THESE VITAL SPEECHES
4mSoSJ
4mSoSJ
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
evade detection. Technology companies<br />
focus on privacy and the need to ensure<br />
that for their customers.<br />
They each accuse the other of ignoring<br />
the vital public interest they are<br />
protecting.<br />
The reality is they both have a point.<br />
We all want powerful world class<br />
encryption to keep our data secure.<br />
Encryption is a vital tool in defending<br />
ourselves against cyber crime.<br />
But we have to face the fact that<br />
terrorists and extremists also benefit<br />
from world-class encryption, keeping<br />
their identities and communications<br />
secure too.<br />
There’s nothing new here in principle.<br />
Every modern technological<br />
advance—guns, cars, telephones—has<br />
quickly been used by societies’ enemies.<br />
Intelligence agencies know that<br />
unbreakable encryption can’t be disinvented.<br />
So we find ourselves trying to do<br />
something subtle and sensitive and<br />
incredibly difficult: enjoying the huge<br />
benefits that powerful encryption gives<br />
us, while working to stop our enemies<br />
using this same technology against us.<br />
The big technology companies are<br />
transforming our lives.<br />
We trust these hugely influential<br />
private companies in part because they<br />
are private.<br />
The tech companies have a vital<br />
role—and a unique responsibility—to<br />
play their part in building the security<br />
that keeps us all free and safe.<br />
I think the gap that opened up post-<br />
Snowden is narrowing again.<br />
The next step is for all parties to find<br />
a collaborative way forward to benefit<br />
from the new technology while doing<br />
what we sensibly can to stop terrorists<br />
and others who would do us harm.<br />
That’s the sort of cooperation<br />
between the public and private sectors<br />
that’s needed in free societies where security<br />
underpins our privacy, our private<br />
enterprise and our liberal democracy.<br />
The appalling attacks in Paris show<br />
us exactly what is at stake.<br />
All that sounds fine in general terms<br />
But how to set clear limits on how the<br />
state and its security agencies acquire<br />
data and intercept communications?<br />
Say you don’t trust government<br />
and intelligence agencies. But you also<br />
don’t want to live in fear of further<br />
Paris-style attacks.<br />
You grudgingly accept that the<br />
agencies need to look at Internet data<br />
patterns to try to find and track networks<br />
like the Paris killers.<br />
You sit down to devise tough laws.<br />
You come up with something like this.<br />
• Privacy comes first! Exceptions<br />
allowed only when a minister decides<br />
that an intrusion is necessary and proportionate<br />
• Government computers can search<br />
the world’s data-oceans looking for suspicious<br />
patterns, but specific high-level<br />
authorisation is needed to access and<br />
track actual individuals<br />
• Tight vetting: only honest, trustworthy<br />
people do this work<br />
• Technical alarm bells if operators<br />
run improper data-searches<br />
• We share intelligence with other<br />
governments, but with extreme caution<br />
if those governments have a bad human<br />
rights record<br />
• All this within wider oversight by<br />
MPs and independent judges, and frequent<br />
spot-checks<br />
Checks and balances, counter-checks<br />
and counter-balances, at every level.<br />
The whole system is run by<br />
honourable, hard-working, careful<br />
people—people in fact just like you—<br />
doing their best.<br />
Guess what? That’s more or less what<br />
we have now.<br />
There’s never a good time for these<br />
debates. New laws passed in a rush after<br />
a major terror attack amid white-hot<br />
public anger won’t strike a wise, principled<br />
balance. The key thing is to find<br />
the time to think.<br />
This time David Anderson QC, the<br />
Independent Reviewer of Terrorism<br />
Legislation, has done just that, producing<br />
a magisterial report. The new Investigative<br />
Powers Bill before parliament is<br />
based squarely on his recommendations.<br />
It’s designed to strike a wise, principled<br />
balance, ensuring our privacy, and protecting<br />
our security.<br />
When you put all the powers of the<br />
agencies into one codified legal framework,<br />
the overall package might look<br />
39<br />
ominous, if not alarming.<br />
Do our agencies really need to be<br />
able to do all this?<br />
Some people say that all this state<br />
surveillance did not stop the Paris attacks,<br />
so what good does it do?<br />
There’s a very good answer to that<br />
one.<br />
No goalkeeper has a 100% record.<br />
Even the finest goalkeeper who makes<br />
save after save is beaten by a top-class<br />
shot or a freakish deflection. That does<br />
not make him or her a bad goalkeeper.<br />
Or make the very idea of goalkeeping<br />
redundant.<br />
I don’t want to downplay reasonable<br />
concerns.<br />
But let me put this as bluntly as I can.<br />
Technologies that empower us, empower<br />
our enemies.<br />
You link to anyone in the world. Anyone<br />
in the world links to you.<br />
The good news is that we can track<br />
down people like Jihadi John and ensure<br />
he can no longer brutalise and murder<br />
his captives.<br />
The bad news? You and your family<br />
are only a couple of clicks away from<br />
people who print 3D guns, or make<br />
synthetic drugs. Or from ISIS and Al<br />
Qaeda and paedophiles, all pumping out<br />
disgusting videos and propaganda.<br />
An acute policy dilemma. Is it better<br />
to shut down this ghastly material, even<br />
if you drive it on to new websites and<br />
deeper into the Dark Web? Or should<br />
we accept that this poison is in society’s<br />
bloodstream and quietly watch what’s<br />
happening and who might be infected?<br />
Public servants in the intelligence<br />
and security services face this dilemma<br />
every day.<br />
Your choice as free citizens here tonight<br />
is unambiguous and unrelenting.<br />
You can try to avoid reality. Reality<br />
will not try to avoid you.<br />
You can trust the skill and restraint<br />
of the people working day and night to<br />
protect you.<br />
Or you can pray that the people<br />
working day and night to destroy our societies<br />
don’t hit your town or your family.<br />
Today’s security means working with<br />
technology to guarantee huge areas of<br />
freedom for all of us, by making difficult<br />
compromises on the margins.<br />
CICERO 2016