The Blacklist – how to go on the run

Recently I did this interview for BBC Click to promote the third series of the excellent US spy series “The Blacklist”:

How to go on the run from Annie Machon on Vimeo.
The series is apparently huge in the USA – and I can see why, as it is good – but little known to date in the UK.

Thought police

Here is the full interview I did recently for RT about the announcement of a new section of the UK Metropolitan Police dedicated to hunting down “internet trolls”.

And here is the clip used in the interview:

Thought Police from Annie Machon on Vimeo.

The Nice terror attack

Here is an interview I did in the middle of the night for RT about the Nice terrorist lorry attack:

And here is the article I mentioned about the French spy chief warning that the next problematic episode could lead to civil unrest/war.

Fight for your Right to Privacy

A recent talk I gave to the excellent conference in beautiful Montenegro:

Annie Machon at SparkMe conference 2016 from Annie Machon on Vimeo.

Defending Human Rights in a Digital Age

This is an (abbreviated) version of my contribution to a panel discussion about human rights in a digital age, hosted last December by Professor Marianne Franklin and Goldsmiths University in London:

Goldsmiths University Privacy Discussion, December 2015 from Annie Machon on Vimeo.

Parliamentary Evidence on the UK Investigatory Powers Bill

My written evidence to the Scrutiny Committee in the UK Houses of Parliament that is currently examining the much-disputed Investigatory Powers Bill (IP):

1. My name is Annie Machon and I worked as an intelligence officer for the UK’s domestic Security Service, commonly referred to as MI5, from early 1991 until late 1996. I resigned to help my partner at the time, fellow intelligence officer David Shayler, expose a number of instances of crime and incompetence we had witnessed during our time in the service.

2. I note that the draft IP Bill repeatedly emphasises the importance of democratic and judicial oversight of the various categories of intrusive intelligence gathering by establishing an Investigatory Powers Commissioner as well as supporting Judicial Commissioners. However, I am concerned about the real and meaningful application of this oversight.

3. While in the Service in the 1990s we were governed by the terms of the Interception of Communications Act 1985 (IOCA), the precursor to RIPA, which provided for a similar system of applications for a warrant and ministerial oversight.

4. I would like to submit evidence that the system did not work and could be manipulated from the inside.

5. I am aware of at least two instances of this during my time in the service, which were cleared for publication by MI5 in my 2005 book about the Shayler case, “Spies Lies, and Whistleblowers”, so my discussing them now is not in breach of the Official Secrets Act. I would be happy to provide further evidence, either written or in person, about these abuses.

6. My concern about this draft Bill is that while the oversight provisions seem to be strengthened, with approval necessary from both the Secretary of State and a Judicial Commissioner, the interior process of application for warrants will still remain opaque and open to manipulation within the intelligence agencies.

7. The application process for a warrant governing interception or interference involved a case being made in writing by the intelligence officer in charge of an investigation. This then went through four layers of management, with all the usual redactions and finessing, before a final summary was drafted by H Branch, signed by the DDG, and then dispatched to the Secretary of State. So the minister was only ever presented with was a summary of a summary of a summary of a summary of the original intelligence case.

8. Additionally, the original intelligence case could be erroneous and misleading. The process of writing the warrant application was merely a tick box exercise, and officers would routinely note that such intelligence could only be obtained by such intrusive methods, rather than exploring all open source options first. The revalidation process could be even more cavalier.

9. When problems with this system were voiced, officers were told to not rock the boat and just follow orders. During the annual visit by the Intelligence Intercept Commissioner, those with concerns were banned from meeting him.

10. Thus I have concerns about the realistic power of the oversight provisions written into this Bill and would urge an additional provision. This would establish an effective channel whereby officers with concerns can give evidence directly and in confidence to the Investigatory Powers Commissioner in the expectation that a proper investigation will be conducted and with no repercussions to their careers inside the agencies. Here is a link to a short video I did for Oxford University three years ago outlining these proposals:

11. This, in my view, would be a win-win scenario for all concerned. The agencies would have a chance to improve their work practices, learn from mistakes, and better protect national security, as well as avoiding the scandal and embarrassment of any future whistleblowing scandals; the officers with ethical concerns would not be placed in the invidious position of either becoming complicit in potentially illegal acts by “just following orders” or risking the loss of their careers and liberty by going public about their concerns.

12. I would also like to raise the proportionality issue. It strikes me that bulk intercept must surely be disproportionate within a functioning and free democracy, and indeed can actually harm national security. Why? Because the useful, indeed crucial, intelligence on targets and their associates is lost in the tsunami of available information. Indeed this seems to have been the conclusion of every inquiry about the recent spate of “lone wolf” and ISIS-inspired attacks across the West – the targets were all vaguely known to the authorities but resources were spread too thinly.

13. In fact all that bulk collection seems to provide is confirmation after the fact of a suspect’s involvement in a specific incident, which is surely specifically police evidential work. Yet the justification for the invasive intercept and interference measures laid out in the Bill itself is to gather vital information ahead of an attack in order to prevent it – the very definition of intelligence. How is this possible if the sheer scale of bulk collection drowns out the vital nuggets of intelligence?

14. Finally, I would like to raise the point that the phrase “national security” has never been defined for legal purposes in the UK. Surely this should be the very first step necessary before formulating the proposed IP Bill? Until we have such a legal definition, how can we formulate new and intrusive laws in the name of protecting an undefined and nebulous concept, and how can we judge that the new law will thereby be proportionate within a democracy?

Webstock in New Zealand

Webstock_2016_2I just want to say a huge thank you to the organisers of the 10th Webstock Festival in New Zealand earlier this month – definitely worth the interminable flights.

This is a tech-focused conference that very much looks at the bigger picture and joins a whole number of different societal dots.

Plus they look after their “inspirational speakers” exceedingly well, with scary coach trips out of Wellington and up the cliffs, a chance to appreciate the finer aspects of bowling at a NZ working men’s club, and a rip-roaring party at the end of the festival. It was great to have the time to chat with so many amazing people.

Oh, and I experienced my first earthquake – 5.7 on the Richter Scale. Slightly distant, but still impressive when you’re in a swaying 5th floor hotel room.  I initially thought a bomb might have gone off in the basement….  Thankfully, NZ hotels are made of pliable, if stern, stuff.

I was also shunted on to Radio New Zealand for a half hour interview, discussing whistleblowers, spies, drugs and surveillance.  Here it is – it was fun to do – so thank you NZ.

The Dark Web – interview on TRT World

Here’s a recent interview I did for “The Newsmakers” programme on TRT World, discussing the Dark Web and privacy:

The Newsmakers, TRT World, Turkey from Annie Machon on Vimeo.

The aftermath of Paris – Going Underground

Here’s a recent interview I did on RT’s Going Underground about the aftermath of the Paris attacks:

RT_Going_Underground_After_the_Paris_Attacks from Annie Machon on Vimeo.

Freedom Equals Surveillance

Here’s an interview I did for RT a while ago about the USA’s Orwellian NewSpeak about surveillance:

US_Freedom_Act_surveillance_act_in_disguise from Annie Machon on Vimeo.

Karma Police

As I type this I am listening to one of my all-time favourite albums, Radiohead’s seminal “OK, Computer”, that was released in spring 1997. The first time I heard it I was spellbound by its edginess, complexity, experimentalism and political overtones. My partner at the time, David Shayler, took longer to get it. Self-admittedly tone deaf, he never understood what he laughingly called the “music conspiracy” where people just “got” a new album and played it to death.

ST_Spies_on_the_RunHis opinion changed drastically over the summer of ’97 after we had blown the whistle on a series of crimes committed by the UK’s spy agencies. As a result of our actions – the first reports appeared in the British media on 24 July 1997 – we had fled the country and gone on the run around Europe for a month. At the end of this surreal backpacking holiday I returned to the UK to face arrest, pack up our ransacked home, and try to comfort our traumatised families who had known nothing of our whistleblowing plans.

“OK, Computer” was the soundtrack to that month spent on the run across the Netherlands, Belgium, France and Spain. Taking random trains, moving from hotel to hotel, and using false names, our lives were dislocated and unreal. So in each hotel room we tried to recreate a sense of homeliness – some candles, a bottle of wine, natch, and some music. In the two small bags, into which I had packed the essentials for our unknown future life, I had managed to squeeze in my portable CD player (remember those?), tiny speakers and a few cherished CDs. Such are the priorities of youth.

The joy of Radiohead broke upon David during that month – particularly the track “Exit Music (for a Film)”, which encapsulated our feelings as we fled the UK together. Once we were holed up in a primitive French farmhouse for the year after our month on the run, this was the album that we listened to last thing at night, holding onto each other tightly to ward off the cold and fear. Revelling in the music, we also drew strength from the dissident tone of the lyrics.

So it was with some mirthful incredulity that I yesterday read on The Intercept that GCHQ named one of its most iniquitous programmes after one of the classic songs from the album – “Karma Police”.

In case you missed this, the basic premise of GCHQ was to develop a system that could snoop on all our web searches and thereby build up a profile of each of our lives online – our interests, our peccadilloes, our politics, our beliefs. The programme was developed between 2007 and 2008 and was deemed functional in 2009. Who knows what information GCHQ has sucked up about you, me, everyone, since then?

As I have said many times over the years since Snowden and who knows how many others began to expose the out-of-control spy agencies, this is disproportionate in soi-dissent democracies. It is certainly not lawful by any stretch of the imagination. UK governmental warrants – which are supposed to regulate and if necessary circumscribe the activities of the spy snoopers – have repeatedly been egregiously abused.

They are supposed to make a case for targeted surveillance of people suspected of being a threat to the UK’s national security or economic well-being. The warrants, blindly signed by the Home or Foreign Secretary, are not designed to authorise the industrial interception of everyone’s communications. This is a crime, plain and simple, and someone should be held to account.

Talking of crimes, after a month on the run with David, I returned (as I had always planned to do) to the UK. I knew that I would be arrested, purely on the grounds that I had been an MI5 officer and was David Shayler’s girlfriend and had supported his whistleblowing activities. In fact my lawyer, John Wadham who was the head of the UK’s civil liberties union, Liberty, had negotiated with the police for me return to the UK and hand myself into the police for questioning. He flew out to Barcelona to accompany me back to the UK almost exactly eighteen years ago today.

Annie_arrestDespite the pre-agreements, I was arrested at the immigration desk at Gatwick airport by six burly Special Branch police officers and then driven by them up to the counter-terrorism interview room in Charing Cross police station in central London, where I was interrogated for the maximum six hours before being released with no charge.

The music playing on the radio during this drive from the airport to my cell? Radiohead’s “Karma Police”.

One can but hope that karma will come into play. But perhaps the ending of “Exit Music…”  is currently more pertinent – we hope that you choke, that you choke…..

After all, the spies do seem to be choking on an overload of hoovered-up intelligence – pretty much every “ISIS-inspired” attack in the west over the last couple of years has reportedly been carried out by people who have long been on the radar of the spies.  Too much information can indeed be bad for our security, our privacy and our safety.

German Netzpolitik journalists investigated for treason

Press freedom is under threat in Germany – two journalists and their alleged source are under investigation for potential treason for disclosing and reporting what appears to be an illegal and secret plan to spy on German citizens. Here’s the interview I did for about this yesterday:

German Netzpolitik journalists face treason charges from Annie Machon on Vimeo.

Re:publica – The War on Concepts

This week I made my first visit to the re:publica annual geekfest in Berlin to do a talk called “The War on Concepts”. In my view this, to date, includes the four wars – on drugs, terror, the internet, and whistleblowers. No doubt the number will continue to rise.

Here’s the video:

republica_2015_Annie_Machon_The_War_on_Concepts from Annie Machon on Vimeo.

Code Red Media Launch in Perugia

I am very happy to announce a new initiative, Code Red,  that Simon Davies (the founder of Privacy International and The Big Brother Awards) and I have been organising over the last few months.  In fact, not just us, but a panoply of global privacy and anti-surveillance campaigners from many areas of expertise.

Simon and I have known each other for years, way back to 2002, when he gave one of the earliest Winston Awards to David Shayler, in recognition of his work towards trying to expose surveillance and protect privacy. That award ceremony, hosted by comedian and activist Mark Thomas, was one of the few bright points in that year for David and me – which included my nearly dying of meningitis in Paris and David’s voluntary return to the UK to “face the music”; face the inevitable arrest, trial and conviction for a breach of the Official Secrets Act that followed on from his disclosures about spy criminality.

Anyway, enough of a detour down memory lane – back to Code Red. Regular readers of this website will know that I have some slight interest in the need to protect our privacy for both personal reasons and societal good. Over the last 18 years since helping to expose the crimes of the British spies, I have worked with the media, lawyers, campaigners, hackers, NGOs, politicians, wonks, geeks, whistleblowers, and wonderfully concerned citizens around the world – all the time arguing against the encroaching and stealthy powers of the deep, secret state and beyond.

While many people are concerned about this threat to a democratic way of life, and in fact so many people try to push back, I know from experience the different pressures that can be exerted against each community, and the lack of awareness and meaningful communication that can often occur between such groups.

So when Simon posited the idea of Code Red – an organisation that can functionally bring all these disparate groups together, to learn from each other, gain strength and thereby work more effectively, it seemed an obvious next step.

Some progress has already been make in this direction, with international whistleblower conferences, cryptoparties, training for journalists about how to protect their sources, campaigns to protect whistleblowers, activist and media collectives, and much more.  We in Code Red recognise all this amazing work and are not trying to replicate it.

But we do want to do is improve the flow of communication – would it not be great to have a global clearing house, a record, of what works, what does not, a repository of expertise from all these inter-related disciplines from a round the world that we can all learn from?

This is one of the goals of Code Red, which launched to the media at the International Journalism Festival in Perugia a few weeks ago.  We were then lucky enough to also hold a launch to the tech/hacktivist community in Berlin a few days after at C Base – the mother-ship of hackers.

Here is the film of the Perugia launch:

Code Red – launched in Perugia, April 2015 from Annie Machon on Vimeo.