Bill

Conducting surveillance in a public place

Investigatory Powers Bill

Spying on humanitarians: implications for organisations and beneficiaries

Electronic Privacy Information Center September 24, 2001

Investigatory Powers Bill Briefing

Statement for the European Parliament, Temporary Committee on the ECHELON interception system, meeting of Thursday, 22 March, 2001, Brussels.

International Approaches to Conflict Resolution in Libya

Counter-Terrorism Bill

LEGISLATIVE CONSENT MEMORANDUM INVESTIGATORY POWERS BILL

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

[2015] UKIPTrib 13_77-H Case Nos: IPT/13/77/H, IPT/13/92/CH, IPT/13/ /H, IPT/13/194/CH, IPT/13/204/CH. Before :

Judges, Parliament and the Government the new relationship Transcript of a lecture by Rt Hon Lord Woolf

CCPA Analysis Of Bill C-36 An Act To Combat Terrorism

FINAL WORKING DOCUMENT

AMBASSADOR THOMAS R. PICKERING DECEMBER 9, 2010 Subcommittee on the Constitution, Civil Rights, and Civil Liberties of the House Committee on the

Telecommunications (Interception Capability and Security) Bill

Short Guide 04. Edward Jacobs, Judge of the Upper Tribunal. The ABC of Effective Procedural Applications The Basics of Tribunal Representation

ANDREW MARR SHOW 27 TH JANUARY 2019 SIMON COVENEY

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING

Opening speech by Markus Löning Former German Commissioner for Human Rights Economic Freedom Network Asia, Manila, November 22 nd 2016

tinitrd~tat s~fnatf WASHINGTON, DC 20510

Committee on Civil Liberties, Justice and Home Affairs WORKING DOCUMENT 4

The Lobbying Act 2014

EUROPEAN PARLIAMENT DRAFT OPINION. Committee on Petitions PROVISIONAL. 6 September of the Committee on Petitions

House Standing Committee on Social Policy and Legal Affairs

THE ANDREW MARR SHOW 24 TH APRIL 2016 THERESA MAY. AM: Good morning to you, Home Secretary. TM: Good morning, Andrew.

Security Council Counter-Terrorism-Committee, New York, 24 October 2005.

Interview with Philippe Kirsch, President of the International Criminal Court *

Response to invitation for submissions on issues relevant to the proportionality of bulk powers

The forensic use of bioinformation: ethical issues

Russia and the United Kingdom in the Changing World

PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND TEL: / FAX:

ANDREW MARR SHOW 17 TH DECEMBER DIANE ABBOTT, MP Shadow Home Secretary. AM: I m just looking for specifics. DA: Yeah and specifics.

The National Security Agency s Warrantless Wiretaps

FOURTH SECTION. CASE OF LIBERTY AND OTHERS v. THE UNITED KINGDOM. (Application no /00) JUDGMENT STRASBOURG. 1 July 2008

Mandate of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression

Chapter 11 The use of intelligence agencies capabilities for law enforcement purposes

The 1995 EC Directive on data protection under official review feedback so far

The Changing Nature of Eritrea s Opposition Politics

THE ANDREW MARR SHOW INTERVIEW: THERESA MAY, MP HOME SECRETARY NOVEMBER 11 th 2012

Communications Security Establishment Commissioner. Annual Report

THE HON RICHARD MARLES MP SHADOW MINISTER FOR DEFENCE MEMBER FOR CORIO

Interview with Victor Pickard Author, America s Battle for Media Democracy. For podcast release Monday, December 15, 2014

BULK POWERS IN THE INVESTIGATORY POWERS BILL:

UK Counterterrorism Legislation: Impact on Humanitarian, Peacebuilding and Development Action

Speech to SOLACE National Elections Conference 16 January 2014 Peter Wardle

THE ANDREW MARR SHOW INTERVIEW: ALEX SALMOND, MSP FIRST MINISTER OF SCOTLAND OCTOBER 20 th 2013

Andrew Blowers There is basically then, from what you re saying, a fairly well defined scientific method?

1 TONY BLAIR ANDREW MARR SHOW, 29 TH MAY, 2016 TONY BLAIR

PROGRAM FOR PUBLIC CONSULTATION / ANWAR SADAT CHAIR

Vienna Parliamentary Forum on Intelligence-Security. Giovanni Buttarelli

Interviews. Interview With Ambasssador Gregory L. Schulte, U.S. Permanent Representative to the In. Agency

Police and crime panels. Guidance on confirmation hearings

The following text is an edited transcript of Professor. Fisher s remarks at the November 13 meeting. Afghanistan: Negotiation in the Face of Terror

IN THE EUROPEAN COURT OF HUMAN RIGHTS. Application No /13. Big Brother Watch and others v. the United Kingdom

6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining

STATEMENT STEVEN G. BRADBURY ACTING ASSISTANT ATTORNEY GENERAL OFFICE OF LEGAL COUNSEL DEPARTMENT OF JUSTICE

DR LIAM FOX ANDREW MARR SHOW 18 TH DECEMBER, 2016

Discussion seminar: charitable initiatives for journalism and media summary

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

Statement of. L. Britt Snider. Subcommittee on Intelligence Community Management House Permanent Select Committee on Intelligence.

Freedom of Information Policy

Transcription:

Transcript Mass Surveillance, Counterterrorism and Privacy: The Way Forward Ben Emmerson QC UN Special Rapporteur on Counterterrorism and Human Rights Rt Hon Sir Malcolm Rifkind MP Chairman, Intelligence and Security Committee Chair: Dr Patricia M Lewis Research Director, International Security, Chatham House 28 October 2014 The views expressed in this document are the sole responsibility of the speaker(s) and participants do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author(s)/ speaker(s) and Chatham House should be credited, preferably with the date of the publication or details of the event. Where this document refers to or reports statements made by speakers at an event every effort has been made to provide a fair representation of their views and opinions. The published text of speeches and presentations may differ from delivery. 10 St James s Square, London SW1Y 4LE T +44 (0)20 7957 5700 F +44 (0)20 7957 5710 www.chathamhouse.org Patron: Her Majesty The Queen Chairman: Stuart Popham QC Director: Dr Robin Niblett Charity Registration Number: 208223

2 Mass Surveillance, Counterterrorism and Privacy: The Way Forward Patricia Lewis Hello, everybody. Welcome to Chatham House. My name is Patricia Lewis. I m the research director here for International Security. We re here tonight to look at the issue of mass surveillance, counterterrorism and privacy and thinking very much about how we move on from where we were after the Snowden revelations. We re very fortunate to have with us today Ben Emmerson QC, who is the UN special rapporteur on counterterrorism and human rights and Sir Malcolm Rifkind, who is the chairman of the Intelligence and Security Committee in parliament. Before I get on to the substance of this meeting, I d like to remind you of a few things. First of all, this event is being held on the record. We do encourage you to tweet, however if you are using your mobile phones and even if you re not, can you right now make sure they re turned to silent? I can assure you that they will ring at the most inopportune moment, particularly if you ask to speak in a Q&A session. They seem to know that you re about to do that. First of all, Ben is going to speak for about 10 minutes about the rapport that he made to the United Nations last week I think it was and then Malcolm will speak for about 10 minutes and let us know about the work in his committee and his response to what s going on in the UN. Malcolm has to leave, unfortunately, at 13:45 in order to be able to vote in parliament, so we will unfortunately lose him. What I ll do in the questions is I ll ask people who have questions specifically to Malcolm to address them to him early on in the proceedings. It s my great pleasure first of all to introduce to you Ben Emmerson QC, who is currently the British judge on the Residual Mechanism of the International Criminal Tribune of Rwanda and the International Criminal Tribune for the Former Yugoslavia. He s previously acted as special adviser to the prosecutor of the International Criminal Court and special adviser to the international judges of the UN backed Khmer Rouge Tribunal in Cambodia. In 2011 he was elected by the Human Rights Council as the UN special rapporteur on counterterrorism and human rights. In this capacity he reports annually to the UN General Assembly, the Human Rights Council and relevant entities established by the UN Security Council. He conducts country visits and reports and provides technical and other advice to states. Last week he made his report to the UN on the issue of surveillance privacy and counterterrorism. At least, that was part of it. Ben, perhaps you could tell us a few things about the report, how you made it, what took you there and what the conclusions were. Ben Emmerson Sure. First of all, just a few introductory points, particularly bearing in mind that we may be at Chatham House, but we re not under Chatham House Rules. The approach that I take to this issue and in which the report takes is not necessarily an international approach. It s not focused on the United Kingdom s domestic legislation or the United States, although of course, as a result of the Snowden revelations, more is known publicly about the covert surveillance programmes run by the US in the UK than those that are known to be run by, for example, China, a state with very significant internet penetration,

3 Mass Surveillance, Counterterrorism and Privacy: The Way Forward Russia, France, Israel and other partners of the United States and the United Kingdom. Although... Malcolm, of course, knows much more about the detail of the operation of those programmes than the rest of us do, we are to some extent looking at these issues through the prison if you ll forget the pun - of the disclosures by Edward Snowden. The second point I wanted to make by way of introduction is that I look at this because of my mandate solely from the point of view of international human rights law and the compatibility of current mass surveillance programmes with, in particular, the right to privacy under article 17 of the International Covenant, roughly equivalent to article 8 of the European Convention on Human Rights. What I ve tried to do in the report is to subject mass surveillance programmes in their general operation to the process of analysis that is mandated under international human rights instruments, which of course, involves going through various steps to determine whether a particular measure is proportionate to a legitimate and important public interest. The debate that followed Snowden was I think a great deal more lively in the United States than in the United Kingdom. Many of those who were involved in promoting debate in the United Kingdom were disappointed that the public took rather less interest in it than they had expected. Certainly, at the international level, what we had seen is that there was a very different reaction depending on the state that the person concerned comes from. Those who have come and emerged from totalitarian rule, for example, or have parts of their state, like Germany, that have emerged from totalitarian rule, are acutely sensitive to the privacy implications of surveillance on the internet, in a way that those who have lived under liberal democracies are sometimes less so. Overall, the issue has been propelled high on the United Nation s agenda, both on the Human Rights Council level and significantly the level of the General Assembly. In December of last year the General Assembly adopted resolution 68/167, which was cosponsored by 67 member states and adopted without a vote. It s a resolution which affirms and this is an important affirmation that the right of privacy exists online and must be protected online and calls on all states to review their procedures, practices and legislation in relation to communication surveillance, interception and the collection of personal data, emphasizing the need to ensure full implementation of their obligations under article 17. The resolution also mandated the high commissioner of human rights to produce reports both to the Human Rights Council and to the General Assembly and that report was initially produced on 30 June. The work that I m doing is therefore not in isolation. It s part of a much broader framework of interest within the UN. There has been recently, a couple of months ago a substantial panel discussion at the Human Rights Council, which is a significant process under which states have an opportunity to debate and contribute to the discussion. There was an interactive dialogue between states during the presentation of my report last week.

4 Mass Surveillance, Counterterrorism and Privacy: The Way Forward Interestingly, it s the first and only time that the United States has not participated in an interactive dialogue, following a report that I ve presented. Normally, even where the reports are critical of the US s position, they will take part in the debate, indicate which parts they accept and which they reject and generally contribute constructively. It was a surprise frankly that the US chose to remain silent and I ve thought about it quite a lot since as to why that might have been. The UK, its closest ally, joined the discussion and did so in an extremely constructive way, effectively endorsing the principles that are set out in the report and affirming the United Kingdom s commitment to those principles. I ve kind of come to the conclusion that the US must have taken a deliberate policy decision not to engage. If you want to make sure that the debate is at a minimal level, the best way is not to say anything, because anything that the administration says in that forum is likely to promote yet greater discussion and debate on what is the topic of real contention and interest in the US. Bringing it right to date, the Brazilian and German missions to the UN are now cosponsoring a further resolution, which is based on this report and the high commissioner s report and will call for the creation of a new special procedure mandate. What I do, as special rapporteur on counterterrorism and human rights, is one of the special procedures mandates and there is currently none which directly focuses on the right to privacy and in particular digital privacy. It falls to some extent within my mandate in so far as the justification for access or mass surveillance and, depending on your point of view, the paradigm justification is often said to be counterterrorism. It falls to some extent within the mandate of the special rapporteur on freedom of expression in the sense that the right to freedom of expression carries with it a corresponding obligation of privacy and there are implications for other human rights, as well, but there is no special procedures mandate which focuses specifically on what is a very complicated and important and challenging topic. The basic conclusion of my report is not very earth-shattering and I m not sure it would come as a surprise to anybody who had looked at these issues. The basic conclusion of the report is that the current technology available for mass surveillance of the internet poses a direct challenge to an established norm of international law. We have an understanding currently of the right to privacy under article 17, which cannot comfortably accommodate mass surveillance programmes. Something is going to have to give in the equation. There may well be justifications on a counterterrorism basis. There s no doubt that the pursuit of effective counterterrorism strategies is not only legitimate, it s an obligation that rests on states and to my mind it s a human rights obligation that rests on states. I ve always made it clear during the course of my mandate that the rights of victims of terrorism and the duty of states to protect them are right at the heart of any debate on the legitimacy and proportionality of counterterrorism techniques, but one is driven to the conclusion here that our current understanding of our right to privacy doesn t sufficiently accommodate the operations that are currently taking place. It comes really to this: the conceptual framework for analysing the right to privacy requires that you start by identifying the legitimate aim for interfering with people s

5 Mass Surveillance, Counterterrorism and Privacy: The Way Forward privacy rights. No doubt at all that counterterrorism is not just a legitimate aim, but it s really at the apex in terms of public importance. To that extent, we know that we are in the territory of a balancing exercise that needs to take place, proportionality [indiscernible]. That balancing exercise, under established principles governing the right to privacy, must take place on an individualized basis. In other words on a case by case basis a judgment must be made, whether the interference with an individual s privacy is proportionate to the aim which it pursues, so in our paradigm, whether it s proportionate to the countering of terrorism. It must be the least intrusive method available to achieve that objective and it must carry with it safeguards, which include in the context of intrusive surveillance, legislation that prescribes limits on the categories of persons whose communication can be surveyed, limits on the duration of the surveillance and appropriate methods for independent review. When one looks Malcolm will correct me on this because I think we look at the technology from a slightly different perspective when one has an operation, the capacity to place taps on fibre optic cables through which the majority of communication traffic runs in order to establish or determine what communication data there is, to subject, retain data, to automating data mining algorithms which link individuals, the IP addresses, the location information, what is called communication data, through which very detailed and accurate profiles on people s lives can be built up, the fact of the matter is that we have done away with the core of the right of privacy as it arises on the internet. Again, I come back to the proposition that there is now international consensus at UN level that the right to privacy applies on the internet. There are those who have argued that if you use the internet, it s rather like sending a postcard. If you send an email, encrypted or un-crypted, you may as well assume that your communications can be read. That view has been decisively and authoritatively rejected by the General Assembly in an unanimous resolution. When one looks at the capacities that exist effectively unlimited amount of communications data, which of course includes a vast amount of data for people who are of no interest to the authorities whatsoever. The proportionality balance has to move, so instead of looking at the proportionality of an individual interference, you need to look at the proportionality of a programme as a whole and that s a very different kind of proportionality analysis. What it requires and I don t for a minute dispute that there may be a legitimate argument that counterterrorism objectives could justify the complete abrogation of the right to privacy on the internet, but that s a big debate. It s a huge debate to have. Are we prepared as a society to do away altogether with the right to privacy of communications, which are now the only way globally the only way by which people exchange information and ideas? The basic thrust of the report is this: if we are to do that, as societies, as governments, as parliaments, we need to be absolutely transparent about what we are doing and when I say transparent, assume that there are limits on the operational and technical data that can be put into the public domain, but we do need to be much more transparent with the public about the justification that is being advised.

6 Mass Surveillance, Counterterrorism and Privacy: The Way Forward With great respect to those who gave evidence to the ISC, from services, their evidence was of an extraordinarily generic kind and I think those associated with the services do privately acknowledge that there is an obligation now to put much, much more detail into the public domain, to make the case and if the case is to be made, then again, under article 17 there is an obligation to have detailed laws which precisely justify the techniques that are being used. Last word: the great advantage of a parliamentary process of enacting specific legislation, which make specific provision and explains to the public exactly what is being done in their name is not only that it satisfies the lawfulness requirement, the requirement of the international law, that this type of thing needs to be regulated by law, but just as importantly, on what is after all a very important issue, it enables the Governments of the day to persuade the public that there is a justification for what they are doing. In the end, in order to justify these programmes as proportionate on that macro level, because there is after all no individual specific proportionality analysis to be conducted, where you re drag netting vast amounts of data from an unidentified number of people, the only way to really justify this proportionate is if states are in a position to persuade their electorates that the total abrogation of the right to privacy is justified on counterterrorism grounds, so as to make it proportionate to have the capacity to survey, read, monitor the communications of a potentially infinite number of innocent people anywhere in the world. Patricia Lewis Thank you, Ben. Sir Malcolm is member of parliament for Kensington and Chelsea, chairman of the British Intelligence and Security Committee. Sir Malcolm has been an elected member of parliament since 1974, defence secretary from 1992-1995, foreign secretary from 1995-1997, he is one of only four ministers who have served through the whole prime ministerships of both Margaret Thatcher and John Major and he is currently on the top level group of UK Parliamentarians for Nuclear Disarmament and Arm Proliferation and is a member of the European Leadership Network executive board. Malcolm, it s great to have you back. Transparency, oversight, proportionality, right to privacy, it s all your normal daily. Sir Malcolm Rifkind Thank you very much. Can I begin by just making two general points? First of all, I actually agree with a great deal of what Ben has said both in his report and what he has said this evening. Secondly, the Intelligence and Security Committee, which I chair is currently carrying out an inquiry into privacy and security, the very issues that we are discussing this evening. As we have not yet come to any conclusions, you will hear my personal views. They are not the views of the committee, because the committee has not yet come to that stage. I think in order to make this as interesting as possible, let me concentrate on what I disagree with the report and what has been said this evening. First of all, the case starts from the use of the phrase mass surveillance. It s quite important to know what we re talking about when that phrase is used. It has slightly Orwellian tones to it. It implies that

7 Mass Surveillance, Counterterrorism and Privacy: The Way Forward every single person in this room is likely to be having their emails and their telephone communications listened to by someone in DSHQ or in one of the other intelligence agencies. I m not saying that s what s alleged, but that s the implication of the term mass surveillance. There s a very great difference between democratic societies, such as Britain, most of Western Europe, United States and authoritarian countries, like Russia and China. Their surveillance systems are used to try and identify political opposition, to try and identify those who might wish to change the government and they are quite open about that. Not that they admit it, but they certainly take much effort to conceal it and the very way in which the Chinese take effort to control the internet to prevent access by their population just has no parallel in Western society. Let s be quite clear: our intelligence agencies I don t think I m saying anything controversial have not the remotest interest in the emails or the telephone communications or the political opinions of the vast majority of the British public or indeed elsewhere in the world. They have no interest in it. They don t have the resources to involve themselves in mass surveillance if it implied the whole population, nor do they have the time to do it, nor would they be keeping the law if they tried to do it. They would be breaking the law and would be subject to criminal sanction. What we re actually talking about is certainly a capability that has developed in recent years, to have access to quite large numbers of emails or voice communications if that s what you want to do and if you get a lawful authority to do it for a specific purpose. The purpose is primarily counterterrorism at this point in time, but it also includes serious crime or paedophilia or other matters of very serious public interest. What Ben in his report says and what many of the critics say is we have no objection to targeted intrusion if there s a particular individual who s believed to be a possible terrorist or an actual terrorist and you want to look at his emails, even then you have a lawful authority. You have to get a warrant from the secretary of state to read anyone s email in the UK, British citizen or non-british citizen if they re in this island. That s fine. That s not too controversial. What happens? How do the intelligence agencies and the security forces go about preventing terrorism or capturing terrorists if they are limited to only looking at those that they already know or suspect to be serious terrorists? The reality is there are a substantial number of people in this country or in other countries who mean harm to others, who either aren t known to the intelligence agencies or don t become known until they ve already committed a terrorist act? What we re talking about is not targeted intrusion or mass surveillance. What we re actually talking about is two kinds of targeted intrusion. The simple kind, when you already know who you re looking for and you get authority to look at the person s email or listen to their voice communications, but equally irrelevant and it s a form of targeting is how do you identify from a much larger group of people who might be the bad guys who are meaning to carry out let us say terrorist acts. When it is said that the intelligence agencies in Western countries have a capability to look at very large numbers of emails, that s true, but what do we mean by look at?

8 Mass Surveillance, Counterterrorism and Privacy: The Way Forward I think it s important to point out that what actually happens when you have what is called bulk interception is that incredibly sophisticated computers are processed to look for certain selectors and that selector might be an email address or it might be a reference to jihadi terrorism or it might be some other phrase or sentence or word that has connotations of being a bad guy. The computers, without any single person being involved, reject the 99.9999 per cent of the limited number they are looking at. They reject them all, they are never seen again. No human eye has ever looked at the content, has read the emails of those concerned. It picks out what is usually a tiny fraction where these selectors that I mentioned do give a prima facie indication that something bad might be happening, that this might be an email from a terrorist in Yemen to a radicalized youngster in Birmingham who wants ideas or organizational plans or whatever. When the agencies get the indication of the tiny number that the computer, not a person, has identified through these selectors, then if GCHQ or MI6 or MI5 want to read the content of that email or listen to the conversation, they then have to get a warrant from the secretary of state. A warrant from the secretary of state doesn t mean just picking out the phone and saying, Can I please have permission? Yes, by all means go ahead. We ve inspected these warrants. We ve seen many examples of them. They re five or six pages long. They re full of questions like exactly the points that Ben has raised, proportionality, is the intrusion of this person s privacy justified by what you think you might obtain, why are you interested in this email in the first place, what is it about what you ve already learned that makes you suspicious? One of the things I personally believe is that we should be publishing examples of what these warrants look like, because they d give a lot of reassurance to the public, as they have to me personally. This isn t some... well, indeed, when I was foreign secretary I actually had to approve some of these warrants. That was part of my job as foreign secretary. The home secretary does the same for MI5 and a lot of effort goes into each individual one, so I think we ought to ask ourselves that when you hear references to bulk interception or mass surveillance, it does not imply an indiscriminate access to respectable people s emails or telephone communications. By access we mean not that the computer s programmed to look for selectors, but that they re actually being read. Ben quite rightly emphasized whatever you do, it has to have a legal basis and it s always remembering that our intelligence agencies are subject and they subject themselves not just to compliance with the intelligence services act and with [indiscernible], which is the main legislation, but also what people perhaps are less aware, the Human Rights Act. I know for a fact that our intelligence agencies are stuffed with lawyers nowadays. 30 years ago they didn t have any. Now you hardly can run around the building without bumping into one. What these lawyers are looking for is not just are they observing the legal requirements as laid down in the main acts of parliament, but whether they are complying with the European Convention on Human Rights or our Human Rights Act.

9 Mass Surveillance, Counterterrorism and Privacy: The Way Forward These are judgments that have to be made. I m not saying they always get it right, of course. That s what courts are for. Occasionally, the courts might disagree if they ever came before the court, but I am absolutely convinced that our intelligence agencies and the people who run them strive to operate under the law. There is additional question: is that law itself satisfactory? Does it need to be modernized? Has it kept up with technological change? That s what the committee I chair is looking at and other people are looking at and there s a separate question whether we should have more transparency, so that many things can be shared with the public, but of course you can t share them with the British public without sharing with the rest of the world, including the bad guys. So you actually have to be able to identify and there is a lot of examples of things that could be made public without any risk to national security, but don t expect that to be other than a modest proportion of what our intelligence agencies do, because at the end of the day they are secret intelligence agencies and you cannot reveal secrets to the British public without revealing them to the rest of the world. So we have a healthy debate. We re a lucky country. Ben mentioned how British public opinion is slightly more supportive of the intelligence agencies. It s because of Bletchley Park. It s not just James Bond. It s because the single greatest intelligence triumph of any country was Bletchley Park in the Second World War, when we got the German Naval Codes. Remember, this is very relevant to Snowden, what was crucial about Bletchley Park was not just that through the enigma, they broke these Naval Codes and knew what the German Navy in Berlin, the messages that were being sent to [indiscernible] in the Atlantic. It s not only that they broke these codes. It s that for three years the Germans didn t know they d broken the codes. If they had known them, of course they would ve changed the system over night and that s a sort of damaged Snowden. Many of his allegations are rubbish. Some of the things he said may be true, but don t assume because they re true, it was right to make some of them public and that is, I think, the dilemma we re all dealing with. Thank you.