Feeds

Straw slams civil liberties lobby

Do you speak Gibberish?

  • alert
  • submit to reddit

3 Big data security analytics techniques

Foreign secretary Jack Straw launched a scathing attack on the civil liberties lobby in an interview on Radio 4 on Friday.

Mr Straw, who pushed through some pretty Draconian laws while home secretary, complained to the Today programme that he was held back by civil liberties groups and was forced to water down police and secret service surveillance powers (in the RIP and Terrorism Acts, to name two).

It was tied in with the US terrorist attacks of course. Mr Straw said: "It wasn't Big Brother government. It was government trying to put in place increased powers so we could preserve our democracy against this new type of threat. Now people are saying: 'Why are these terrorists here?'" Which somewhat underlines many people's views of Jack Straw.

The argument is that if the police had been allowed to decrypt every email sent in or through the UK, then we would have no terrorists in Britain - and that that is far preferable to the government being allowed to snoop into our private or commercial lives whenever they fancy.

Smarting

The government is smarting from revelations that terrorists - some connected to the US atrocities - are working in Britain and had/maybe-still-are using the UK as a base. Current home secretary David Blunkett has also gone to town by advocating ID cards - a frequent government solution to embarrassing matters that it can't control.

However, UK citizens have stepped into the argument using their weapons of logic and rational thought over political frustration, ill-informed evangelising and desire for power. Newsgroups have been buzzing with informed comment.

How exactly would extensive powers for the police to eavesdrop on every UK citizen have helped prevent the appalling attacks in the US?

Below are just a few comments we've seen:

"At the back end of the cold war, I was a party to several defence and intelligence policy studies that concluded that the new style threats that we would face would require a shift of resources from electronic to human intelligence assets in order to maintain effective defences. It would be interesting to look at the split of the UK intelligence budget between MI5/6 (spies) and GCHQ (electronics) over the last decade to see if any such shifts have taken place. I hope that Parliament will look into this once
the dust has settled."

"They [the terrorists] seem to have made some use of e-mail but it was all unencrypted and (without the benefit of hindsight) apparently innocuous. If I was involved in an undertaking with a thousandth as much at stake, I would want to look my confederates in the eye to see how they reacted to what I said."

"Both government and broadcasters have framed the debate as a platitudinous 'balance' between civil liberties and public safety. But this was always a false dichotomy - the main thrust of criticism against the RIP Act is that it is completely ineffective. Four methods have been suggested for dealing with criminal use of encryption. Three are fatally flawed, but more importantly, they try to solve to wrong problem."

"The problem is that no politician would have the guts to say that the chief object of policy was suborning commercial and institutional traffic."

"I don't think that any amount of signals intelligence, however intrusive, would have caught them. They were far too careful and especially too sparing in their use of telecommunications. More powers to intercept or to decrypt are simply barking up the wrong tree. In fact, without some infiltration of the organisation, I don't think there was anyway of catching them before they got to the airport."

"I do not blame the electronic intelligence agencies for what has happened since not even they can subvert the laws of physics."

"Attempts to blame those who fought against GAK in RIP are, in my view, attempts to divert attention from the real issue - why Jack Straw and his friends in law enforcement spent so much time on RIP instead of on other measures that would have stood more chance of success agianst the sort of attacks we have now experienced."

"Nobody seems to have mentioned the extreme loyalty within Arab groups - not just to families, but also to the leader of the group. This has been explained to me by several people who have worked out in the Middle East."

Mass attack

We have covered in the past how encrypted messages can easily be hidden from authorities - most simply by putting a second encrypted message within the first. The fact that the attacks happened without security services having the slightest idea would suggest a very small, compact group as opposed to a huge conspiracy.

Would mass surveillance locate such a group? The likelihood is minute. Then of course there is the implicit assumption that the terrorists were so stupid that they wrote huge swathes of what they intended in straightforward text and send all of it over the Internet in the form of emails.

Unless all of these assumptions are true, mass surveillance would be of very little help. There can little doubt that much of the organisation was done face-to-face, because that is simple human interaction. It is very hard to persuade someone to do something (like kill themselves) over email.

And when it comes down to fine details, how much information is needed to inform someone of which flight to board, or which embassy to bomb? None at all. Not in terms of the billions of bytes criss-crossing the Internet every second.

In short, where we have failed is in insufficient human interaction with dangerous people. Technology has the unnerving effect of making you believe that because you have so much information then you have captured everything you need to know. Nothing could be further from the truth.

If all this intended surveillance had no palpable effect on commercially sensitive information; didn't mean that the authorities would have unreasonable access to your personal details; wouldn't allow for simple abuses and threats, we would welcome it.

But it does and we don't. ®

Related Stories

Broader surveillance won't prevent terrorism -Schneier
Internet Security: We're all responsible
Brits want ID cards, not worried about privacy
Americans want Uncryption

High performance access to file storage

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.