The Spy Chiefs on Camera

Download Subtitles

Transcript

:00:00. > :00:07.Thank you. Good afternoon. You are watching BBC News. In just a few

:00:08. > :00:11.minutes, we will be following an unprecedented event. The heads of

:00:12. > :00:13.all three of Britain's intelligence agencies will be making that

:00:14. > :00:18.appearance before a committee of MPs and it is of course all televised

:00:19. > :00:23.which means we will be following it here.

:00:24. > :00:27.There is a two minute delay, just in case any matters of national

:00:28. > :00:30.security are mentioned, so we are two minutes behind in terms of what

:00:31. > :00:39.we are going to be showing you but the GCHQ director, Sir Iain Lobban,

:00:40. > :00:46.the MI5 director Sir Andrew Parker and the MI6 director will be quizzed

:00:47. > :00:50.by a committee of MPs. There has been some criticism in the past that

:00:51. > :00:54.the security agencies have not been held to account but Sir Malcolm

:00:55. > :01:01.Rifkind says that new rules mean that, for example, members of the

:01:02. > :01:02.ISC can send investigators into the intelligence agencies to carry out

:01:03. > :01:22.spot checks. Certainly a moment of theatre. On

:01:23. > :01:29.the other side of the Atlantic there is sometimes a snooze con ``

:01:30. > :01:32.problem, but there are serious questions here. We have to get to

:01:33. > :01:37.the bottom of where is the right balance in the spectrum between

:01:38. > :01:40.those who inhabit the world of secrecy and intelligence, that

:01:41. > :01:44.nothing should be revealed, and they should have maximum powers to

:01:45. > :01:49.investigate everything, and snoop and eavesdrop. On the other side,

:01:50. > :01:55.there are those who would say no, you can have maximum openness.

:01:56. > :01:58.Somewhere within that spectrum is the right part of the pendulum, and

:01:59. > :02:03.I hope we will get some kind of answer on that. I think the meeting

:02:04. > :02:06.was planned before the revelations by Edward Snowden came out in the

:02:07. > :02:13.Guardian and the New York Times, so it's been in the diary, but it has a

:02:14. > :02:17.new and more potent boost. When you look at the other two of the three

:02:18. > :02:24.people giving evidence today, is it perhaps Iain Lobban who we don't

:02:25. > :02:28.know much about, from GCHQ, who will be under more pressure in terms of

:02:29. > :02:35.what intelligence was shared with the prison programme? Definitely. He

:02:36. > :02:45.and his agency are the most secretive. They hardly give anything

:02:46. > :02:50.out the press. Yet they have 58,000 secret files missing that Snowden

:02:51. > :02:54.has taken with him. A vast amount of their operation, their tactics,

:02:55. > :03:01.names, all sorts of things are out there. Do you remember Mission

:03:02. > :03:06.impossible, the list in the opening, the secret list of

:03:07. > :03:12.operatives. It's a bit like that. But times 1000. People are very

:03:13. > :03:16.concerned about this. Supporters of Edward Snowden would say, look, he

:03:17. > :03:21.has started a valid debate because we have a right to know what is

:03:22. > :03:27.being eavesdropped on, why they are listening in on potentially your

:03:28. > :03:34.e`mails and conversations, because the extent of it, what was not known

:03:35. > :03:37.even to MPs, I would expect that we would see tough questions from the

:03:38. > :03:42.committee, because they have been a bit toothless in the past. They are

:03:43. > :03:47.still perceived as being a bit too close to the establishment. The

:03:48. > :03:50.chairman of the committee used to have authority over MI6 and GCHQ,

:03:51. > :03:59.Malcolm Rifkind when he was Foreign Secretary. They answered to him.

:04:00. > :04:05.Albeit in a different role now, he was a creature of the establishment.

:04:06. > :04:08.We will see whether it measures up to that robustness that people are

:04:09. > :04:12.searching for. It will be beginning very shortly, so Frank, talk is

:04:13. > :04:20.through the three men we see behind this. People may know less or more

:04:21. > :04:24.about all of them. Over in the left corner, overworked because his

:04:25. > :04:33.jacket is off, is Sir Iain Lobban, director of GCHQ in Cheltenham. It

:04:34. > :04:40.is basically a big round doughnut of a building. They are conducting the

:04:41. > :04:45.Britain `` British defence against cyber espionage, but also proactive

:04:46. > :04:50.cyber operations as well. In the middle is Andrew Parker, the only

:04:51. > :04:53.one without a knighthood, and he has become the general director of MI5,

:04:54. > :04:59.the Security service, at Thames house in London. He has been in the

:05:00. > :05:05.service for over 30 years and was formerly deputy director. On the

:05:06. > :05:09.right is Sir John Sawers, the chief of MI6, the secret intelligence

:05:10. > :05:17.service, also with headquarters in London. They do the overseas spying.

:05:18. > :05:22.He is a former diplomat. He has book ended it. He started in MI6, then

:05:23. > :05:25.moved quickly. We will interrupt, Buddhist has just started. ``

:05:26. > :05:34.because it has just started. This session, which has a committee

:05:35. > :05:40.we first considered a year ago, is a significant step forward in the

:05:41. > :05:44.transparency of our intelligence agencies. Having an open

:05:45. > :05:51.parliamentary evidence session will be, I believe, a real dash of real

:05:52. > :05:54.value. We will not be asking witnesses to reveal secret

:05:55. > :05:58.information published `` of real value. Nor will we be able to

:05:59. > :06:03.discuss the current investigation into the tragic death of Lee Rigby

:06:04. > :06:06.in Woolwich, in May, because we cannot prejudice the trials of the

:06:07. > :06:12.accused taking place in the near future. The intelligence and

:06:13. > :06:15.Security committee with its new powers investigates the operations

:06:16. > :06:20.and scrutinises the capabilities of the intelligence agencies. Those

:06:21. > :06:24.sessions are held behind closed doors and must remain secret. This

:06:25. > :06:30.evidence session is being broadcast with a short time delay. This is a

:06:31. > :06:35.safety mechanism to allow us to pause the broadcast if anything is

:06:36. > :06:38.inadvertently mentioned which might endanger national security, or the

:06:39. > :06:43.safety of those involved in safeguarding it. I don't expect we

:06:44. > :06:48.shall need to use it, but as with the Iraq enquiry, this is a

:06:49. > :06:53.precaution. If I do need to suspend the session, we will resume as

:06:54. > :06:58.quickly as we can. Today's open session, being the first`ever

:06:59. > :07:04.Wimbledon examination of a number of issues in `` being the first ever

:07:05. > :07:08.will involve examination of a number of issues. It will include

:07:09. > :07:11.controversies, the threats the agency 's work to counter, the

:07:12. > :07:15.threats faced in the performance of duties. The legal and policy

:07:16. > :07:19.framework in which they operate. Whether they need special legal

:07:20. > :07:24.powers, and whether it is right and necessary for them to receive each

:07:25. > :07:30.year ?2 billion of public funding to carry out their work. After a short

:07:31. > :07:35.introductory comment, let's move straight to the questions and

:07:36. > :07:41.answers part of proceedings. My first question is do you, Sir John.

:07:42. > :07:44.During the Cold War, the threat to the United Kingdom was pretty

:07:45. > :07:48.clear. There was the Warsaw Pact, the Soviet Union on one side, NATO

:07:49. > :07:52.on the other. Who poses the biggest threat to national security now?

:07:53. > :07:56.Thank you, chairman, for the opportunity to give evidence. We are

:07:57. > :08:01.conscious of the unprecedented nature of the occasion. We will do

:08:02. > :08:07.our best to answer the committee's questions as best we can. You ask

:08:08. > :08:11.about the threats to the UK. It's not like it was in the Cold War.

:08:12. > :08:16.There are not states out there trying to destroy our government and

:08:17. > :08:21.way of life. But there are a very wide range of diverse threats that

:08:22. > :08:27.we face. The biggest is terrorism, the threat from Al`Qaeda and its

:08:28. > :08:31.many branches. There are also states out there that are trying to do us

:08:32. > :08:35.harm through cyber attacks, acquiring nuclear weapons, or

:08:36. > :08:40.involved in generating instability in parts of the world that are

:08:41. > :08:46.important to us. Of course, we work in support of the armed forces,

:08:47. > :08:49.especially GCHQ and ourselves, and the Armed Forces have been acting in

:08:50. > :08:52.the last decade, and we have been very supportive of them in helping

:08:53. > :08:59.shape their operations and protecting soldiers lives. It is a

:09:00. > :09:02.very volatile and changing world we live in, and we have do have the

:09:03. > :09:07.skills and people and capabilities to be able to support and defend

:09:08. > :09:14.this country's security interests where the threats arrive. Thank you

:09:15. > :09:17.very much. This leads me to want to ask something supplementary. Andrew

:09:18. > :09:20.Parker, maybe you can answer it. At the end of the Cold War people

:09:21. > :09:23.thought we could reduce the size and cost of the intelligence agencies,

:09:24. > :09:28.and it's gone the other way, they are larger and more expensive than

:09:29. > :09:32.ever. As the head of one of the secret agency, but also as a

:09:33. > :09:38.citizen, do you sometimes get nervous that the agencies are too

:09:39. > :09:43.strong and powerful? You are asking both about scale and power, and I

:09:44. > :09:47.will take them in that order. In scale, ?2 billion is a substantial

:09:48. > :09:49.amount of taxpayers money and we take our responsibilities in

:09:50. > :09:53.spending it seriously, which is closely overseen by the committee

:09:54. > :09:56.and audited by the National Audit Office. The scale is set by

:09:57. > :10:01.ministers against the backdrop of the whole of public spending. That

:10:02. > :10:08.?2 billion is the equivalent of roughly 6% of the nation's defence

:10:09. > :10:12.budget. At that scale, we would content and believe, and ministers

:10:13. > :10:18.have been persuaded, that that is a proportion as investment against the

:10:19. > :10:22.threats we face. As far as the power question, the question that somehow

:10:23. > :10:27.what we do is somehow compromising freedom and democracy, of course we

:10:28. > :10:36.believe the opposite to be the case. It is that this committee to oversee

:10:37. > :10:39.the work. That is against threats to this country, the way of life, the

:10:40. > :10:43.country and the people who live here. The work we do is

:10:44. > :10:52.proportionally judged against the necessity of protecting against

:10:53. > :10:53.those threats. The threats from terrorism and cyber terrorism

:10:54. > :10:57.increasingly involved countries and players from across the globe. What

:10:58. > :11:07.has that meant for the ways in which all agencies now work? The threats

:11:08. > :11:11.we face are more complex, as you describe. We need to work more

:11:12. > :11:15.closely together, and there is an unprecedented level of collaboration

:11:16. > :11:20.between the three agencies. For example, for MI6, there is scarcely

:11:21. > :11:24.an operation we do that is not supported by either GCHQ or MI5, or

:11:25. > :11:30.both. And by partners overseas as well. In a resource scarce world,

:11:31. > :11:37.and one where taken all `` technology has a greater part in our

:11:38. > :11:40.work, we collaborate closely on developing the technological systems

:11:41. > :11:47.we need in order to deliver on our responsibilities. Over the last 25

:11:48. > :11:50.years there have been three significant events which have had

:11:51. > :11:57.implications for national security, namely the end of the Cold War, 911

:11:58. > :12:00.and the Arab uprisings, none of which were foreseen by the

:12:01. > :12:02.intelligence community. Would you accept now that you could and should

:12:03. > :12:08.have done more to have predicted these? We are not crystal ball

:12:09. > :12:17.gazers, we are intelligence agencies. We need to understand

:12:18. > :12:21.other `` foreign countries. We could all see the fault lines in Arab

:12:22. > :12:25.society, to take the Arab Spring as an example, but no one predicted

:12:26. > :12:29.when the earthquake would strike. There was not a secret in

:12:30. > :12:34.somebody's safe in Cairo saying the Arab Spring was going to start in

:12:35. > :12:38.January 2011. It was not something that was out there that we missed.

:12:39. > :12:42.It was an analytical issue, which, frankly, governments, think tanks,

:12:43. > :12:46.foreign services and intelligence agencies, we were all looking at it

:12:47. > :12:50.and we could all see that there were tensions in the societies, but you

:12:51. > :12:53.cannot say that this particular trigger would happen at this

:12:54. > :12:57.particular time. It was the same with the collapse of the Cold War

:12:58. > :13:01.and the same with 9/11. We identified Al`Qaeda is a serious

:13:02. > :13:06.threat and we have learned a huge amount since then. `` as a serious

:13:07. > :13:09.threat. But we need to understand what intelligence agencies do. We

:13:10. > :13:13.acquire the secrets that other countries don't want us to know or

:13:14. > :13:19.other organisations don't want us to know. We are not all knowing

:13:20. > :13:26.specialist in what will happen next month or next year. There is surely

:13:27. > :13:31.nothing new about this at all. If you look back at the history of the

:13:32. > :13:35.20th`century conflicts, a majority of those rows entirely unexpectedly,

:13:36. > :13:42.sometimes unexpectedly even by the people later as aggressors. That is

:13:43. > :13:47.why we put a premium on agility and flexibility. We did not expect at

:13:48. > :13:51.the beginning of 2011 we'd be engaged in military conflict in

:13:52. > :13:54.Libya. All three services had to direct effort towards supporting

:13:55. > :13:59.government policy, supporting the Armed Forces at very short notice.

:14:00. > :14:03.That is why agility, flexibility and capability are the watchwords of

:14:04. > :14:07.what we do. Let's move on to the issue of technology.

:14:08. > :14:16.Changes in the type of technology available have obviously had a major

:14:17. > :14:20.impact on the work that you do. Can you explain, perhaps, how it has

:14:21. > :14:25.changed your role? Has it made your job harder or easier? And who does

:14:26. > :14:37.it help most? The agencies or the terrorist? The global information

:14:38. > :14:41.communication technology is a $3 trillion industry per year. It is

:14:42. > :14:45.relentless and we have to focus our efforts. To take your question in

:14:46. > :14:49.two parts, the first set of challenges we have is simply around

:14:50. > :14:54.the Internet. It's a fantastic place for business, life and study. It is

:14:55. > :14:57.global, diverse and complex. But there are threats to our security

:14:58. > :15:01.and prosperity within that and I will come back to terrorism in a

:15:02. > :15:05.moment, if I may. The point about discovering subjects of interest,

:15:06. > :15:08.the intelligence targets within the soup of the Internet is difficult,

:15:09. > :15:14.and there is an issue around people. We need good, innovative,

:15:15. > :15:16.highly skilled people to keep up with that technological challenge.

:15:17. > :15:20.In terms of what it means the business, it means we have to

:15:21. > :15:23.anticipate, Discover, analyse, investigate and respond, and we have

:15:24. > :15:29.to do so globally, because the threat comes out as globally and we

:15:30. > :15:34.need a global, agile, flexible array of security capabilities. Therefore

:15:35. > :15:37.we need global partnerships. On your questions about terrorists, I think

:15:38. > :15:41.it has helped the terrorist. I think our job has got harder and is

:15:42. > :15:47.getting harder. If you think about what the Internet does for

:15:48. > :15:49.terrorists, it gives them a myriad ways to communicate covertly. It

:15:50. > :15:53.gives them the opportunity to radicalise and spread propaganda. It

:15:54. > :15:58.gives them the opportunity to planned, command and control. It

:15:59. > :16:01.gives them the opportunity to spread and exhort violence. We have had

:16:02. > :16:05.successes in turning that against them, and those are the best kept

:16:06. > :16:10.secret. It's not just about terrorism, it's also about serious

:16:11. > :16:16.crime. I could mention the work we do with a child exploitation agency

:16:17. > :16:22.in terms of working with them to uncover the identities and track

:16:23. > :16:25.down some of those who are involved in online sexual exploitation of

:16:26. > :16:30.children in the UK, including overseas, where there was a recent

:16:31. > :16:34.case that we managed to do that and used intelligence capabilities to

:16:35. > :16:45.identify those and bring them to justice, and two people are now in

:16:46. > :16:48.jail. There are two things that define the future before us. What is

:16:49. > :16:52.the diversifying threat landscape that I spoke of recently and

:16:53. > :16:56.publicly. The second is the technology issue. It is an

:16:57. > :17:00.accelerating technology race which is defined by the changes and

:17:01. > :17:04.advances in the Internet. This is not about the world of security and

:17:05. > :17:08.intelligence alone. All of our lives are moving onto the Internet, and

:17:09. > :17:12.it's important we are able to operate there, because the

:17:13. > :17:16.terrorists do so as well. We need to have capability that lets us track

:17:17. > :17:24.them and monitor their communications in the modern world.

:17:25. > :17:29.If a junior clerk with a memory stick can copy and publish on the

:17:30. > :17:33.internet, tens of thousands of highly classified documents, what

:17:34. > :17:38.measures can be put in place to prevent such huge breaches of

:17:39. > :17:42.security in the future? If I have a go at that one. The answer on

:17:43. > :17:47.security is the range of security measures we take. It is tempting to

:17:48. > :17:53.think that security relating to IT must have an IT solution, of course

:17:54. > :17:57.that is part of it. We have tightly controlled IT access and

:17:58. > :18:02.arrangements for who can download what, but those within the whole

:18:03. > :18:05.range of security arrangements that we have, the security of our

:18:06. > :18:09.facilities and the personnel security that we apply to the

:18:10. > :18:14.vetting that our people have to the highest level, the way that they are

:18:15. > :18:17.managed and the way that all of this majors together, make it very

:18:18. > :18:21.difficult and extremely unlikely to have the breaches.

:18:22. > :18:25.So, whaps what happened in America, you think could not happen here it

:18:26. > :18:32.has happened there twice? For the UK, I cannot comment on the US. We

:18:33. > :18:39.have stringent security arrangements, of course nothing is

:18:40. > :18:45.ever possible, but there has only been one instance of one individual

:18:46. > :18:47.attempting on a small scale this infiltration and he was sent to

:18:48. > :18:51.jail. What about the hundreds of thousands

:18:52. > :18:56.of people who appear to have access to your information in the United

:18:57. > :19:00.Kingdom? All three of us are involved in those discussions.

:19:01. > :19:06.We have returned to the use of technology, we shall return to that

:19:07. > :19:11.later. We now move to a sensitive subject, working with foreign

:19:12. > :19:16.subjects. Now the flair of your work is more

:19:17. > :19:21.international. You have to work with equivalence overseas. This carries

:19:22. > :19:26.risk, especially if the other countries don'ted a mere to the high

:19:27. > :19:30.standards of human rights that we do in this country. Why don't you link

:19:31. > :19:33.your relationships to the organisations that have the same

:19:34. > :19:37.standards as we have in this country? We have good partnerships

:19:38. > :19:41.with the European and the Americaned other Western partners. We work

:19:42. > :19:47.closely with them against all of the issues we have described.

:19:48. > :19:49.I'm not concerned about those countries it is the countries that

:19:50. > :19:53.don't. The problem is that the threat does

:19:54. > :19:57.not come from those countries. It comes from the countries which are

:19:58. > :20:03.either secretive states or where there is ungoverned territory, where

:20:04. > :20:08.terrorists can operate or countries which are pursuing nuclear weapons

:20:09. > :20:14.programmes for example. If you wish to work in the areas you are talking

:20:15. > :20:18.about, in the Middle East, south Asia, Africa, so on, we have to work

:20:19. > :20:22.with the local security partners. They are often powerful and

:20:23. > :20:26.important players. They carry weight. My agency carries the main

:20:27. > :20:32.responsibility for our partnerships with those organisations. If there

:20:33. > :20:37.is a terrorist, say a British extremist has gone to a foreign

:20:38. > :20:45.country, it is important for our security in the UK that an eye is

:20:46. > :20:50.kept on him. That he is sure veiled and monitored. And maybe he may need

:20:51. > :20:54.to be detained at some point. We don't have the powers to do that.

:20:55. > :20:59.The locals do. So we have to work in partnership in order to be able to

:21:00. > :21:07.do things lawfully overseas. If that is the case, how are you

:21:08. > :21:10.sure that the action you take is not as a resulting in somebody being

:21:11. > :21:14.mistreated because of that relationship? That is important for

:21:15. > :21:17.us. We are clear that we only operate within the framework of the

:21:18. > :21:22.law. There are some countries that we

:21:23. > :21:27.cannot work with at all. Take Syria, there is no rule of law, no partner.

:21:28. > :21:32.We could not operate with a partner in that country in the Syrian

:21:33. > :21:38.regime. There are other countries which have mixed human rights

:21:39. > :21:42.records. With countries like that, we then seek clear assurances that

:21:43. > :21:48.when we provide intelligence, it is used lawfully and if anybody is

:21:49. > :21:55.detained or questioned as a consequence of our intelligence,

:21:56. > :21:59.that it is done to our standards. Now the, there are sometimes some

:22:00. > :22:05.fine balancing to be drawn here. Where there is a fine balance, we

:22:06. > :22:08.submit the issue and compile the risks and seek the guidance of

:22:09. > :22:12.ministers on that. There have been allegations in

:22:13. > :22:17.relation to specific incidents that your organisation has been complice

:22:18. > :22:21.it in torture taken against people. How can you be sure because of the

:22:22. > :22:25.close relationships, you have talked about the guidance, that the fact

:22:26. > :22:31.that you have this close relationship, does it not mean that

:22:32. > :22:35.you may well be explicit or responsible in some way for some of

:22:36. > :22:40.the dreadful events that have occurred? I don't accept the

:22:41. > :22:45.allegations made against us. With the benefit of hindsight we were not

:22:46. > :22:49.configured in 2001 for the scale of the terrorist threat that this

:22:50. > :22:54.country faced after 9/11. Our people were not trained for it, we did not

:22:55. > :22:59.have the experience nor the resources for it. It took time to

:23:00. > :23:05.adapt. It took time to adapt to the scale of the threat we faced, but we

:23:06. > :23:11.learned quickly. We have had glidance in place for seven or eight

:23:12. > :23:15.years now. In 2010 it was pulled across the three agencies, across

:23:16. > :23:19.the military. We have consolidated guidance, published by the

:23:20. > :23:23.Government. That is giving clear direction to us as the heads of

:23:24. > :23:28.agencies and to our staff in the field about what they can and cannot

:23:29. > :23:34.do. If there is doubt we put it to ministers. There is a former High

:23:35. > :23:38.Court judge, who is directed to oversea the implementation of the

:23:39. > :23:45.guidance to ensure that what we are doing is in accordance with the law

:23:46. > :23:50.and that guidance. The situations in which officers may

:23:51. > :23:57.find themselves operating may be dynamic indeed, what kind of audit

:23:58. > :24:01.do you perform in relation to circumstances where an officer may

:24:02. > :24:05.come back and say that this was difficult but he made his decision

:24:06. > :24:10.in a particular direction, for example not to have any part in what

:24:11. > :24:17.was going on. Don't you need assessment of the effectiveness of

:24:18. > :24:21.this? We do. I think, that it is more die thamic than you suggest.

:24:22. > :24:27.The idea of sending an agent off into the field like James Bond and

:24:28. > :24:30.he comes back to report... Or referring to ministers.

:24:31. > :24:34.It does not work that way. Our people in the field have constant

:24:35. > :24:44.communication with us through stations or directly to head office.

:24:45. > :24:47.They communicate rapidly we have a 24/7 system. If something is

:24:48. > :24:51.happening there is system to enable guidance from head office. If we

:24:52. > :24:57.feel it does not fall clearly on one side of the line or the other, or

:24:58. > :25:01.the facts are uncertain, then we all wake up the affect and ask him for a

:25:02. > :25:05.view, one way or the other. Do you feel, Sir John, you can

:25:06. > :25:11.guarantee, not to the Committee but to the public as well, that your

:25:12. > :25:16.agency, is beyond reproach now in these matters and will not be

:25:17. > :25:21.explicit? What I can say is that we have learned a huge amount over the

:25:22. > :25:25.last 12 years. I am satisfied with the rigorous compliance procedures

:25:26. > :25:32.that we have in place. There is no way that our members of

:25:33. > :25:36.staff could be drawn into situations at this stage where there is doubt

:25:37. > :25:43.about what they should be doing. There is a very strong ethical

:25:44. > :25:48.standard in all of our services. When you are working in a secret

:25:49. > :25:51.organisation, having a strong ethical and disciplined approach is

:25:52. > :25:56.really, really important. That is one of the basis on which we recruit

:25:57. > :26:01.people. I am confident to be able to answer your question, yes.

:26:02. > :26:06.And you are happy that the large`scale pay`offs that have been

:26:07. > :26:12.upsetting constituents that have been paid out to foreign prisoners

:26:13. > :26:17.held under questionable circumstances, that those days are

:26:18. > :26:22.past us? I wanted also to ask on a practical level, really, if you are

:26:23. > :26:26.dealing on a day`to`day issue, what goes through your mind if you have

:26:27. > :26:33.been made aware of someone overseas who had vital information and being

:26:34. > :26:37.held by an overseas government, perhaps by a state we don't have

:26:38. > :26:44.day`to`day relationships with, how do you feel and how would you

:26:45. > :26:49.operate with that person, that there could be a eminent terrorist attack

:26:50. > :26:56.on UK soil? We would do what we could to disrupt any such threat. As

:26:57. > :26:59.I say, if he is held in a country, if this person is held in a country

:27:00. > :27:04.where we have a partnership relationship, then we will seek with

:27:05. > :27:07.that partner to ensure that the right questions are put to the rson

:27:08. > :27:14.but in a lawful way. If there is a serious risk that our questions

:27:15. > :27:18.would prompt the maltreatment or the torture of a detainee, we would

:27:19. > :27:25.consultant the ministers about that. If we knew that was going to happen,

:27:26. > :27:29.we would not even think of it in the first place, but we have been able

:27:30. > :27:34.to find other ways to disrupt the threats.

:27:35. > :27:40.I think that the record that we have, especially with MI5's lead of

:27:41. > :27:45.disrupting threats in the UK with a footprint seas has been commendable.

:27:46. > :27:49.Andrew will talk about that with more authority, but about the

:27:50. > :27:53.pay`offs you mentioned Mr Field, it was not just your constituents but

:27:54. > :27:58.our members of staff who were sickened about it. On many occasions

:27:59. > :28:02.we had a strong defence to the allegations made against us but the

:28:03. > :28:10.court system did not allow us to make the defences. We are glad to

:28:11. > :28:14.see the Justice and the Security Act passed that will enable us to defend

:28:15. > :28:19.ourselves against the allegations. I am not saying that all allegations

:28:20. > :28:23.are manufactured or whatever, and there may be some cases that a court

:28:24. > :28:29.should hear, where there is a case to be heard but now the courts can

:28:30. > :28:34.hear. That is because of the Justice and the Security Act.

:28:35. > :28:38.I appreciate this is a hypothetical question, where you are pushing to

:28:39. > :28:43.the extremes of the policy but if your question is would we pursue a

:28:44. > :28:48.situation that led and we knew it would lead to mistreatment or

:28:49. > :28:51.torture of an individual to get intelligence, the answer is

:28:52. > :28:55.absolutely not. There is a clear Government policy that applies

:28:56. > :29:02.across the agencies and underpins the guidance, that is that we do not

:29:03. > :29:04.participate in encouraging or condoning mistreatment or torture.

:29:05. > :29:08.That is absolute. Thank you very much. The Committee

:29:09. > :29:13.will be wanting to keep a close interest in this area. Now let's

:29:14. > :29:19.move to the changing nature of the threat from Al`Qaeda and its allies.

:29:20. > :29:23.After 9/11, the attention of the intelligence community was focussed

:29:24. > :29:27.in Island in south Asia and Afghanistan but more recently that

:29:28. > :29:31.attention seems to have shifted to the Middle East, to the Horn of

:29:32. > :29:36.Africa. Over the last five years, what proportion of the plots that

:29:37. > :29:40.have been uncovered have been linked to Al`Qaeda as opposed to

:29:41. > :29:46.Al`Qaeda`affiliated groups in the other areas, including the Maghreb

:29:47. > :29:49.areas as well? If you permit me, I take a step back to answer the

:29:50. > :29:54.question. I would have to position it against the whole terrorist

:29:55. > :29:58.threat landscape. Since 9/11, of course that appalling attack on the

:29:59. > :30:03.United States in which almost 3,000 people were killed by Al`Qaeda,

:30:04. > :30:08.began what seems to be the modern chapter of terrorism, though we have

:30:09. > :30:14.had terrorism as an issue for much longer than that. Afghanistan, you

:30:15. > :30:19.mentioned, of course throughout the time since 9/11 that we have had

:30:20. > :30:23.coalition troops and British Forces included in Afghanistan, there has

:30:24. > :30:28.been no terrorism projected against this country from there, due to the

:30:29. > :30:34.work of our armed forces. As we are approaching arm city day and wearing

:30:35. > :30:40.poppies, I would like to pay tribute to the 456 British serviceman who

:30:41. > :30:44.have given their lives to that end. There has been no terrorism in this

:30:45. > :30:48.country in that time. Now to the time, the period of after 9/11, in

:30:49. > :30:57.terms of threat to this country, it has been dominated by threats from

:30:58. > :31:02.south Asia, an almost monolithic phenomena, from people living here,

:31:03. > :31:07.how the two have interacted, I can explain more on that later. That led

:31:08. > :31:13.to a series of plots. Including the dreadful attack on the 7th of July

:31:14. > :31:19.in 2005 in which 52 members of the public were murdered.

:31:20. > :31:23.Now that moment signalled a shift in counterterrorist work in this

:31:24. > :31:29.country. Much stronger resourcing was added by the Government and

:31:30. > :31:33.counterterrorist work stepped up and it started to take the shape it is

:31:34. > :31:39.today, the joint work of our agencies and of MI5.

:31:40. > :31:44.Could you bring your answer together more quickly... Absolutely. The

:31:45. > :31:48.threat since that time has started to bread out `` spread out, but the

:31:49. > :31:53.diversecation of threat is not a shift or displacement from one area

:31:54. > :31:58.to another it is the growth of the Al`Qaeda phenomena in the areas you

:31:59. > :32:06.are referring to. In the north and the west of Africa. In East Africa,

:32:07. > :32:11.in Syria and in Yemen, and in Syria, where the ideal ideal ology started

:32:12. > :32:15.to take root there with the national and extremist groupings, we have

:32:16. > :32:23.seen threats from all areas, and also still from south Asia.

:32:24. > :32:27.As Al`Qaeda is seeking to exploit the vacuums, you mentioned Syria,

:32:28. > :32:32.and Somalia, other countries of that kind, is there not a real risk that

:32:33. > :32:36.the challenging terrain you are getting coverage on, that you are

:32:37. > :32:48.spread too thinly, that you are missing things? We are deployed

:32:49. > :32:54.overseas, and as Andrew says, we are having to deal with Al`Qaeda

:32:55. > :32:58.emerging, forming and multiplying in a new range of countries. Of course

:32:59. > :33:05.that poses extra challenges and extra threats to us. There is no

:33:06. > :33:09.doubt, especially in the last 12 months, really, that threat has

:33:10. > :33:18.emerged. More British citizens have been killed overseas in 2013 than in

:33:19. > :33:24.the previous seven years combined. In Nairobi, the hostage killed in

:33:25. > :33:30.Nigeria, and the events in Woolwich. There's no doubt that the

:33:31. > :33:34.threat is rising. Now, deployed overseas, we work primarily with

:33:35. > :33:37.partners in response to MI5 priorities about where the threat to

:33:38. > :33:41.the UK is coming from, and we do what we can to disrupt terrorist

:33:42. > :33:48.attacks overseas, and we foil a good number, but some get through. The

:33:49. > :33:52.threat overseas is getting greater. Just picking up on the question of

:33:53. > :33:59.threat, what is your assessment of the impact of what people might

:34:00. > :34:04.describe as terrorist tourism, the fact there are people who go from

:34:05. > :34:07.the UK to abroad, acquire capabilities, and then if they come

:34:08. > :34:14.back to this country suitably motivated have the opportunity of

:34:15. > :34:17.using what they learned abroad? It is a very important strand of the

:34:18. > :34:24.threat we face, the way various interaction between people who live

:34:25. > :34:29.in this country who sympathise with the Al`Qaeda authorities ``

:34:30. > :34:32.ideology, and they travel to meet the groupings, either Al`Qaeda

:34:33. > :34:36.itself in South Asia, or some of the other groupings I spoke about across

:34:37. > :34:40.other regions. Because the attractiveness to these groupings is

:34:41. > :34:45.that they meet British citizens willing to engage in terrorism, and

:34:46. > :34:52.they tasked them to do so back at home where they have higher impact

:34:53. > :35:01.than in this country, and we have seen it played out in various plots,

:35:02. > :35:06.including 7/7. So the threat from abroad is less obvious than it might

:35:07. > :35:13.have been in the past? It is a complex interaction. You anticipated

:35:14. > :35:16.my next question. What about attacks on British citizens in public places

:35:17. > :35:22.at home and abroad? What about the taking of British citizens as

:35:23. > :35:27.hostages, at home and abroad? How do you assess the credibility of the

:35:28. > :35:32.threats? To describe a threat as credible does not necessarily make

:35:33. > :35:36.it so. What factors do you use in assessing the extent and credibility

:35:37. > :35:40.of a particular threat in a particular area, geographically for

:35:41. > :35:45.example? The responsibility for assessing threat in areas of the

:35:46. > :35:51.world, and including the UK, setting the threat levels is part of my

:35:52. > :35:56.service but is a multi`agency body that looks at the full range of

:35:57. > :35:58.intelligence from all sources and is connected to international

:35:59. > :36:02.intelligence agencies around the world, and they form a picture based

:36:03. > :36:06.on all the available intelligence, balancing it, assessing it, and

:36:07. > :36:15.coming out with rigorous judgements about threat levels. But as the

:36:16. > :36:21.account holder, that ?2 billion, they will have the responsibility

:36:22. > :36:26.for deciding on which way capabilities must go, and that must

:36:27. > :36:29.rest with the heads of the agencies? So do you exercise your own

:36:30. > :36:36.independent judgement based on this, or do you accept the ruling? This is

:36:37. > :36:39.a collective effort. John and Ian might want to say something in a

:36:40. > :36:43.minute. The way in which we work against counterterrorism is an

:36:44. > :36:50.endeavour between the three of us as intelligence agencies, between

:36:51. > :36:54.myself and the police, particularly the police national network, who are

:36:55. > :36:57.excellent partners, who we work with toward arrest and prosecutions the

:36:58. > :37:05.decisions we make around this based on the threat picture. This is led

:37:06. > :37:08.by MI5, but it is a team effort in which the people in all of the

:37:09. > :37:12.agencies who lead the counterterrorist work at the

:37:13. > :37:18.operational level plan together the deployments and priorities

:37:19. > :37:22.necessary. In answer to Sir Menzies Campbell, you are talking about

:37:23. > :37:27.terrorist tourism, is it your assessment that that is growing or

:37:28. > :37:30.decreasing? It is growing at the moment because of Syria. Syria has

:37:31. > :37:37.become an attractive place for people to go for that reason, those

:37:38. > :37:43.who support or sympathise with the Al`Qaeda ideological message that I

:37:44. > :37:47.mentioned. We see low hundreds of people in this country go to Syria

:37:48. > :37:52.for a period, then come back. There are some large numbers are still ``

:37:53. > :37:55.still there, and they get involved in fighting. This is because of the

:37:56. > :37:59.proximity and ease of travel, but also because it is attractive

:38:00. > :38:06.because of what they see as the jihadist cause. Moving to the

:38:07. > :38:07.home`grown threat, we have seen acts of terrorism and attempted in this

:38:08. > :38:16.country. In the last decade, over 50 people

:38:17. > :38:21.in the UK have been killed as a result of terrorist attacks. Do you

:38:22. > :38:25.accept that as many people would argue that this represents a

:38:26. > :38:28.significant failure of intelligence, and perhaps you could say a word

:38:29. > :38:33.about the number of plots that have been uncovered during the course of

:38:34. > :38:37.the last ten years, and to what extent does luck play a part in the

:38:38. > :38:44.work that you do to try and cover them? You won't be surprised that I

:38:45. > :38:49.reject the term intelligence failure in this area. The principal attack

:38:50. > :38:53.that the UK suffered in terms of numbers of loss of life, and there

:38:54. > :39:00.have been attacks this year, goes back to 2005 the 52 deaths I spoke.

:39:01. > :39:03.Committee examined `` this committee examined what this agency and the

:39:04. > :39:08.police did and concluded the actions we took were reasonable at the time.

:39:09. > :39:14.I think I would adhere from that that that's not judged as a failure,

:39:15. > :39:20.and I don't judge that it was. Since then there have been persistent

:39:21. > :39:26.attempts of attacks in this country. You ask about the last ten years, so

:39:27. > :39:31.if I go back to 2005, rather than ten years, the number since 7/7,

:39:32. > :39:37.there have been 34 plots towards terrorism that have been disrupted

:39:38. > :39:41.in this country, of all sizes and at all stages. I have referred

:39:42. > :39:45.publicly, previously, and my predecessors have, that one of those

:39:46. > :39:50.`` one or two of those are major plots aimed at mass casualties which

:39:51. > :39:55.have been attempted each year. Of the 34, most of them, the vast

:39:56. > :39:59.majority, have been disrupted by active detection and intervention by

:40:00. > :40:06.the agencies and the police. One or two of them, a small number, have

:40:07. > :40:13.failed because they just failed. The plans did not come together. But the

:40:14. > :40:18.vast majority were by intervention. 7/7 came as a complete shock to the

:40:19. > :40:21.nation's psyche, to think that people born and raised in Britain

:40:22. > :40:25.could want to commit acts of terrorism. Clearly the best way to

:40:26. > :40:30.protect the country is to prevent these plots being formed in the

:40:31. > :40:33.first place. How important do you think the prevention programme is,

:40:34. > :40:38.and do you think there is enough emphasis on trying to make sure

:40:39. > :40:42.people are not radicalised and do not go down the path of home`grown

:40:43. > :40:48.terrorism? Is the committee is aware, the bulk of the work that MI5

:40:49. > :40:52.and the bulk of the agencies do in this area is stopping people who are

:40:53. > :40:56.supporting terrorism and working toward it, stopping plots, and that

:40:57. > :41:02.is where the bulk of the effort is. But as you rightly say, Prevent is

:41:03. > :41:06.also an important pillar as part of the strategy, and it is one that

:41:07. > :41:09.gets at the point of dealing with the problem of vulnerable

:41:10. > :41:14.individuals who are exposed to these toxic and twisted message of

:41:15. > :41:18.violence. It is certainly part of what we do with the police, to refer

:41:19. > :41:21.people into that programme, wherever we can and wherever it offers a

:41:22. > :41:31.sensible way for dealing with the problem. So, between 7/7 and the

:41:32. > :41:36.murder of Lee Rigby, there were 34 thwarted attacks? Out of the 34, how

:41:37. > :41:42.many were being plotted by home`grown terrorists? Could we say

:41:43. > :41:46.the vast majority? And how many were by foreigners, and how many by

:41:47. > :41:55.people living here that were relatively recently `` recent

:41:56. > :41:58.arrivals? The vast majority of the plots come from people who live

:41:59. > :42:01.here. There are several thousand individuals in this country who are

:42:02. > :42:07.described as supporting violent extremism or engagement in some

:42:08. > :42:11.way, that we are aware. The terrorist plots we have dealt with

:42:12. > :42:17.over the years have almost all come from amongst those people. Of the

:42:18. > :42:23.two categories that live here, how many is it? Is it the vast majority

:42:24. > :42:26.that are home`grown, people who have grown up here? Or is a significant

:42:27. > :42:31.proportion of people who have recently come into the country? I go

:42:32. > :42:35.back to the comment we almost got to a few moments ago. I'm not sure that

:42:36. > :42:40.the term home`grown is a helpful one here in getting up the phenomenon ``

:42:41. > :42:45.getting at the phenomenon because of the complex and rich links between

:42:46. > :42:49.the individuals here and the Al`Qaeda group overseas. In almost

:42:50. > :42:55.every instance of a plot, there are those links. It almost anticipates

:42:56. > :43:01.what I was going to ask next. You have seen the shift from the

:43:02. > :43:08.so`called spectacular plots, to the lone wolf attacks, so`called. Would

:43:09. > :43:13.you say that that is a serious shift of reorientation of the terrorist

:43:14. > :43:19.threat away from networks towards individuals making these attacks,

:43:20. > :43:24.and planning to kill people on a low`level, individual basis? Or is

:43:25. > :43:29.it, as I think you are saying to us now, more that the lone wolves have

:43:30. > :43:33.some sort of outside influence? The answer to the first question is that

:43:34. > :43:39.no, it's not so much a shift, that we seek `` but that we see different

:43:40. > :43:44.methods of terrorism added to over the years. I go back to a case

:43:45. > :43:52.earlier this year. 11 individuals were convicted in a case we called

:43:53. > :43:57.Operation Examined, in which the terrorists were picked up on covert

:43:58. > :44:05.microphones talking about a plot to exceed victims in terms of the

:44:06. > :44:09.number of 7/7. Big casualties are still in the minds of the

:44:10. > :44:12.terrorists, and we can expect that to persist. Amongst that, we've seen

:44:13. > :44:15.a small rise in the cases of the number of individuals who have

:44:16. > :44:20.become radicalised and sometimes move to violent action. This happens

:44:21. > :44:23.because at the rise of the Internet and the presence of all kinds of

:44:24. > :44:29.violent material that they can connect with. And also because some

:44:30. > :44:33.of the linkages I spoke of, the complex linkages, particularly with

:44:34. > :44:37.South Asia, are harder for the terrorists to have, so there is a

:44:38. > :44:41.little bit more autonomy amongst some groupings and individuals than

:44:42. > :44:46.we have seen in the past. But this is an added phenomenon rather than a

:44:47. > :44:50.shift from one to another. Mr Parker, the Home Secretary on Monday

:44:51. > :44:54.made a statement to the house, where he said that the Security service

:44:55. > :44:58.had always advised her that there had been no substantial increase in

:44:59. > :45:02.the overall risk since the introduction of terrorist prevention

:45:03. > :45:05.and investigation measures. Now that we have two suspects on the run and

:45:06. > :45:08.the prospect of a number of the order is coming to an end in

:45:09. > :45:15.January, is that assessment still valid? I know you take a close

:45:16. > :45:19.interest in this in the House, as do other members of the committee. I

:45:20. > :45:22.listened to the Home Secretary speak in the debate on Monday and I think

:45:23. > :45:26.she covered the issue is quite fully, but on the specifics of your

:45:27. > :45:35.question, going back to what my predecessors said about this, and

:45:36. > :45:38.the increase in risk, that is a judgement made against the whole of

:45:39. > :45:41.the risk, so when I referred a few minutes ago to the several thousand

:45:42. > :45:45.individuals who support violent extremism in one way or another, it

:45:46. > :45:50.is a judgement about the whole target set, including these

:45:51. > :45:57.individuals, not just on their own. And it remains true. Are you able to

:45:58. > :46:03.tell us a trend of operations within your service in relation to counter

:46:04. > :46:08.terrorism? Over the period since 7/7, has the number of operations

:46:09. > :46:14.which you have had to carry out increased? In particular, was that

:46:15. > :46:20.the case in and around the period of the Olympic games? The level of

:46:21. > :46:24.counterterrorist operations that goes on has been even in recent

:46:25. > :46:29.years. For the Olympics we put extra effort into it in case there were

:46:30. > :46:32.extra threats, or attempts by Al`Qaeda or other groups to attack

:46:33. > :46:38.the games or mount attacks during the games. As it happens, there were

:46:39. > :46:41.some threats. But there were no serious ones that came forward

:46:42. > :46:46.during the period. We were ready in case that there were, but they

:46:47. > :46:51.didn't happen. Setting the Olympics aside for a moment, in terms of the

:46:52. > :46:55.trends, we have seen more and more new methods added. We are dealing

:46:56. > :47:01.with a diversifying source of threats from a range of different

:47:02. > :47:05.countries now. As it broadens out, its year by year and it becomes a

:47:06. > :47:10.more complex task. In terms of the numbers, maybe the best guide his

:47:11. > :47:16.prosecution through the court, and since 7/7, that is 330 in cases to

:47:17. > :47:22.do with international terrorism. In the first part of this year there

:47:23. > :47:25.were 25 convictions in four major investigations that the police were

:47:26. > :47:33.involved in and brought forward as operations, one of which was the

:47:34. > :47:36.plot I mentioned. Terrorism is also to Northern Ireland. Let's move to

:47:37. > :47:40.that situation. Has the prominence of the threat of

:47:41. > :47:46.#14r578ist terrorism on the mainland, indeed, emanating from

:47:47. > :47:50.abroad, has that meant you have taken your eye from Northern

:47:51. > :47:53.Ireland? Not at all. We have a substantial commitment of effort in

:47:54. > :47:57.Northern Ireland. It is based there, it is not distracted by the rest of

:47:58. > :48:00.our work. We took over the intelligence lead for work against

:48:01. > :48:04.terrorism in Northern Ireland six years ago. We have a heavy

:48:05. > :48:09.commitment of resources there. It is partnered with PSNI. The situation

:48:10. > :48:13.in Northern Ireland is one in which we see from time to time tragic

:48:14. > :48:16.terrorism, a year ago the murder of a prison officer, David Black over

:48:17. > :48:21.there. I think it was a disgraceful act.

:48:22. > :48:26.The people we are talking about, the terrorists there, are a small number

:48:27. > :48:31.of people. A residue of terrorism from what I would call a by`gone

:48:32. > :48:36.era. Nearly, as you know very well, moved on 15 years ago with the Good

:48:37. > :48:41.Friday Agreement. With the decision to move forward in a democratic way.

:48:42. > :48:46.It has done so. Northern Ireland is now a modern and a conservativic

:48:47. > :48:49.society where terrorism has no place.

:48:50. > :48:53.You describe them as a residue but you mentioned the murder of David

:48:54. > :48:58.Black. The Northern Ireland Secretary herself warned yesterday

:48:59. > :49:03.of continuous planning and targeting by dissident Republicans. What are

:49:04. > :49:07.the factors that lie behind the renewed level of threat in Northern

:49:08. > :49:13.Ireland? I would `` I'm not sure I accept it is a renewed level of

:49:14. > :49:16.threat. The number of attacks is diminishing. And the number of

:49:17. > :49:21.people convicted in the courts is going up as we bring these people

:49:22. > :49:24.before the courts. The threat persists in the way that the

:49:25. > :49:29.Secretary of State said, I think she said: Likely for the foreseeable

:49:30. > :49:34.future. I would agree with that assessment but it will not last

:49:35. > :49:39.forever. These people will over time, either give up, or put before

:49:40. > :49:43.the courts and put in jail. So you think there are prospects for

:49:44. > :49:49.change? That this will not go on indefinitely? Over time it is

:49:50. > :49:53.diminishing year on year. There will be a Northern Ireland without this

:49:54. > :49:55.sort of terrorism. I am committed to working there with the police until

:49:56. > :49:58.we see that day. Thank you very much. A short

:49:59. > :50:04.discussion has been had on technology. Now let's move to the

:50:05. > :50:08.cyber threat, in particular how GCHQ uses the internet. Can we begin with

:50:09. > :50:12.a question on the general cyber threat? Could we start on the

:50:13. > :50:19.international aspects of sieb I threat? We have been familiar for a

:50:20. > :50:24.long time with state attacks on the Government and the attempt to get

:50:25. > :50:29.military secrets. We now have corporate attacks. There are also

:50:30. > :50:35.attacks on personal individuals to get their private information.

:50:36. > :50:41.How do you assess the proportion of those and could you give us a again

:50:42. > :50:47.ral description of how you see the cyber threat developing? It is

:50:48. > :50:51.multi`facetted. Let me talk about the actors and impact. Hostile

:50:52. > :50:56.intelligence services, it is important to remember that.

:50:57. > :51:01.Organised groups stealing industrial secrets, academic secrets.

:51:02. > :51:07.Terrorists, activists and criminals. It is seen that there has been

:51:08. > :51:15.increasingly sophisticated criminal access. I would call out the

:51:16. > :51:21.non`stage actors, at the top level, is the engagement by some states,

:51:22. > :51:27.less sophisticated states in terms of strategic weaponry, using cyber

:51:28. > :51:32.as an over the horizon means of projecting disruption. In terms of

:51:33. > :51:36.the impact, I think that I would focus on that industrial espionage

:51:37. > :51:43.aspect. We are seeing attacks against the

:51:44. > :51:47.businesses that keep Britain going. So finances, transport,

:51:48. > :51:52.communications, energy, we are seeing theft from over 20 industrial

:51:53. > :52:00.sectors, research and invasion is targeted. Trade secrets, academic

:52:01. > :52:02.research. Industrial espionage on an industrial scale stealing

:52:03. > :52:08.intellectual property. The response to that has to be a cross`Government

:52:09. > :52:12.one and even beyond Government. So working closely for the centre for

:52:13. > :52:15.the protection of national infrastructure, with the business

:52:16. > :52:21.and invasion and skills department. With the new National Crime Agency

:52:22. > :52:25.and with the Cabinet Office, of course. If we get that team play

:52:26. > :52:31.right, we can be world`class in terms of cyber for the UK. It is

:52:32. > :52:35.about working with industry about building capability so that industry

:52:36. > :52:41.can help. If they can cover some of the territory at home and in an

:52:42. > :52:45.overseas market, we are helping by giving certain services and working

:52:46. > :52:48.with academia to build a cyber generation, to build more skills

:52:49. > :52:59.across the economy. Some would say that the real cyber

:53:00. > :53:04.threat comes from GCHQ, not just from others, seeking to collecting

:53:05. > :53:08.everyone's data and communications. Can I ask you why you think it

:53:09. > :53:16.necessary to collect information on the majority of the public in order

:53:17. > :53:19.to protect us from the minority of potential evil`doers.

:53:20. > :53:25.Thank you. I will work up to that, if I may! To clarify we do not spend

:53:26. > :53:30.our time listening to the telephone calls or reading the e`mails of the

:53:31. > :53:37.vast majority. That would not be legal. We do not do it. It would be

:53:38. > :53:40.nice if serious criminals use a particular method of communication

:53:41. > :53:45.and everybody used something else. That is not the case. It would be

:53:46. > :53:50.nice if we knew who the terrorists or the serious criminals were but

:53:51. > :53:54.the internet is a great way to avoid identification. So we have to do

:53:55. > :53:59.detective work. I will give an analogy. It has been used in the

:54:00. > :54:03.press, but think of the internet as a huge hey field. What we are trying

:54:04. > :54:09.to do is to collect hey from those parts of the field that we can get

:54:10. > :54:14.access to and which may be Luke tif in terms of containing the fromming

:54:15. > :54:19.ms of needles that we may be interested in to help us. When we

:54:20. > :54:23.gather the haystack. It is not from the home field but from a tiny

:54:24. > :54:28.proportion of that field, we are well aware in the haystack that

:54:29. > :54:31.there is lots of hey that is innocent communications from

:54:32. > :54:36.innocent people, not just British but foreign people as well. We have

:54:37. > :54:41.to design the queries to draw out the needles. We do not intrude on

:54:42. > :54:46.the surrounding hey. So we look at the content of the communications,

:54:47. > :54:49.where there are specific legal thresholds and requirements that

:54:50. > :54:55.have been met. That is the reality. We don't want to delve into innocent

:54:56. > :55:00.e`mails and phone calls, and I don't employ the type of people who would

:55:01. > :55:06.do. My people are motivated by saving lives on the lives of those

:55:07. > :55:11.on the battlefield. By preventing terrorists and serious criminals,

:55:12. > :55:14.and if they were asked to snoop, I would not have the workforce, they

:55:15. > :55:19.would leave the building. You have given a very full response.

:55:20. > :55:24.Can I ask if you are able to give that response today, why would the

:55:25. > :55:28.British public not entitled to know you were sifting large amounts of

:55:29. > :55:35.communications data for the kind of purpose that you have just

:55:36. > :55:39.described? Well, I believe a Government's first duty is to

:55:40. > :55:46.protect its people. In some ways it does it that a secret. I don't think

:55:47. > :55:54.that secret manies unaccountable. I think that the affect appointed by

:55:55. > :55:58.an elected government, authorses or operations. There is a Committee

:55:59. > :56:06.that gives oversight. There are the interception of the communications

:56:07. > :56:10.minister and... That is all... That is all within secrecy.

:56:11. > :56:15.I am asking why the British public are not entitled to share with us

:56:16. > :56:20.what you have shared this after noon? I believe that certain

:56:21. > :56:24.information should be secret. I don't think secret means sinister. I

:56:25. > :56:28.would like to hammer that home. It feels strange to say that we have

:56:29. > :56:34.nothing to hide, given we work within the ring of secrecy but that

:56:35. > :56:39.has the oversight, the safeguards in terms of the parliamentary

:56:40. > :56:44.Committee, the minister eel masters, the commissioners and the

:56:45. > :56:47.investigatory powers tribunal to exercise that on behalf of the

:56:48. > :56:51.British public. Are you giving thought as to whether

:56:52. > :56:55.the line you have drawn between the aspects of the way that you operate

:56:56. > :57:01.which have to be kept secret and those that could be shared with the

:57:02. > :57:06.wider public, not just with intelligence`related activities, are

:57:07. > :57:12.you giving thought to whether or not the line can be redrawn, safely?

:57:13. > :57:18.That has been an active debate even before the recent revelations.

:57:19. > :57:22.When the Committee reviews us, with we give evidence, when you produce

:57:23. > :57:34.your report, you seek to produce it in an unredakted report as possible.

:57:35. > :57:39.That has happened over time. Some serious allegations have have

:57:40. > :57:44.been made, many of them directed at GCHQ. Earlier there was an

:57:45. > :57:50.allegations that you were using your relationships with the US services

:57:51. > :57:54.in order to circumvent British law. We did an inquiry, we found it

:57:55. > :57:58.unfounded. I think it important to be clear with the public. Can you

:57:59. > :58:03.give us a guarantee that you do not conduct operations which are out

:58:04. > :58:09.with the British legal framework? Yes, I can give you that guarantee.

:58:10. > :58:14.I belief that is true with we are subject to the law. I am sure that

:58:15. > :58:18.is true of my sister agencies as well.

:58:19. > :58:25.I am aware of your capabilities in the past but not to the int cassis

:58:26. > :58:31.to which Hazel Blears has referred. While we appreciate the co`operation

:58:32. > :58:37.you have with the overseas agencies, can you give assurance that at the

:58:38. > :58:46.earliest time of the closed session, you can give us an update of all

:58:47. > :58:51.with whom you kol abrate with? I think so.

:58:52. > :58:55.I think that the public, the vast majority think that you have the

:58:56. > :59:02.right amount of powers or indeed some think you need more. As usual,

:59:03. > :59:05.the public... That is not necessarily the view of this

:59:06. > :59:09.Committee! I think that the public are sensible around this area, but

:59:10. > :59:14.what the polling shows also is that yes, they support you having the

:59:15. > :59:18.powers but they do want more transparency about the way that the

:59:19. > :59:21.powers are exercised. This is the chairman's point about is there the

:59:22. > :59:24.possibility that whilst maintaining security, absolutely but to have

:59:25. > :59:31.perhaps a more informed dialogue with the public, who often exhibit

:59:32. > :59:36.good common sense on the issues that provide people with the extra degree

:59:37. > :59:42.of reassurance about what all of you are undertaking? Let me help now.

:59:43. > :59:46.The pack answer is that there are good safeguards in place. I believe

:59:47. > :59:52.that to be the truth, but if you are a terrorist, a serious criminal, a

:59:53. > :59:56.prolife rare, a foreign intelligence target or if your activities pose a

:59:57. > :00:02.genuine threat to the national or the economic security of the United

:00:03. > :00:06.Kingdom, there is a possible that your communication will be

:00:07. > :00:09.monitored. We will seek to listen to you. If not, if you are not in

:00:10. > :00:15.contact with one of those people, you will not be. We are not entitled

:00:16. > :00:20.to. That is true whether you are British, foreign and ever are in the

:00:21. > :00:23.world. Would your colleagues like to add to

:00:24. > :00:29.the points raised in this area so far? Andrew Parker? I think that

:00:30. > :00:34.openness is something we are moving down the road of. It is now over 20

:00:35. > :00:40.years we have been open in increasing ways as agencies. The

:00:41. > :00:46.issue about balancing powers and transparency and openness and

:00:47. > :00:49.intrusion versus privacy, so on, all of the balances that are important

:00:50. > :00:55.in a free society, in a domestic like the United Kingdom, these are

:00:56. > :00:59.matters that mainly are for ministers to lead on and for

:01:00. > :01:05.Parliament to set law about, that we then abide by and are overseen in

:01:06. > :01:10.the work that we do. So, these are all live issues now. Of course they

:01:11. > :01:14.are. So there is more openness. That is true for a Parliament and

:01:15. > :01:19.for a Government to decide the matters but often the agencies seem

:01:20. > :01:23.nervous about insisting that something cannot be said in public

:01:24. > :01:27.because of the damage it may do. Do you feel you have taken that

:01:28. > :01:31.argument too far? The reason things are secret is not because we are

:01:32. > :01:35.embarrassed about them or wish to keep them from the public, it is

:01:36. > :01:39.because we need to keep them from the people we are investigating or

:01:40. > :01:44.carrying out operations against, the terrorists, the spies and the pro

:01:45. > :01:49.life rares. If we make it public it is public to them too. Then we lose

:01:50. > :01:54.important operational advantage. That can be fragile. That would

:01:55. > :01:58.leave the UK less safe. The task we are paid to do is to keep the

:01:59. > :02:04.country safe it is a challenging and a difficult work to do. The

:02:05. > :02:10.techniques that we have, if they are compromised. It makes our work then

:02:11. > :02:15.harder. There are always secrets. So the oversight mechanisms can operate

:02:16. > :02:29.on behalf of Parliament and on behalf of the public. I would like

:02:30. > :02:33.to support what they have just said. Every successful company in this

:02:34. > :02:43.country is mastering modern technology. The Internet is an

:02:44. > :02:49.important part of this. We are all trying to use technology to take

:02:50. > :02:59.full advantage of the opportunities to achieve our goals. The safeguard

:03:00. > :03:05.in place are very good. It would be bizarre to think the one area to be

:03:06. > :03:11.excluded from taking full advantage of modern technology is keeping this

:03:12. > :03:17.country safe. We have an extraordinarily difficult task, as

:03:18. > :03:21.Andrew has described. We have to identify and recruit agents in the

:03:22. > :03:26.most exposed places. In countries which are trying to do our country

:03:27. > :03:33.harm. Secret states that are trying to do damage to others. We need to

:03:34. > :03:37.have the possibility of examining intelligence, drawing on information

:03:38. > :03:49.our partner agencies have been ordered to be able to identify those

:03:50. > :03:55.very brave individuals. If you end up diminishing our ability to use

:03:56. > :04:05.technology, you will be less able to have that advantage. You are

:04:06. > :04:13.currently under some criticism. If babies a terrorist incident, you

:04:14. > :04:28.will no doubt be under criticism for not having enough. ` ` if there is a

:04:29. > :04:36.terrorist incident. I wonder whether you have any comments on where you

:04:37. > :04:44.strike that very difficult balance. I think fundamentally, the resonant

:04:45. > :04:57.denture of an organisation like MI5 is to protect the sort of country we

:04:58. > :05:02.live in ` ` rasion d'etre. We pride our individual liberty and privacy.

:05:03. > :05:15.They are extremely important values to the people who work in our

:05:16. > :05:25.agency. Our job is to keep the balance. Sometimes I find MI5 and

:05:26. > :05:36.other agencies being spoken of as if we were on the side of the seesaw.

:05:37. > :05:42.We are trying to help government make balances. It is about keeping

:05:43. > :05:47.this country the sort of country it is. There have been times when

:05:48. > :05:52.successive governments have offered my service greater powers, and we

:05:53. > :05:56.have said they were disproportionate and turned away from them. Making

:05:57. > :06:05.the balances is critically important. Been no recent speech, he

:06:06. > :06:08.said, it causes enormous damage to make public the reach and

:06:09. > :06:17.limitations of GCHQ's techniques, and that such information to the

:06:18. > :06:25.terrorists. You then, it, the gift they need to invade as an strike at

:06:26. > :06:29.will. We appreciate you may be limited in the detail you can go

:06:30. > :06:40.into today. I think the public are entitled to know more about this

:06:41. > :06:46.enormous damage you talked about. Can you give examples, specific

:06:47. > :06:58.examples of how it has been a gift to terrorist? It will be difficult

:06:59. > :07:16.to give in a public session. We can do it in a private session later if

:07:17. > :07:21.you like. It leads to was finding terrorist plots we would not

:07:22. > :07:26.otherwise find, which we can them for walks and that leads to lies

:07:27. > :07:40.being saved. There are real instances of that. If we lose it, we

:07:41. > :07:47.are making a difficult task harder. That is what I meant in the speech.

:07:48. > :07:57.I would like to come in. Going back to the Second World War and beyond,

:07:58. > :08:10.they depend on our terrorist targets being unaware. If sources are

:08:11. > :08:19.revealed, it is inexorable. What we have seen over the last five months

:08:20. > :08:25.is nearly daily discussion. We have seen terrorist groups in the Middle

:08:26. > :08:35.East discussing the revelations of specific terms in terms of

:08:36. > :08:46.communications they use. Do you mean this is online? We have seen chat

:08:47. > :08:50.around specific terrorist groups discussing how to avoid what they

:08:51. > :08:58.now perceived to be communication methods, or how to select

:08:59. > :09:08.communication methods. I will not compound damage by being specific in

:09:09. > :09:12.public. We will ask you in private. Are you saying this is information

:09:13. > :09:17.which refers to the revelations that have appeared in the press in the

:09:18. > :09:25.last 12 months? Absolutely. It is a direct consequence. Bekele to have

:09:26. > :09:43.effect of the media coverage, global media coverage, will make things

:09:44. > :09:56.more difficult. It uncovers terrorist cells. It allows us to

:09:57. > :10:03.reveal the identities of those involved in online sexual

:10:04. > :10:09.exploitation of children. That mosaic is in a far week and place

:10:10. > :10:25.and it was. I think most reasonable people would accept that if people

:10:26. > :10:29.are using these kind of meetings for planning or whatever, we should have

:10:30. > :10:56.access to it. I do not think we have got to the point that people feel

:10:57. > :11:02.reassured. It might have been intercepted. We will not look at it

:11:03. > :11:06.without specific authorisation. Going back to what has appeared in

:11:07. > :11:22.the press here and abroad, it is sometimes argued that if people

:11:23. > :11:37.responsible for these publications, is there any validity? I am not sure

:11:38. > :11:41.the journalists who are managing this very sensitive information are

:11:42. > :11:48.particularly well placed to make those judgements. What I can tell

:11:49. > :11:52.you is that the leaks from Edward Snowden have been very damaging.

:11:53. > :12:00.They have put our operations at risk. It is clear that our

:12:01. > :12:07.adversaries are rubbing their hands in glee. Al`Qaeda is lapping it up.

:12:08. > :12:12.I think we need to hear why you think you are entitled to say that.

:12:13. > :12:15.Why do you believe that to be true? I do not want to repeat what my

:12:16. > :12:23.colleagues have said. They have clearly set out how the alert enough

:12:24. > :12:31.targets to our capabilities means it becomes more difficult to acquiring

:12:32. > :12:35.intelligence we need. Is there any additional information you can share

:12:36. > :12:42.with us is too hard evidence that terrorists or potential terrorists

:12:43. > :12:47.have been looking at these reports or change these plans as a result?

:12:48. > :12:51.Not in this public forum. You will be willing to share that with the

:12:52. > :13:04.committee in a private session? Of course. We have had some discussion

:13:05. > :13:14.about balance already. There was the ability to intervene, and their

:13:15. > :13:19.anxiety about privacy in the public has become greater. One way it can

:13:20. > :13:23.be dealt with is for the public to be satisfied there is a robust legal

:13:24. > :13:30.framework. In that respect, is it the view of any of you that the

:13:31. > :13:38.existing legal framework is adequate to deal with the enormous

:13:39. > :13:42.consequences of the revolution in technology, and if there is to be a

:13:43. > :13:46.public debate as to where the balance will be struck, is that a

:13:47. > :13:56.debate you would be willing to participate in publicly? On that

:13:57. > :14:03.last point, subject to administration, yes. We are not

:14:04. > :14:13.lawmakers. There are strict criteria that provide safeguards to protect

:14:14. > :14:22.privacy. I think it is a false choice. Our job is to provide

:14:23. > :14:33.intelligence around security. Our internal rules reflect what is in

:14:34. > :14:43.the laugh. The laws were drafted to be technology neutral. I think they

:14:44. > :14:48.did a pretty good job. It insists upon necessity and proportionality.

:14:49. > :14:51.They are as relevant now as when the drawers were drafted. They guide the

:14:52. > :14:58.way we work, they guide the way we think. They are within our DNA. If

:14:59. > :15:08.Parliamentary wants to have a debate, fine by me. Proportionality

:15:09. > :15:25.necessarily involves value judgements. They may change. Is it

:15:26. > :15:41.not necessary now to believe the public anxiety? I want to stress the

:15:42. > :15:48.role of the commissioners. We talk to them about our methods, about the

:15:49. > :15:52.way that we work, and this idea that technology has moved on beyond the

:15:53. > :16:00.law, there are few will be important on that. These are the intelligence

:16:01. > :16:07.commissioners who look at the specific legality of processes. Yes,

:16:08. > :16:14.I am sorry. The commissioners, two former senior judges. Unlike us,

:16:15. > :16:22.they do not sit in public. They produce a public report. There

:16:23. > :16:29.is clearly a big debate going on in the united states. I think there is

:16:30. > :16:34.evidence there is a change in behaviour from some of the global

:16:35. > :16:39.communications companies. Are you concerned about the long`term

:16:40. > :16:46.consequences, given the close partnership with the Americans?

:16:47. > :16:57.Yes, I am concerned in terms of cooperation that we might receive. I

:16:58. > :17:04.am concerned about the access that we can lawfully require of

:17:05. > :17:08.communications companies, which is very difficult if they are based

:17:09. > :17:12.overseas. Could I just come back to Sir

:17:13. > :17:16.Menzies Campbell's point full stop people who work for us are public

:17:17. > :17:23.servants. We are committed to working in accordance with the law

:17:24. > :17:27.and of remarkable. We will certainly give some advice about what

:17:28. > :17:32.implications of certain changes might be. But you said the law and

:17:33. > :17:36.we will work within the framework of the law. There was an absolutely

:17:37. > :17:40.clear commitment. When people refer to the legal basis

:17:41. > :17:42.on which you operate, they are normally referring to the

:17:43. > :17:46.intelligence services act, but the results of the Human Rights Act.

:17:47. > :17:49.Could you say something to the extent to which that impacts on the

:17:50. > :17:55.way you carry in your responsibilities? How do you make

:17:56. > :18:00.sure you are complying with that? The founding statutes that our

:18:01. > :18:02.services operate to the intelligence services act and the security

:18:03. > :18:07.services act, are themselves based on the Human Rights Act, Article

:18:08. > :18:11.eight of the right to privacy, but we are talking about for the

:18:12. > :18:15.citizen. Which can only be transgressed for reasons of national

:18:16. > :18:20.security and some other arrangements which are less central to what we're

:18:21. > :18:23.talking about today. But the acts that we want to based on that, and

:18:24. > :18:28.so the Human Rights Act is at the centre and at the foundation of our

:18:29. > :18:31.work. It forms the guiding principles.

:18:32. > :18:38.Before relieved this area of questioning, Lord Butler?

:18:39. > :18:44.One final question on that. Can you see why it is that the public feel

:18:45. > :18:47.that when the last bit of legislation on this was passed in

:18:48. > :18:51.the year 2000, and technology has moved on so fast, and your

:18:52. > :18:56.capabilities have developed so hugely, it is hardly credible that

:18:57. > :19:03.that legislation is still fit for purpose for the modern world.

:19:04. > :19:07.I can see why the question comes up, Lord Butler, of course. But the

:19:08. > :19:14.real issue for us is whether the work we do is sufficiently covered

:19:15. > :19:18.by the law, that it is lawful and we can be sure, there are staff can be

:19:19. > :19:21.sure that what they do is lawful. That is properly overseen and that

:19:22. > :19:27.is rigorous, and as you know, niche of arrangements there are Parliament

:19:28. > :19:31.of the oversight of this committee and our Secretary of State reported

:19:32. > :19:36.to Parliament, the judicial, through the commissioners have spoken of and

:19:37. > :19:41.of course through these editors to ministers do we are accountable.

:19:42. > :19:47.Sometimes it might be helped to bring to life a bit especially

:19:48. > :19:50.publicly because on behalf of Parliament and the public, the

:19:51. > :19:55.report to the public in various ways, but somehow it doesn't get

:19:56. > :20:01.into the public mind that that operates. I can say for six months

:20:02. > :20:02.as a director, this is my fourth formal appearance before the

:20:03. > :20:09.committee giving evidence across a range of subjects, operational,

:20:10. > :20:13.policy, finance, administration. As you all know, I have submitted to

:20:14. > :20:18.you hundreds of pages of material about our work, you have received

:20:19. > :20:20.briefings, I have three visits from the commissioners would have spoken

:20:21. > :20:25.of in that period. I see the Home Secretary is her role as Secretary

:20:26. > :20:29.of State, sometimes two or three times a week. This is very active

:20:30. > :20:34.and rigorous oversight in this collection of arrangements.

:20:35. > :20:39.Sometimes a dozen projected well to the public that this goes on.

:20:40. > :22:16.Could we just switch to another aspect of If part of the role of MI6

:22:17. > :22:19.is to stop would`be terrorists joining organisations, what are you

:22:20. > :22:23.doing to try to deal with this issue, especially because of the

:22:24. > :22:28.risk of these people coming back to the United Kingdom? The agencies

:22:29. > :22:36.work extremely closely together. We don't have the authority, we rely on

:22:37. > :22:40.our partners in MI5 to notify those of individuals of concern. We work

:22:41. > :22:46.with foreign partners in south`east Europe and the Arab world who may be

:22:47. > :22:51.able to help us identify where people are moving to. We have our

:22:52. > :22:55.own connections into the Syrian opposition, where we try to identify

:22:56. > :23:01.where people might have gone to inside Syria. It is a very difficult

:23:02. > :23:05.environment within which to operate. Our strategy to prevent

:23:06. > :23:11.terrorism here in this country is to break the links between potential

:23:12. > :23:18.extremists here and Al`Qaeda ranches overseas. We need a whole range of

:23:19. > :23:31.partnerships to achieve that. Syria is particularly difficult. We have

:23:32. > :23:40.got no partner there. To have any liable intelligence ` ` reliable

:23:41. > :23:51.intelligence about the number of UK citizens who have returned from

:23:52. > :24:02.Syria who have potentially fought in the Syrian war? I think we have a

:24:03. > :24:07.reasonable understanding of that. Low hundreds is the number I think I

:24:08. > :24:10.would use publicly. That is the total number of people who we

:24:11. > :24:14.believe are have are now fighting and people who have come back. Those

:24:15. > :24:19.who have been involved in fighting and combat, we need to take some

:24:20. > :24:23.degree of interest in to check they are not intending to become involved

:24:24. > :24:36.in violence here. Most of them will not put some might. When I asked

:24:37. > :24:41.about the programme before, you said it was not necessarily your consent,

:24:42. > :24:46.but isn't it the case at some of these people coming back from Syria,

:24:47. > :24:50.will have a great kid of kudos in the country and will find it easy to

:24:51. > :24:55.draw vulnerable young people to them and possibly radicalise them? Isn't

:24:56. > :25:03.it really important your service has a role in interface with the present

:25:04. > :25:08.programme? They will be looked up by others in

:25:09. > :25:12.the community. That increases the threat. That may happen, and we have

:25:13. > :25:16.discussed prevent threat matters in the past.

:25:17. > :25:22.I think what you're saying is right in some cases. As far as our

:25:23. > :25:26.interface with the event programme, it is more than that, we overlap

:25:27. > :25:32.into it because these two pillars of contest, the counterterrorist

:25:33. > :25:37.strategy that the government has, or overlapped of prevent and pursue.

:25:38. > :25:39.They are overlapped because of the very phenomenon that you have

:25:40. > :25:46.identified. There are radicalise his around. People who spend time trying

:25:47. > :25:50.to persuade people of the arcade ideology and cause. Where there are

:25:51. > :25:57.vulnerable people to that message, sometimes the joint because of

:25:58. > :26:02.followers. Full to the prevent programme is designed at preventing

:26:03. > :26:07.that. We refer numbers of people into the programme, sometimes with

:26:08. > :26:10.success. Some of those who go to Syria will

:26:11. > :26:18.go because of self`motivation, but others may have been recruited. Do

:26:19. > :26:28.you exercise any surveillance over possible recruiting agents with any

:26:29. > :26:31.more disrupting their activities. Of course we do, because these are

:26:32. > :26:35.some of the people we need to be concerned about is a priority, those

:26:36. > :26:40.are trying to recruit others to violence and terrorism whether

:26:41. > :26:45.overseas or home. Let us move to Iran and North Korea.

:26:46. > :26:50.Lord Butler. Last summer, you said publicly that

:26:51. > :26:53.your assessment was that Iran was two years away from obtaining

:26:54. > :26:59.nuclear weapons. We have now seen some advances and that, and

:27:00. > :27:06.President Rohani saying he is prepared to discuss the programme.

:27:07. > :27:08.That is a dramatic success. Do you regard the intelligence committee as

:27:09. > :27:14.having made a contribution to that advance?

:27:15. > :27:17.Yes, I do. I be careful of what I say because the negotiators are

:27:18. > :27:22.going on in Geneva today as we speak. But I think that the

:27:23. > :27:28.intelligence community has contributed to an understanding of

:27:29. > :27:32.Iran's nuclear programme. It has given our politicians and our

:27:33. > :27:38.negotiators a clear sense of what is actually happening. Some of it is

:27:39. > :27:42.over and reported upon by the international atomic energy

:27:43. > :27:46.authority for stop some of it is done in secret. We don't have a

:27:47. > :27:50.complete picture, but our intelligence is certainly informed

:27:51. > :27:53.that picture. Secondly, the reason why Iran has come back to

:27:54. > :27:58.negotiations is because of the impact of sanctions. We have played

:27:59. > :28:03.an important role in monitoring the sanctions and ensuring that the

:28:04. > :28:11.attempt by Iran to evade the sanctions by using false flag

:28:12. > :28:17.companies or false user certificates for technical equipment, but we are

:28:18. > :28:21.able to disrupt that and work with foreign partners to do so. Thirdly,

:28:22. > :28:26.we have a lot of expertise in the intelligence community, perhaps

:28:27. > :28:29.especially in MI6 about Iran, and that expertise is available to

:28:30. > :28:34.government to understand what is happening in terms of the politics.

:28:35. > :28:38.Very conjugated politics between resident Rohani, the supreme leader,

:28:39. > :28:44.the IR GC, and the various other elements in the complex uranium

:28:45. > :28:50.picture. On Iran, if I may, one of the issues

:28:51. > :28:55.is a serious lack of trust on the international community towards Iran

:28:56. > :28:59.and the reverse. From the point of view of the intelligence agencies,

:29:00. > :29:05.and not just the kingdom, your international allies in this matter,

:29:06. > :29:08.how confident can you be that any commitments Iran might give arising

:29:09. > :29:13.out of successful negotiations would be commitments that could be relied

:29:14. > :29:16.upon? As we all know, the history of the intelligence assessments on

:29:17. > :29:20.weapons of mass destruction elsewhere in the Middle East turned

:29:21. > :29:22.out not to be good. I'm not just referring to the United Kingdom, but

:29:23. > :29:28.the net states and other countries. Is there any reason to be confident

:29:29. > :29:34.that commitments given by Iran to be seen to be enforceable?

:29:35. > :29:36.One thing we can learn from the Iraq experience is that when the

:29:37. > :29:40.International atomic and your authority are involved, that gives a

:29:41. > :29:46.good framework on which to build an understanding. In terms of how you

:29:47. > :29:51.monster sincerity with which commitments are made, we will rely

:29:52. > :29:57.upon organisations like the IEEE to visit, inspect and track what the

:29:58. > :30:04.Iranians are doing. We can do that with issues like the feel cycle. In

:30:05. > :30:09.Richmond facilities, for example. It is more difficult with secret

:30:10. > :30:13.military programmes. Both previous governments like South Africa in

:30:14. > :30:16.1990 or Libya in 2003 dismantled their nuclear weapons programme, we

:30:17. > :30:21.have very clear visibility about what was going on. It will be more

:30:22. > :30:24.difficult in Iran. What is the main lessons you learn

:30:25. > :30:30.from the failures of Iraqi intelligence?

:30:31. > :30:36.The Butler is an expert on this. It is you are asking.

:30:37. > :30:40.We have taken Lord Butler 's report, and it is a bible for us in the way

:30:41. > :30:43.they manage intelligence, assess intelligence, evaluate our agents.

:30:44. > :30:50.There were clearly shortcomings back in 2002, and we have learnt

:30:51. > :30:54.enormously from that. Actually, you point to the Iraq failing, which is

:30:55. > :30:59.very real, but when we look at Syria, Libya, North Korea, the

:31:00. > :31:05.international network of proliferating concerns, the business

:31:06. > :31:13.of proliferation, the record is very good. North Korea, Sir Menzies

:31:14. > :31:18.Campbell. North Korea's nuclear ambitions and

:31:19. > :31:25.ability to provide delivery systems, all that seems unabated. I'm not at

:31:26. > :31:30.asking what resources you devote to North Korea, but may I ask, can I

:31:31. > :31:34.take it it is a country of concern? And it is a country of concern in

:31:35. > :31:43.which cooperative arrangements with other allies are extremely important

:31:44. > :31:48.in allowing judgements to be made? You choose your words with care. Of

:31:49. > :31:53.course North Korea is a very great concern to us and our partners,

:31:54. > :31:59.especially close partners like Japan or the act states, Canada, Australia

:32:00. > :32:07.in that part of the world. North Korea, is not as high and

:32:08. > :32:11.operational priority as us other parts of the world, but we can play

:32:12. > :32:16.a role, we do so, and we share that with the partners must concern.

:32:17. > :32:22.Thank you. The final here are questioning, espionage in the UK.

:32:23. > :32:26.A touch of nostalgia here from an old cold warrior. Does traditional

:32:27. > :32:33.espionage, for example from Russia, still posed a threat that it once

:32:34. > :32:37.did? And bearing in mind one of the more controversial revelations in

:32:38. > :32:44.the press recently, and be true to say that everyone is still spying on

:32:45. > :32:49.everybody else? I'll answer this one fairly briefly.

:32:50. > :32:55.Roundabout 10% of my service's work is devoted to dealing with the

:32:56. > :32:59.security threats that arrive from foreign states, that includes

:33:00. > :33:05.espionage and a bit on counter proliferation and that is relevant

:33:06. > :33:08.in the UK. Most of it is on espionage is by a range of foreign

:33:09. > :33:11.states. It is still a lively business year because there are

:33:12. > :33:15.plenty of countries around the world that take a close interest and an

:33:16. > :33:21.improper one in a security sense, in military affairs here in stealing

:33:22. > :33:26.technology and stealing economic advantage where they can. This is a

:33:27. > :33:27.lively business will stop you mentioned Russia, but there are

:33:28. > :33:52.range countries involved in this. Is there scope for cooperation with

:33:53. > :34:08.Russia? Has that been impeded? Perhaps I could take that one. The

:34:09. > :34:13.government took the series of measures. We have not had the

:34:14. > :34:18.cooperation we sought for. There has been a gap. We have not altered the

:34:19. > :34:45.Russians and they haven't talked to us. We have passed the Olympic flame

:34:46. > :34:51.on from London to so chewy I didn't quite hit an answer about whether F1

:34:52. > :35:05.of spies on others. Question ` ` I didn't quite hear an answer about

:35:06. > :35:11.whether others spy on us. This is the vast bulk of what we deal with.

:35:12. > :35:13.Everything we do is in response to priorities laid down by

:35:14. > :35:19.governments, authorised by government. We have limited

:35:20. > :35:26.resources. There are very few countries where we actually have

:35:27. > :35:31.operations. I am not going to go into detail. What I can tell you is

:35:32. > :35:35.we are targeted against the highest priority challenges this government

:35:36. > :35:40.and this country faces. Everything we do is authorised by ministers.

:35:41. > :35:50.Thank you very much indeed. We are conscious we have not covered

:35:51. > :35:54.everything I would like to thank our three witnesses for the evidence

:35:55. > :35:58.they have given and the manner in which they have given it. We look

:35:59. > :36:04.forward to further the liberations. Can we just one last word?

:36:05. > :36:14.Certainly. You asked about the value of our services. We get great value

:36:15. > :36:21.from the men and women who work for us. These are dedicated, loyal

:36:22. > :36:30.people. They do this work because they believe in protecting the

:36:31. > :36:34.values we have. These people are the backbone of what we do. I am sure we

:36:35. > :36:50.can all happily endorse what you have said. I would be grateful if

:36:51. > :36:54.the audience can remain seated. Remarkable to see Sir Iain Lobban,

:36:55. > :37:04.Andrew Parker and Sir John Sawers giving evidence at Westminster. That

:37:05. > :37:11.session has now finished at Westminster. Frank Gardner was

:37:12. > :37:15.listening to that alongside us. It is a vast area to tackle in 90

:37:16. > :37:26.minutes, Frank. What stood out for you? On the surface of it, it was

:37:27. > :37:31.fairly turgid. There were some very serious issues in there. One of the

:37:32. > :37:38.most important being, let us get to the bottom of Edward Snowden. They

:37:39. > :37:45.were pressed to justify that allegation that the leaks have

:37:46. > :37:48.caused all this damage. They were reluctant to go into detail, at

:37:49. > :37:53.least in front of the cameras. One thing they did give away was they

:37:54. > :37:59.said they have effectively intercepted terrorist communications

:38:00. > :38:05.in, to use their words, the Middle East, South Asia and Afghanistan,

:38:06. > :38:09.work their targets are discussing ways of how to use different

:38:10. > :38:14.communications. They say that is making their job that much harder.

:38:15. > :38:27.The committee was, I think, more robust than it has been in the past.

:38:28. > :38:33.One of the things they said, the GCHQ boss, a man we have never seen

:38:34. > :38:38.in public before, he said, we don't want to delve into innocent e`mails

:38:39. > :38:43.and phone calls, I don't think secret means a sinister. The problem

:38:44. > :38:48.is, they are so secretive, and they have put a lid on everything, they

:38:49. > :38:53.have almost cried wolf and people are not sure how much of this to

:38:54. > :38:58.believe and trust. There was a fascinating insight from Sir John

:38:59. > :39:01.Sawers, the MI6 boss, when he was being asked about difficult

:39:02. > :39:04.decisions working with foreign governments and cooperating with

:39:05. > :39:12.governments that have got perhaps not the same human rights standards

:39:13. > :39:15.as this country, and he said agents overseas will wake up the Foreign

:39:16. > :39:21.Secretary in the middle of the night. You make the point they did

:39:22. > :39:27.not want to go into much detail about the impact of Edward

:39:28. > :39:31.Snowden's leaks. Is it safe to a shame there will be plenty of

:39:32. > :39:34.discussion behind closed doors about that? Will a career to be told more

:39:35. > :39:40.about what they perceive to be the damage? They will. Whether it will

:39:41. > :39:48.be enough to satisfy critics, I am not sure. The committee had been

:39:49. > :39:57.accused of missing quite a few things in the past. They did not put

:39:58. > :40:13.deeply enough about the 7/7 bombings. They had to go back and do

:40:14. > :40:20.more questions. There were more times when more questions should

:40:21. > :40:26.have been asked. The IOC committee now has new powers. It is no longer

:40:27. > :40:36.pointed just by Number Ten. That is a good thing. It is still perceived

:40:37. > :40:42.as a creature of the establishment. Sir Malcolm Rifkind was trying very

:40:43. > :40:49.hard to be robust. He was Foreign Secretary, the man who had overall

:40:50. > :40:54.responsibility under Sir John Major. He had responsibility for GCHQ. He

:40:55. > :40:59.is not like a judge who comes in from outside. Still a lot of

:41:00. > :41:03.questions. I hope they do ask them. I can understand why they do not

:41:04. > :41:10.want to say some things in public. What we take away from this? They

:41:11. > :41:17.kept saying they were public servants, and people are doing it to

:41:18. > :41:27.defend this country. That is their message. And also the fact this was

:41:28. > :41:34.not a fishing exercise. The big question is, is the legal framework

:41:35. > :41:41.adequate, bearing in mind what they are up against now? We did not get

:41:42. > :41:45.an answer. I will give you an answer, and the answer is no, it

:41:46. > :41:54.clearly isn't, because technology is moving so fast. It is a $3 trillion

:41:55. > :42:02.business. The head of GCHQ said the Internet is a challenge for them.

:42:03. > :42:06.There are always going to be prone to people wanting to work outside

:42:07. > :42:17.once they have worked there. MI5 was asked, what about all these links.

:42:18. > :42:22.He said it was much less likely to happen here than in the United

:42:23. > :42:27.States. They were asked, can you give a guarantee that your

:42:28. > :42:34.operations are conducted within the British legal framework, and I think

:42:35. > :42:41.it was the head of GCHQ who said yes, and I speak for the agencies.

:42:42. > :42:43.Only they know that. `the problem is the legal framework has not caught

:42:44. > :42:49.up with technology, and there is still a way to go on that. They need

:42:50. > :42:59.to review it. Frank, thank you very much. Fascinating. It was really

:43:00. > :43:08.interesting. Did you see Judi Dench at the back? I did, it was Margaret

:43:09. > :43:11.Beckett, wasn't it? It was. We will turn our attention and take a look

:43:12. > :43:15.at everything else that has been happening in the news today. And the

:43:16. > :43:19.literary jury is considering its verdict in the court`martial of

:43:20. > :43:23.three Royal Marines. All three deny murdering an Afghan insurgent as he

:43:24. > :43:32.lay badly wounded in a field two years ago. Duncan, explain what has

:43:33. > :43:37.been happening. What we are waiting for, Jane, other

:43:38. > :43:43.verdicts to come back. All three Marines face murder charges. The

:43:44. > :43:50.military board went out this morning. We do not know whether they

:43:51. > :43:51.will come back today or tomorrow. Seven members on that panel deciding