Understanding digital intelligence from a British Perspective

The Snowden revelations revealed much that was never intended to be public. But to understand them they must be seen in their context, of a dynamic interaction over the last few years between the demand for intelligence on the threats to society and the potential supply of relevant intelligence from digital sources. All intelligence communities, large and small, and including those hostile to our interests, have been facing this set of challenges and opportunities.

First let's look at the challenge of meeting insistent demands for secret intelligence. For the UK this is, for example, to counter cyber security threats and provide actionable intelligence about the identities, associations, location, movements, financing and intentions of terrorists, especially after 9/11, as well as dictators, insurgents, and cyber, narco and other criminal gangs. The threats such people represent are real and in many respects are getting worse and spreading.

216004e7-4a93-49fd-8814-a57143ca4189.pngThese demands for intelligence have coincided with a digital revolution in the way we communicate and store information. The Internet is a transformative technology, but is only viable because our personal information can be harvested by the private sector, monetized and used for marketing. So the digital age is able to supply intelligence about people, for example by accessing digital communications, social media and digital databases of personal information. And for intelligence communities, new methods of supply call forth new demands from the police and security authorities that could not have been met before the digital age. And their insistent demands for intelligence to keep us safe call forth ever more ingenious ways of extracting intelligence from digital sources.

For the democracies (but not for others such as the Russians and Chinese), there is an essential third force in operation: applying the safeguards needed to ensure ethical behaviour in accordance with modern views of human rights, including respect for personal privacy. For the UK, the legal framework for GCHQ is given in:

The Intelligence Services Act 1994 Article 3 confers on GCHQ the functions of intelligence-gathering and information assurance with the sole purposes of national security, prevention and detection of serious crime and safeguarding the economic well-being of the UK from actions of persons overseas; Article 4 relates to obtaining and disclosing information.

The Regulation of Investigative Powers Act 2000 outlines the powers of the Secretary of State to issue a warrant to make interception legal

The Human Rights Act 1998 including incorporating a 'necessity and proportionality' test to everything GCHQ does.

Like some elementary experiment in mechanics the resultant of these forces of demand, of supply and of legal constraints and public attitudes will determine the future path of our intelligence communities. 

Into that force field blundered the idealistic Edward Snowden, the Wikileaks-supporting information campaigners Poitras and Greenwald, plus a posse of respectable journalists. Some are tempted to see Snowden as a whistleblower. But he certainly did not meet the three essential conditions for a legitimate whistleblower as far as the UK is concerned. He did not expose UK wrongdoing, he did not exhaust his remedies before going public, and he did not act proportionately by stealing and leaking so many secrets (including 58,000 British intelligence top-secret documents) to make his main case against the US National Security Agency's collection of metadata on the communications of US citizens.

Close examination has shown that there is no scandal over illegal interception, or other unlawful intelligence activity, by GCHQ. The three elements of the 'triple lock' on GCHQ's activities – the Foreign Secretary's authorisations, the oversight by the Parliamentary Intelligence and Security Committee (ISC), and the legal compliance by the independent UK Interception Commissioner and the independent Investigative Powers Tribunal – have each separately concluded everything GCHQ does is properly authorized, and legally properly justified including under Article 8 of the European Human Rights convention regarding personal privacy.

The documents from these different oversight bodies are well worth reading for the unparalleled detail they provide into how interception by the UK authorities is authorized, carried out and audited so as to be always within the law:

  • The ISC Report.
  • The Interception Commissioner's Annual Report for 2013.
  • The Investigative Powers Tribunal Judgement.
  • The Foreign Secretary's Statement.

The Home Secretary has also described her role in authorizing legal interception of UK communications, including by GCHQ. The inescapable conclusion from these documents is that GCHQ operates entirely within the law, including the 1998 Human Rights Act and therefore the European Charter of Human Rights in respect of freedom of expression and personal privacy.

What Snowden and his supporters have failed to do therefore is to distinguish bulk access by computers to the Internet, which the US and UK, France, Germany, Sweden and many other nations certainly do have and so-called 'mass surveillance'. Mass surveillance implies observers who are monitoring the population or a large part of it. As the ISC, the UK Interception Commissioner and the IPT confirm, no such mass surveillance takes place by GCHQ; it would be unlawful if it did.

We would be well advised not to have blind trust in the benevolence of any government. 'Trust but verify' should be the motto. With increasingly robust executive, Parliamentary and judicial oversight and publication of the results of their work we can and must ensure those tools will only be used in lawful ways that do not infringe beyond reasonable necessity our right to privacy for personal and family life or impose unconscionable moral hazard.   matthewaid

« South Africa: Serious About Cyberwarfare
NSA Penetrating North Korea with Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

Aricoma

Aricoma

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe.

Farsight Security

Farsight Security

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing.

DeepCyber

DeepCyber

DeepCyber supports its customers, with an “intelligence-driven” approach, to improve their proactive detection and response "capability" of cyber threats.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

Ministry of Electronics & Information Technology (MeitY)

Ministry of Electronics & Information Technology (MeitY)

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Cybastion

Cybastion

Cybastion develops robust world-class cybersecurity solutions tailored to suit the needs of different businesses, governments and public sector entities.

SyberFort

SyberFort

SyberFort offers a suite of SAAS-based platforms designed to fortify your digital defenses including Threat Intelligence and Brand Protection.