Straw slams civil liberties lobby

Do you speak Gibberish?

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Foreign secretary Jack Straw launched a scathing attack on the civil liberties lobby in an interview on Radio 4 on Friday.

Mr Straw, who pushed through some pretty Draconian laws while home secretary, complained to the Today programme that he was held back by civil liberties groups and was forced to water down police and secret service surveillance powers (in the RIP and Terrorism Acts, to name two).

It was tied in with the US terrorist attacks of course. Mr Straw said: "It wasn't Big Brother government. It was government trying to put in place increased powers so we could preserve our democracy against this new type of threat. Now people are saying: 'Why are these terrorists here?'" Which somewhat underlines many people's views of Jack Straw.

The argument is that if the police had been allowed to decrypt every email sent in or through the UK, then we would have no terrorists in Britain - and that that is far preferable to the government being allowed to snoop into our private or commercial lives whenever they fancy.


The government is smarting from revelations that terrorists - some connected to the US atrocities - are working in Britain and had/maybe-still-are using the UK as a base. Current home secretary David Blunkett has also gone to town by advocating ID cards - a frequent government solution to embarrassing matters that it can't control.

However, UK citizens have stepped into the argument using their weapons of logic and rational thought over political frustration, ill-informed evangelising and desire for power. Newsgroups have been buzzing with informed comment.

How exactly would extensive powers for the police to eavesdrop on every UK citizen have helped prevent the appalling attacks in the US?

Below are just a few comments we've seen:

"At the back end of the cold war, I was a party to several defence and intelligence policy studies that concluded that the new style threats that we would face would require a shift of resources from electronic to human intelligence assets in order to maintain effective defences. It would be interesting to look at the split of the UK intelligence budget between MI5/6 (spies) and GCHQ (electronics) over the last decade to see if any such shifts have taken place. I hope that Parliament will look into this once
the dust has settled."

"They [the terrorists] seem to have made some use of e-mail but it was all unencrypted and (without the benefit of hindsight) apparently innocuous. If I was involved in an undertaking with a thousandth as much at stake, I would want to look my confederates in the eye to see how they reacted to what I said."

"Both government and broadcasters have framed the debate as a platitudinous 'balance' between civil liberties and public safety. But this was always a false dichotomy - the main thrust of criticism against the RIP Act is that it is completely ineffective. Four methods have been suggested for dealing with criminal use of encryption. Three are fatally flawed, but more importantly, they try to solve to wrong problem."

"The problem is that no politician would have the guts to say that the chief object of policy was suborning commercial and institutional traffic."

"I don't think that any amount of signals intelligence, however intrusive, would have caught them. They were far too careful and especially too sparing in their use of telecommunications. More powers to intercept or to decrypt are simply barking up the wrong tree. In fact, without some infiltration of the organisation, I don't think there was anyway of catching them before they got to the airport."

"I do not blame the electronic intelligence agencies for what has happened since not even they can subvert the laws of physics."

"Attempts to blame those who fought against GAK in RIP are, in my view, attempts to divert attention from the real issue - why Jack Straw and his friends in law enforcement spent so much time on RIP instead of on other measures that would have stood more chance of success agianst the sort of attacks we have now experienced."

"Nobody seems to have mentioned the extreme loyalty within Arab groups - not just to families, but also to the leader of the group. This has been explained to me by several people who have worked out in the Middle East."

Mass attack

We have covered in the past how encrypted messages can easily be hidden from authorities - most simply by putting a second encrypted message within the first. The fact that the attacks happened without security services having the slightest idea would suggest a very small, compact group as opposed to a huge conspiracy.

Would mass surveillance locate such a group? The likelihood is minute. Then of course there is the implicit assumption that the terrorists were so stupid that they wrote huge swathes of what they intended in straightforward text and send all of it over the Internet in the form of emails.

Unless all of these assumptions are true, mass surveillance would be of very little help. There can little doubt that much of the organisation was done face-to-face, because that is simple human interaction. It is very hard to persuade someone to do something (like kill themselves) over email.

And when it comes down to fine details, how much information is needed to inform someone of which flight to board, or which embassy to bomb? None at all. Not in terms of the billions of bytes criss-crossing the Internet every second.

In short, where we have failed is in insufficient human interaction with dangerous people. Technology has the unnerving effect of making you believe that because you have so much information then you have captured everything you need to know. Nothing could be further from the truth.

If all this intended surveillance had no palpable effect on commercially sensitive information; didn't mean that the authorities would have unreasonable access to your personal details; wouldn't allow for simple abuses and threats, we would welcome it.

But it does and we don't. ®

Related Stories

Broader surveillance won't prevent terrorism -Schneier
Internet Security: We're all responsible
Brits want ID cards, not worried about privacy
Americans want Uncryption

Build a business case: developing custom apps

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
Amazon says Hachette should lower ebook prices, pay authors more
Oh yeah ... and a 30% cut for Amazon to seal the deal
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Nintend-OH NO! Sorry, Mario – your profits are in another castle
Red-hatted mascot, red-colored logo, red-stained finance books
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
Feel free to BONK on the TUBE, says Transport for London
Plus: Almost NOBODY uses pay-by-bonk on buses - Visa
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
prev story


Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.