Skip to main content

Concerns about surveillance 'fanciful,' British official says

By Matt Smith, CNN
June 9, 2013 -- Updated 1943 GMT (0343 HKT)
STORY HIGHLIGHTS
  • "Law-abiding" Britons have nothing to fear from surveillance, Hague says
  • U.S. officials defend electronic data collections
  • "There is not a target on Americans," House intelligence chairman says
  • Senator says "the line has been drawn too far" toward invasion of privacy

(CNN) -- British intelligence hasn't broken any laws in sharing data with its American counterparts in counterterrorism efforts, Foreign Secretary William Hague said Sunday.

"The idea that in GCHQ people (British intelligence) are sitting working out how to circumvent a UK law with another agency in another country is fanciful," Hague told the BBC, referring to Britain's communications intelligence agency. "It is nonsense, and I think that I can give people that assurance." GCHQ is the acronym for Government Communications Headquarters, a British intelligence agency.

Hague spoke after a week of revelations about the scale of data-gathering by GCHQ's U.S. counterpart, the National Security Agency. Britain's the Guardian reported Saturday that GCHQ had access to an American data-mining system known as PRISM, suggesting it could "circumvent the formal legal process" required to seek personal data under British law.

Hague didn't confirm or deny whether British intelligence received information from the American programs. But the United States and Britain have shared intelligence since World War II, and Hague said British law "provides for intelligence-gathering that is authorized, necessary, proportionate and targeted -- targeted on what we really need to know."

President Obama defends NSA surveillance
Greenwald: Govt. operates in the dark

NSA leaker comes forward

"The net effect is that if you are a law-abiding citizen of this country, going about your business and your personal life, you have nothing to fear -- nothing to fear about the British state or intelligence agencies listening to the contents of your phone calls or anything like that," he said. "Indeed, you'll never be aware of all the things those agencies are doing to stop your identity being stolen and to stop a terrorist blowing you up tomorrow.

"But if you are a would-be terrorist or the center of a criminal network or a foreign intelligence agency trying to spy on Britain, you should be worried, because that is what we work on," he continued. "And we are, on the whole, quite good at it."

How does it affect me?

Wednesday, the Guardian disclosed a secret order from a U.S. intelligence court that required Verizon Business Network Services to give telephone records detailing the time, location and telephone numbers involved in domestic calls from April 25 to July 19. Thursday, the Washington Post and the Guardian disclosed the existence of PRISM, reporting that the program allows NSA analysts to extract details of customer activities -- including "audio and video chats, photographs, e-mails, documents" and other materials -- from computers at Microsoft, Google, Apple and other Internet firms.

In the wake of the revelations, the U.S. government declassified some details of the programs and defended the programs as both legal and valuable to heading off the threat of terrorism. Director of National Intelligence James Clapper said Saturday the surveillance programs are "conducted under authorities widely known and discussed, and fully debated and authorized by Congress."

"In a rush to publish, media outlets have not given the full context -- including the extent to which these programs are overseen by all three branches of government," Clapper said.

Data mining revelation opens political Pandora's box

U.S. officials said earlier that phone-call data isn't looked at unless investigators sense a tie to terror, and only then on the authority of a judge. Officials say analysts are forbidden from collecting the Internet activity of American citizens or residents, even when they travel overseas. And President Barack Obama tried to reassure Americans about the programs Friday, saying, "Nobody is listening to your telephone calls."

Clapper's office called PRISM "an internal government computer system used to facilitate the government's statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision." It was created in 2008, targets "foreign targets located outside the United States" and gets reviewed by the administration, Congress and judges.

"There is not a target on Americans," Rep. Mike Rogers, the chairman of the House Intelligence Committee, told reporters Sunday.

"There has to be a non-U.S. person believed to be on foreign soil. That is a huge difference than what is being portrayed in the media," said Rogers, R-Michigan.

But Colorado Democratic Sen. Mark Udall, who's long called for greater transparency in how the government collects data on Americans, said the legal authority should be reopened for debate after last week's disclosures.

Some shrug at snooping: Privacy's already dead

"Maybe Americans think this is OK, but I think the line has been drawn too far towards 'We're going to invade your privacy,' versus 'We're going to respect your privacy,' " Udall told CNN's "State of the Union."

Udall is a member of the Senate Intelligence Committee. He and Sen. Ron Wyden, D-Oregon, have criticized the scope of the classified programs that allow the collection of Americans' phone records -- but have been limited in what they could say publicly.

Udall told CNN that claims that the monitoring has thwarted terrorist attacks are overblown.

"It's unclear to me we've developed any intelligence through the metadata program that's led to the disruption of plots that could have been attained through other means," Udall said, pushing back on assertions by both administration officials and Republican Intelligence Chairman Mike Rogers that a specific plot was stopped using the massive collection of phone records.

Opinion: Where's the evidence that data mining saves lives?

CNN's Kevin Liptak contributed to this report.

ADVERTISEMENT
Part of complete coverage on
Data mining & privacy
June 23, 2013 -- Updated 1425 GMT (2225 HKT)
He's a high-school dropout who worked his way into the most secretive computers in U.S. intelligence as a defense contractor.
May 29, 2014 -- Updated 1226 GMT (2026 HKT)
Traitor or patriot? Low-level systems analyst or highly trained spy?
May 29, 2014 -- Updated 1927 GMT (0327 HKT)
What are the takeaways from Snowden's NBC interview? You might be surprised.
April 18, 2014 -- Updated 1152 GMT (1952 HKT)
Months after accepting asylum in Russia, Snowden asked Putin about Moscow's own surveillance practices.
March 12, 2014 -- Updated 1643 GMT (0043 HKT)
A federal judge has refused the Obama administration's request to extend storage of classified NSA telephone surveillance data beyond the current five-year limit.
March 10, 2014 -- Updated 0044 GMT (0844 HKT)
From his sanctuary in the Ecuadorian embassy in London, Julian Assange said that everyone in the world will be just as effectively monitored soon -- at least digitally.
March 11, 2014 -- Updated 0039 GMT (0839 HKT)
In a rare public talk via the Web, fugitive NSA leaker Edward Snowden urged a tech conference audience to help "fix" the U.S. government's surveillance of its citizens.
August 2, 2013 -- Updated 0355 GMT (1155 HKT)
The White House is "very disappointed" that National Security Agency leaker Edward Snowden has been granted temporary asylum in Russia.
December 10, 2013 -- Updated 1357 GMT (2157 HKT)
Spies with surveillance agencies in the U.S. and U.K. infiltrated video games like "World of Warcraft" in a hunt for terrorists "hiding in plain sight" online.
August 2, 2013 -- Updated 1139 GMT (1939 HKT)
Bradley Manning and Edward Snowden both held jobs that gave them access to some of their country's most secret and sensitive intelligence. They chose to share that material with the world and are now paying for it.
August 1, 2013 -- Updated 1435 GMT (2235 HKT)
The NSA's controversial intelligence-gathering programs have prevented 54 terrorist attacks around the world, including 13 in the United States.
August 1, 2013 -- Updated 1854 GMT (0254 HKT)
You've never heard of XKeyscore, but it definitely knows you. The National Security Agency's top-secret program essentially makes available everything you've ever done on the Internet.
August 18, 2013 -- Updated 1304 GMT (2104 HKT)
You may have never heard of Lavabit and Silent Circle. That's because they offered encrypted (secure) e-mail services, something most Americans have probably never thought about needing.
July 24, 2013 -- Updated 1854 GMT (0254 HKT)
"Any analyst at any time can target anyone. Any selector, anywhere ... I, sitting at my desk, certainly had the authorities to wiretap anyone."
July 2, 2013 -- Updated 1356 GMT (2156 HKT)
President Barack Obama responds to outrage by European leaders over revelations of alleged U.S. spying.
April 1, 2014 -- Updated 1448 GMT (2248 HKT)
Browse through a history of high-profile intelligence leaking cases.
July 2, 2013 -- Updated 1437 GMT (2237 HKT)
Former President George W. Bush talks Snowden, AIDS, Mandela and his legacy.
June 26, 2013 -- Updated 1304 GMT (2104 HKT)
Edward Snowden took a job with an NSA contractor in order to gather evidence about U.S. surveillance programs.
June 19, 2013 -- Updated 1047 GMT (1847 HKT)
With reports of NSA snooping, many people have started wondering about their personl internet security.
August 14, 2013 -- Updated 1352 GMT (2152 HKT)
Click through our gallery to learn about other major leaks and what happened in the aftermath.
June 9, 2013 -- Updated 2002 GMT (0402 HKT)
What really goes on inside America's most secretive agency? CNN's Chris Lawrence reports.
ADVERTISEMENT