Parliamentary Evidence on the UK Investigatory Powers Bill

My writ­ten evid­ence to the Scru­tiny Com­mit­tee in the UK Houses of Par­lia­ment that is cur­rently examin­ing the much-dis­puted Invest­ig­at­ory Powers Bill (IP):

1. My name is Annie Machon and I worked as an intel­li­gence officer for the UK’s domest­ic Secur­ity Ser­vice, com­monly referred to as MI5, from early 1991 until late 1996. I resigned to help my part­ner at the time, fel­low intel­li­gence officer Dav­id Shayler, expose a num­ber of instances of crime and incom­pet­ence we had wit­nessed dur­ing our time in the service.

2. I note that the draft IP Bill repeatedly emphas­ises the import­ance of demo­crat­ic and judi­cial over­sight of the vari­ous cat­egor­ies of intrus­ive intel­li­gence gath­er­ing by estab­lish­ing an Invest­ig­at­ory Powers Com­mis­sion­er as well as sup­port­ing Judi­cial Com­mis­sion­ers. How­ever, I am con­cerned about the real and mean­ing­ful applic­a­tion of this oversight.

3. While in the Ser­vice in the 1990s we were gov­erned by the terms of the Inter­cep­tion of Com­mu­nic­a­tions Act 1985 (IOCA), the pre­curs­or to RIPA, which provided for a sim­il­ar sys­tem of applic­a­tions for a war­rant and min­is­teri­al oversight.

4. I would like to sub­mit evid­ence that the sys­tem did not work and could be manip­u­lated from the inside.

5. I am aware of at least two instances of this dur­ing my time in the ser­vice, which were cleared for pub­lic­a­tion by MI5 in my 2005 book about the Shayler case, “Spies Lies, and Whis­tleblowers”, so my dis­cuss­ing them now is not in breach of the Offi­cial Secrets Act. I would be happy to provide fur­ther evid­ence, either writ­ten or in per­son, about these abuses.

6. My con­cern about this draft Bill is that while the over­sight pro­vi­sions seem to be strengthened, with approv­al neces­sary from both the Sec­ret­ary of State and a Judi­cial Com­mis­sion­er, the interi­or pro­cess of applic­a­tion for war­rants will still remain opaque and open to manip­u­la­tion with­in the intel­li­gence agencies.

7. The applic­a­tion pro­cess for a war­rant gov­ern­ing inter­cep­tion or inter­fer­ence involved a case being made in writ­ing by the intel­li­gence officer in charge of an invest­ig­a­tion. This then went through four lay­ers of man­age­ment, with all the usu­al redac­tions and fin­ess­ing, before a final sum­mary was draf­ted by H Branch, signed by the DDG, and then dis­patched to the Sec­ret­ary of State. So the min­is­ter was only ever presen­ted with was a sum­mary of a sum­mary of a sum­mary of a sum­mary of the ori­gin­al intel­li­gence case.

8. Addi­tion­ally, the ori­gin­al intel­li­gence case could be erro­neous and mis­lead­ing. The pro­cess of writ­ing the war­rant applic­a­tion was merely a tick box exer­cise, and officers would routinely note that such intel­li­gence could only be obtained by such intrus­ive meth­ods, rather than explor­ing all open source options first. The reval­id­a­tion pro­cess could be even more cavalier.

9. When prob­lems with this sys­tem were voiced, officers were told to not rock the boat and just fol­low orders. Dur­ing the annu­al vis­it by the Intel­li­gence Inter­cept Com­mis­sion­er, those with con­cerns were banned from meet­ing him.

10. Thus I have con­cerns about the real­ist­ic power of the over­sight pro­vi­sions writ­ten into this Bill and would urge an addi­tion­al pro­vi­sion. This would estab­lish an effect­ive chan­nel whereby officers with con­cerns can give evid­ence dir­ectly and in con­fid­ence to the Invest­ig­at­ory Powers Com­mis­sion­er in the expect­a­tion that a prop­er invest­ig­a­tion will be con­duc­ted and with no reper­cus­sions to their careers inside the agen­cies. Here is a link to a short video I did for Oxford Uni­ver­sity three years ago out­lining these proposals:

11. This, in my view, would be a win-win scen­ario for all con­cerned. The agen­cies would have a chance to improve their work prac­tices, learn from mis­takes, and bet­ter pro­tect nation­al secur­ity, as well as avoid­ing the scan­dal and embar­rass­ment of any future whis­tleblow­ing scan­dals; the officers with eth­ic­al con­cerns would not be placed in the invi­di­ous pos­i­tion of either becom­ing com­pli­cit in poten­tially illeg­al acts by “just fol­low­ing orders” or risk­ing the loss of their careers and liberty by going pub­lic about their concerns.

12. I would also like to raise the pro­por­tion­al­ity issue. It strikes me that bulk inter­cept must surely be dis­pro­por­tion­ate with­in a func­tion­ing and free demo­cracy, and indeed can actu­ally harm nation­al secur­ity. Why? Because the use­ful, indeed cru­cial, intel­li­gence on tar­gets and their asso­ci­ates is lost in the tsunami of avail­able inform­a­tion. Indeed this seems to have been the con­clu­sion of every inquiry about the recent spate of “lone wolf” and ISIS-inspired attacks across the West – the tar­gets were all vaguely known to the author­it­ies but resources were spread too thinly.

13. In fact all that bulk col­lec­tion seems to provide is con­firm­a­tion after the fact of a sus­pect’s involve­ment in a spe­cif­ic incid­ent, which is surely spe­cific­ally police evid­en­tial work. Yet the jus­ti­fic­a­tion for the invas­ive inter­cept and inter­fer­ence meas­ures laid out in the Bill itself is to gath­er vital inform­a­tion ahead of an attack in order to pre­vent it – the very defin­i­tion of intel­li­gence. How is this pos­sible if the sheer scale of bulk col­lec­tion drowns out the vital nug­gets of intelligence?

14. Finally, I would like to raise the point that the phrase “nation­al secur­ity” has nev­er been defined for leg­al pur­poses in the UK. Surely this should be the very first step neces­sary before for­mu­lat­ing the pro­posed IP Bill? Until we have such a leg­al defin­i­tion, how can we for­mu­late new and intrus­ive laws in the name of pro­tect­ing an undefined and neb­u­lous concept, and how can we judge that the new law will thereby be pro­por­tion­ate with­in a democracy?

Webstock in New Zealand

Webstock_2016_2I just want to say a huge thank you to the organ­isers of the 10th Web­stock Fest­iv­al in New Zea­l­and earli­er this month — def­in­itely worth the inter­min­able flights.

This is a tech-focused con­fer­ence that very much looks at the big­ger pic­ture and joins a whole num­ber of dif­fer­ent soci­et­al dots.

Plus they look after their “inspir­a­tion­al speak­ers” exceed­ingly well, with scary coach trips out of Wel­ling­ton and up the cliffs, a chance to appre­ci­ate the finer aspects of bowl­ing at a NZ work­ing men’s club, and a rip-roar­ing party at the end of the fest­iv­al. It was great to have the time to chat with so many amaz­ing people.

Oh, and I exper­i­enced my first earth­quake — 5.7 on the Richter Scale. Slightly dis­tant, but still impress­ive when you’re in a sway­ing 5th floor hotel room.  I ini­tially thought a bomb might have gone off in the base­ment.…  Thank­fully, NZ hotels are made of pli­able, if stern, stuff.

I was also shunted on to Radio New Zea­l­and for a half hour inter­view, dis­cuss­ing whis­tleblowers, spies, drugs and sur­veil­lance.  Here it is — it was fun to do — so thank you NZ.

The Dark Web — interview on TRT World

Here’s a recent inter­view I did for “The News­makers” pro­gramme on TRT World, dis­cuss­ing the Dark Web and privacy:

The News­makers, TRT World, Tur­key from Annie Machon on Vimeo.

The aftermath of Paris — Going Underground

Here’s a recent inter­view I did on RT’s Going Under­ground about the after­math of the Par­is attacks:

RT_Going_Underground_After_the_Paris_Attacks from Annie Machon on Vimeo.

Freedom Equals Surveillance

Here’s an inter­view I did for RT a while ago about the USA’s Orwellian NewS­peak about surveillance:

US_Freedom_Act_surveillance_act_in_disguise from Annie Machon on Vimeo.

Karma Police

As I type this I am listen­ing to one of my all-time favour­ite albums, Radi­o­head’s sem­in­al “OK, Com­puter”, that was released in spring 1997. The first time I heard it I was spell­bound by its edgi­ness, com­plex­ity, exper­i­ment­al­ism and polit­ic­al over­tones. My part­ner at the time, Dav­id Shayler, took longer to get it. Self-admit­tedly tone deaf, he nev­er under­stood what he laugh­ingly called the “music con­spir­acy” where people just “got” a new album and played it to death.

ST_Spies_on_the_RunHis opin­ion changed drastic­ally over the sum­mer of ’97 after we had blown the whistle on a series of crimes com­mit­ted by the UK’s spy agen­cies. As a res­ult of our actions — the first reports appeared in the Brit­ish media on 24 July 1997 — we had fled the coun­try and gone on the run around Europe for a month. At the end of this sur­real back­pack­ing hol­i­day I returned to the UK to face arrest, pack up our ran­sacked home, and try to com­fort our trau­mat­ised fam­il­ies who had known noth­ing of our whis­tleblow­ing plans.

OK, Com­puter” was the soundtrack to that month spent on the run across the Neth­er­lands, Bel­gi­um, France and Spain. Tak­ing ran­dom trains, mov­ing from hotel to hotel, and using false names, our lives were dis­lo­cated and unreal. So in each hotel room we tried to recre­ate a sense of home­li­ness — some candles, a bottle of wine, natch, and some music. In the two small bags, into which I had packed the essen­tials for our unknown future life, I had man­aged to squeeze in my port­able CD play­er (remem­ber those?), tiny speak­ers and a few cher­ished CDs. Such are the pri­or­it­ies of youth.

The joy of Radi­o­head broke upon Dav­id dur­ing that month — par­tic­u­larly the track “Exit Music (for a Film)”, which encap­su­lated our feel­ings as we fled the UK togeth­er. Once we were holed up in a prim­it­ive French farm­house for the year after our month on the run, this was the album that we listened to last thing at night, hold­ing onto each oth­er tightly to ward off the cold and fear. Rev­el­ling in the music, we also drew strength from the dis­sid­ent tone of the lyrics.

So it was with some mirth­ful incredu­lity that I yes­ter­day read on The Inter­cept that GCHQ named one of its most ini­quit­ous pro­grammes after one of the clas­sic songs from the album — “Karma Police”.

In case you missed this, the basic premise of GCHQ was to devel­op a sys­tem that could snoop on all our web searches and thereby build up a pro­file of each of our lives online — our interests, our pec­ca­dilloes, our polit­ics, our beliefs. The pro­gramme was developed between 2007 and 2008 and was deemed func­tion­al in 2009. Who knows what inform­a­tion GCHQ has sucked up about you, me, every­one, since then?

As I have said many times over the years since Snowden and who knows how many oth­ers began to expose the out-of-con­trol spy agen­cies, this is dis­pro­por­tion­ate in soi-dis­ant demo­cra­cies. It is cer­tainly not law­ful by any stretch of the ima­gin­a­tion. UK gov­ern­ment­al war­rants — which are sup­posed to reg­u­late and if neces­sary cir­cum­scribe the activ­it­ies of the spy snoop­ers — have repeatedly been egre­giously abused.

They are sup­posed to make a case for tar­geted sur­veil­lance of people sus­pec­ted of being a threat to the UK’s nation­al secur­ity or eco­nom­ic well-being. The war­rants, blindly signed by the Home or For­eign Sec­ret­ary, are not designed to author­ise the indus­tri­al inter­cep­tion of every­one’s com­mu­nic­a­tions. This is a crime, plain and simple, and someone should be held to account.

Talk­ing of crimes, after a month on the run with Dav­id, I returned (as I had always planned to do) to the UK. I knew that I would be arres­ted, purely on the grounds that I had been an MI5 officer and was Dav­id Shayler­’s girl­friend and had sup­por­ted his whis­tleblow­ing activ­it­ies. In fact my law­yer, John Wadham who was the head of the UK’s civil liber­ties uni­on, Liberty, had nego­ti­ated with the police for my return to the UK and to hand myself into the police for ques­tion­ing. He flew out to Bar­celona to accom­pany me back to the UK almost exactly eight­een years ago today.

Annie_arrestDes­pite the pre-agree­ments, I was arres­ted at the immig­ra­tion desk at Gatwick air­port by six burly Spe­cial Branch police officers and then driv­en by them up to the counter-ter­ror­ism inter­view room in Char­ing Cross police sta­tion in cent­ral Lon­don, where I was inter­rog­ated for the max­im­um six hours before being released with no charge.

The music play­ing on the radio dur­ing this drive from the air­port to my cell? Radi­o­head’s “Karma Police”.

One can but hope that karma will come into play. But per­haps the end­ing of “Exit Music…”  is cur­rently more per­tin­ent — we hope that you choke, that you choke.….

After all, the spies do seem to be chok­ing on an over­load of hoovered-up intel­li­gence — pretty much every “ISIS-inspired” attack in the west over the last couple of years has reportedly been car­ried out by people who have long been on the radar of the spies.  Too much inform­a­tion can indeed be bad for our secur­ity, our pri­vacy and our safety.

German Netzpolitik journalists investigated for treason

Press free­dom is under threat in Ger­many — two journ­al­ists and their alleged source are under invest­ig­a­tion for poten­tial treas­on for dis­clos­ing and report­ing what appears to be an illeg­al and secret plan to spy on Ger­man cit­izens. Here’s the inter­view I did for RT​.com about this yesterday:

Ger­man Net­zpolitik journ­al­ists face treas­on charges from Annie Machon on Vimeo.

Re:publica — The War on Concepts

This week I made my first vis­it to the re:publica annu­al geek­fest in Ber­lin to do a talk called “The War on Con­cepts”. In my view this, to date, includes the four wars — on drugs, ter­ror, the inter­net, and whis­tleblowers. No doubt the num­ber will con­tin­ue to rise.

Here’s the video:

republica_2015_Annie_Machon_The_War_on_Concepts from Annie Machon on Vimeo.

Code Red Media Launch in Perugia

I am very happy to announce a new ini­ti­at­ive, Code Red,  that Simon Dav­ies (the founder of Pri­vacy Inter­na­tion­al and The Big Broth­er Awards) and I have been organ­ising over the last few months.  In fact, not just us, but a panoply of glob­al pri­vacy and anti-sur­veil­lance cam­paign­ers from many areas of expertise.

Simon and I have known each oth­er for years, way back to 2002, when he gave one of the earli­est Win­ston Awards to Dav­id Shayler, in recog­ni­tion of his work towards try­ing to expose sur­veil­lance and pro­tect pri­vacy. That award cere­mony, hos­ted by comedi­an and act­iv­ist Mark Thomas, was one of the few bright points in that year for Dav­id and me — which included my nearly dying of men­ingit­is in Par­is and Dav­id’s vol­un­tary return to the UK to “face the music”; face the inev­it­able arrest, tri­al and con­vic­tion for a breach of the Offi­cial Secrets Act that fol­lowed on from his dis­clos­ures about spy criminality.

Any­way, enough of a detour down memory lane — back to Code Red. Reg­u­lar read­ers of this web­site will know that I have some slight interest in the need to pro­tect our pri­vacy for both per­son­al reas­ons and soci­et­al good. Over the last 18 years since help­ing to expose the crimes of the Brit­ish spies, I have worked with the media, law­yers, cam­paign­ers, hack­ers, NGOs, politi­cians, wonks, geeks, whis­tleblowers, and won­der­fully con­cerned cit­izens around the world — all the time arguing against the encroach­ing and stealthy powers of the deep, secret state and beyond.

While many people are con­cerned about this threat to a demo­crat­ic way of life, and in fact so many people try to push back, I know from exper­i­ence the dif­fer­ent pres­sures that can be exer­ted against each com­munity, and the lack of aware­ness and mean­ing­ful com­mu­nic­a­tion that can often occur between such groups.

So when Simon pos­ited the idea of Code Red — an organ­isa­tion that can func­tion­ally bring all these dis­par­ate groups togeth­er, to learn from each oth­er, gain strength and thereby work more effect­ively, it seemed an obvi­ous next step.

Some pro­gress has already been make in this dir­ec­tion, with inter­na­tion­al whis­tleblower con­fer­ences, crypto­parties, train­ing for journ­al­ists about how to pro­tect their sources, cam­paigns to pro­tect whis­tleblowers, act­iv­ist and media col­lect­ives, and much more.  We in Code Red recog­nise all this amaz­ing work and are not try­ing to rep­lic­ate it.

But we do want to do is improve the flow of com­mu­nic­a­tion — would it not be great to have a glob­al clear­ing house, a record, of what works, what does not, a repos­it­ory of expert­ise from all these inter-related dis­cip­lines from a round the world that we can all learn from?

This is one of the goals of Code Red, which launched to the media at the Inter­na­tion­al Journ­al­ism Fest­iv­al in Per­u­gia a few weeks ago.  We were then lucky enough to also hold a launch to the tech/hacktivist com­munity in Ber­lin a few days after at C Base — the moth­er-ship of hackers.

Here is the film of the Per­u­gia launch:

Code Red — launched in Per­u­gia, April 2015 from Annie Machon on Vimeo.

Jihadi John and MI5

So this week the mur­der­ous behead­er of the Islam­ic State, “Jihadi John”, has been unmasked.  His real iden­tity is appar­ently Mohammed Emwazi, born in Kuwait and now a Brit­ish cit­izen who was raised and edu­cated in west London

Much sound, fury and heated debate has been expen­ded over the last couple of days about how he became rad­ic­al­ised, who was to blame, with MI5 once more cast in the role of vil­lain. In such media sound-bite dis­cus­sions it is all too easy to fall into facile and polar­ised argu­ments. Let us try to break this down and reach a more nuanced  understanding.

First up is the now-notori­ous press con­fer­ence hos­ted by the cam­paign­ing group, Cage, in which the Research Dir­ect­or, Asim Qure­shi , claimed that MI5 har­ass­ment of Emwazi was the reas­on for his rad­ic­al­isa­tion. Emwazi had com­plained to Cage and appar­ently the Met­ro­pol­it­an Police that over the last six years MI5 had approached him and was pres­sur­ising him to work as an agent for them. Accord­ing to Cage, this har­ass­ment lead to Emwazi’s radicalisation.

Yet recruit­ment of such agents is a core MI5 func­tion, some­thing it used to do with sub­tlety and some suc­cess, by identi­fy­ing people with­in groups who poten­tially could be vul­ner­able to induce­ments or pres­sure to report back on tar­get organ­isa­tions.  In fact, Brit­ish intel­li­gence used to be much more focused on gath­er­ing “HUMINT”.  The very best intel­li­gence comes from an (ideally) will­ing but at least co-oper­at­ive human agent: they are mobile, they can gain the trust of and con­verse with tar­gets who may be wary of using elec­tron­ic com­mu­nic­a­tions, and they can be tasked to gath­er spe­cif­ic intel­li­gence rather than wait­ing for the lucky hit on intercept.

MI5 used to be good at this — spend­ing time to really invest­ig­ate and identi­fy the right recruit­ment tar­gets, with a con­sidered approach towards mak­ing the pitch.

How­ever, it appears since 9/11 and the start of the bru­tal “war on ter­ror” that two prob­lems have evolved, both of which ori­gin­ated in Amer­ica. Firstly, Brit­ish intel­li­gence seems to have fol­lowed their US coun­ter­parts down a mor­al hel­ter-skel­ter, becom­ing re-involved in counter-pro­duct­ive and bru­tal activ­it­ies such as kid­nap­ping, intern­ment and tor­ture. As MI5 had learned at least by the 1990s, such activ­it­ies inev­it­ably res­ult in blow-back, and can act as a recruit­ing drum to the ter­ror­ist cause of the day.

(Tan­gen­tially, the Home Office also instig­ated the Pre­vent pro­gramme — in concept to counter rad­ic­al Islam in vul­ner­able social com­munit­ies, but in prac­tice used and abused by the author­it­ies to intim­id­ate and coerce young Muslims in the UK.)

Secondly, Brit­ish intel­li­gence seems over the last dec­ade to have blindly fol­lowed the US spies down the path of pan­op­tic­an, drag-net elec­tron­ic sur­veil­lance.  All this has been long sus­pec­ted by a few, but con­firmed to the many by the dis­clos­ures of Edward Snowden over the last couple of years. Indeed it seems that GCHQ is not merely com­pli­cit but an act­ive facil­it­at­or and ena­bler of the NSA’s wilder ideas.  And what we now know is hor­rif­ic enough, yet it cur­rently remains just the tip of the iceberg.

This deluge of inform­a­tion cre­ates gar­gan­tu­an hay­stacks with­in which some genu­ine intel­li­gence needles might reside — to use the ter­min­o­logy of the spy agency cheer­lead­ers. How­ever, it con­cur­rently swamps the intel­li­gence agen­cies in use­less inform­a­tion, while also cer­tainly throw­ing up a per­cent­age of false-pos­it­ives.  Bear­ing in mind the sheer scale of the leg­ally dubi­ous snoop­ing, even a 0.001% of false pos­it­ives could poten­tially pro­duce thou­sands of erro­neous leads.

Curi­ous people now have a world of inform­a­tion at their fin­ger­tips. They may click on an intriguing link and find them­selves on a rad­ic­al web­site; even if they click out quickly, the pan­op­ticon will have logged their “interest”. Or they could donate money to an appar­ently legit­im­ate char­ity; “like” the wrong thing on Face­book; fol­low the wrong per­son on Twit­ter; have their email hacked, or whatever.…

The Big Broth­er Borg algorithms will crunch through all of this inform­a­tion pre­dict­ably and pre­dict­ively, with sub­tleties lost and mis­takes made. Mind you, that happened in a more lim­ited fash­ion too at the height of the Cold War sub­ver­sion para­noia in Bri­tain in the 1970s and 1980s, when school­boys writ­ing to the Com­mun­ist Party HQ for inform­a­tion for school pro­jects could end up with a MI5 file, and divor­cing couples could denounce each oth­er.  But at least, then, whole pop­u­la­tions were not under surveillance.

I think this may go some way towards explain­ing so many recent cases where “lone wolf” attack­ers around the world have been known to their nation­al intel­li­gence agen­cies and yet been left to roam free, either dis­coun­ted as too low level a threat in the flood of inform­a­tion or oth­er­wise sub­jec­ted to bungled recruit­ment approaches.

In the ana­logue era much time, research and thought would go into identi­fy­ing per­sons of interest, and more cru­cially how to approach a tar­get either for dis­rup­tion or recruit­ment.  I should think that the spy super-com­puters are now throw­ing up so many pos­sible leads that approaches are made in a more hur­ried, ill-informed and less con­sidered way.

And this can res­ult in cases such as Michael Ade­bolayo whom MI5 approached and allegedly har­assed years before he went on to murder Drum­mer Lee Rigby in Wool­wich in 2013. The same may well have happened with Mohammed Emwazi. Once someone has been tar­geted, they are going to feel para­noid and under sur­veil­lance, wheth­er rightly or wrongly, and this might res­ult in grow­ing resent­ment and push them into ever more extreme views.

How­ever, I would sug­gest that MI5 remains merely the tool, fol­low­ing the dir­ect­ives of the UK gov­ern­ment in response to the ever-expand­ing, ever-neb­u­lous war on ter­ror, just as MI6 fol­lowed the dir­ect­ives of the Blair gov­ern­ment in 2003 when it allowed its intel­li­gence to be politi­cised as a pre­text for an illeg­al war in Iraq. MI5 might be an occa­sion­al cata­lyst, but not the under­ly­ing cause of radicalisation.

Unfor­tu­nately, by immers­ing itself in the now-over­whelm­ing intel­li­gence detail, it appears to be miss­ing the big­ger pic­ture — just why are young Brit­ish people tak­ing an interest in the events of the Middle East, why are so many angry, why are so many drawn to rad­ic­al views and some drawn to extreme actions.

Surely the simplest way to under­stand their griev­ances is to listen to what the extrem­ist groups actu­ally say? Osama Bin Laden was clear in his views — he wanted US mil­it­ary bases out of Saudi Ara­bia and US med­dling across the Middle East gen­er­ally to stop; he also wanted a res­ol­u­tion to the Palestini­an conflict.

Jihadi John states in his ghastly snuff videos that he is met­ing out hor­ror to high­light the hor­rors daily inflic­ted across the Middle East by the US mil­it­ary — the bomb­ings, drone strikes, viol­ent death and mutilation.

To hear this and under­stand is not to be a sym­path­iser, but is vital if west­ern gov­ern­ments want to devel­op a more intel­li­gent, con­sidered and poten­tially more suc­cess­ful policies in response. Once you under­stand, you can nego­ti­ate, and that is the only sane way for­ward. Viol­ence used to counter viol­ence always escal­ates the situ­ation and every­one suffers.

The USA still needs to learn this les­son. The UK had learned it, res­ult­ing in the end of the war in North­ern Ire­land, but it now seems to have been for­got­ten. It is not rock­et sci­ence — even the former head of MI5, Lady Man­ning­ham-Buller, has said nego­ti­ation is the only suc­cess­ful long-term policy when deal­ing with terrorism.

Along with the UK, many oth­er European coun­tries have suc­cess­fully nego­ti­ated their way out of long-run­ning domest­ic ter­ror­ist cam­paigns. The tragedy for European coun­tries that have recently or will soon suf­fer the new mod­el of “lone wolf” atro­cit­ies, is that our gov­ern­ments are still in thrall to the failed US for­eign policy of “the war on ter­ror”, repeated daily in gory tech­ni­col­our across North Africa, the Middle East, cent­ral Asia, and now Ukraine.

Glob­al jihad is the inev­it­able response to USA glob­al expan­sion­ism, hege­mony and aggres­sion. As long as our gov­ern­ments and intel­li­gence agen­cies in Europe kow­tow to Amer­ic­an stra­tegic interests rather than pro­tect those of their own cit­izens, all our coun­tries will remain at risk.

Sam Adams Award for Integrity in Intelligence, Berlin 2015

Last week in Ber­lin the 2015 Sam Adams Award for Integ­rity in Intel­li­gence was presen­ted to the former Tech­nic­al Dir­ect­or of the NSA, whis­tleblower and tire­less pri­vacy advoc­ate, Wil­li­am Bin­ney.

A 36-year intel­li­gence agency vet­er­an, Bill Bin­ney resigned from the NSA in 2001 and became a whis­tleblower after dis­cov­er­ing that ele­ments of a data-mon­it­or­ing pro­gramme he had helped devel­op were being used to spy on Amer­ic­ans.  He explained that he “could not stay after the NSA began pur­pose­fully viol­at­ing the Constitution”.

Bill remains tire­less, pledging to spend the remainder of his years speak­ing out across the world and work­ing to reform the gross gov­ern­ment­al illeg­al­ity and stu­pid­ity of inter­cept­ing tril­lions and tril­lions of com­mu­nic­a­tions of inno­cent people’s phone calls, emails and oth­er forms of data. Bill states “it’s viol­ated every­one’s rights. It can be used to spy on the whole world.”

The Sam Adams Asso­ci­ates decided to hold the cere­mony in Ber­lin as it is cur­rently a glob­al hub for pri­vacy-minded indi­vidu­als — journ­al­ists, film-makers, tech­no­lo­gists, whis­tleblowers and campaigners.

Binney_at_BundestagHis­tory has made Ger­many much more sens­it­ive to the need for basic rights, such as pri­vacy, than many oth­er soi dis­ant west­ern demo­cra­cies, and the dis­clos­ures of Edward Snowden, includ­ing the col­lu­sion of Ger­man intel­li­gence agen­cies with the NSA as well as the bug­ging of Chan­cel­lor Angela Merkel’s mobile phone, have caused out­rage across the country.

Plus, only last year Bill Bin­ney was invited to give evid­ence to the Ger­man Bundestag’s NSA Inquiry Commission.

SAA_Photo_Berlin_2015Whis­tleblowers, former intel­li­gence officers, mil­it­ary officers, dip­lo­mats and law­yers flew in from around the world to hon­our Bill Bin­ney. The Sam Adams Asso­ci­ates attend­ing the event were Ray McGov­ern (CIA), Todd Pierce (US mil­it­ary law­yer), Coleen Row­ley (FBI), Eliza­beth Mur­ray (US nation­al intel­li­gence coun­cil), Craig Mur­ray (UK ambas­sad­or), Kath­er­ine Gun (GCHQ), Tom Drake (NSA), Jes­selyn Radack (US DoJ), Dav­id MacMi­chael (CIA), and myself (MI5).

We were also pleased that Edward Snowden was able to join us via live link to give a  power­ful speech hon­our­ing Bill Binney.

So, here is the film of a won­der­fully touch­ing cere­mony, and con­grat­u­la­tions to Bill Bin­ney for the cour­age he has already demon­strated and con­tin­ues to display:

Sam Adams Award Ber­lin 2015 from Annie Machon on Vimeo.

And here we have the text of the award cita­tion to Bill Binney:

The Sam Adams Asso­ci­ates for Integ­rity in Intelligence

Presents its INTEGRITY AWARD for 2015 to:

Wil­li­am Binney

Know all ye by these presents that Wil­li­am Bin­ney is hereby honored with the tra­di­tion­al Sam Adams Corner-Bright­en­er Can­dle­stick Hold­er, in sym­bol­ic recog­ni­tion of Mr. Binney’s cour­age in shin­ing light into dark places.

Bill Bin­ney rep­res­ents the pat­ri­ot­ic side of a duel between two unequal adversar­ies: an exceed­ingly power­ful and ruth­less state and Bill, an offi­cial who would not break his sol­emn oath to defend its Con­sti­tu­tion.  Like Tom Drake and Ed Snowden, he was determ­ined to pre­serve his integ­rity, his pri­vacy, and his per­son­al honor.

On both sides of the Atlantic we hear the man­tra: “After 9/11/2001 EVERYTHING CHANGED;” just like “everything changed” after the burn­ing of the Reich­stag on 2/27/1933.  That event led many Ger­mans into what the writer Sebasti­an Haffn­er called “sheep­ish sub­missive­ness” — with dis­astrous consequences.

As a young Ger­man law­yer in Ber­lin at the time, Haffn­er wrote in his diary one day after the Reich­stag fire that Ger­mans had suffered a nervous break­down.  “No one saw any­thing out of the ordin­ary in the fact that, from now on, one’s tele­phone would be tapped, one’s let­ters opened, and one’s desk might be broken into.”

What was miss­ing, wrote Haffn­er, was “a sol­id inner ker­nel that can­not be shaken by extern­al pres­sures and forces, some­thing noble and steely, a reserve of pride, prin­ciple, and dig­nity to be drawn on in the hour or trial.”

We are grate­ful that these traits were NOT miss­ing in Bill Bin­ney.  Nor were they miss­ing in Edward Snowden, whose pat­ri­ot­ic risk-tak­ing opened the way for Bill and his col­leagues to expose the col­lect-it-all fan­at­ics and the dam­age they do to pri­vacy everywhere.

What Ed Snowden called “turn­key tyranny” can still be pre­ven­ted.  But this can only hap­pen, if pat­ri­ots like Bill Bin­ney can jolt enough people out of “sheep­ish sub­missive­ness.” Goethe under­stood this 200 years ago when he warned, “No one is more a slave than he who thinks him­self free, but is not.”

Niemand ist mehr Sklave, als der sich für frei hält, ohne es zu sein*.

Presen­ted this 22nd day of Janu­ary 2015 in Ber­lin by admirers of the example set by the late CIA ana­lyst, Sam Adams.

And finally, here are some extra inter­views from the night with Bill Bin­ney, Tom Drake, Jes­selyn Radack, and Coleen Rowley:

With thanks to Ber­lin Moscow on Unter den Linden and the Dreger Group for host­ing the event, to pro­fes­sion­al pho­to­graph­er Johanna Hul­lar for all her great pic­tures of the ceremony.

Turkish TV Interview

Here’s the first half of a long inter­view I did last month for the invest­ig­at­ive news pro­gramme in Tur­key, Yaz Boz, dis­cuss­ing all things whis­tleblower and tech security:

Yaz Boz — Turk­ish news Inter­view from Annie Machon on Vimeo.

Holistic security for journalists and sources — Logan Symposium

Here is a short talk I gave at the recent Logan Sym­posi­um in Lon­don, where I dis­cussed a more hol­ist­ic approach for both journ­al­ists and their sources:

The Logan Sym­posi­um — Dec 6th — Annie Machon from Annie Machon on Vimeo.

Swedish SVT TV Interview, November 2014

Here’s an inter­view I did while at the excel­lent Inter­net­dagarna con­fer­ence in Stock­holm last month.  It cov­ers all things whis­tleblower, going on the run, and spy accountability:

Inter­view on Swedish SVT TV, Novem­ber 2014 from Annie Machon on Vimeo.