PDF Version



                                                        S. Hrg. 109-701
 
     CATCHING TERRORISTS: THE BRITISH SYSTEM VERSUS THE U.S. SYSTEM

=======================================================================

                                HEARING

                                before a

                          SUBCOMMITTEE OF THE

            COMMITTEE ON APPROPRIATIONS UNITED STATES SENATE

                       ONE HUNDRED NINTH CONGRESS

                             SECOND SESSION

                               __________

                            SPECIAL HEARING

                   SEPTEMBER 14, 2006--WASHINGTON, DC

                               __________

         Printed for the use of the Committee on Appropriations


  Available via the World Wide Web: http://www.gpoaccess.gov/congress/
                               index.html



                    U.S. GOVERNMENT PRINTING OFFICE
30-707                      WASHINGTON : 2006
_____________________________________________________________________________
For Sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov  Phone: toll free (866) 512-1800; (202) 512ÿ091800  
Fax: (202) 512ÿ092250 Mail: Stop SSOP, Washington, DC 20402ÿ090001
                               __________
                      COMMITTEE ON APPROPRIATIONS

                  THAD COCHRAN, Mississippi, Chairman
TED STEVENS, Alaska                  ROBERT C. BYRD, West Virginia
ARLEN SPECTER, Pennsylvania          DANIEL K. INOUYE, Hawaii
PETE V. DOMENICI, New Mexico         PATRICK J. LEAHY, Vermont
CHRISTOPHER S. BOND, Missouri        TOM HARKIN, Iowa
MITCH McCONNELL, Kentucky            BARBARA A. MIKULSKI, Maryland
CONRAD BURNS, Montana                HARRY REID, Nevada
RICHARD C. SHELBY, Alabama           HERB KOHL, Wisconsin
JUDD GREGG, New Hampshire            PATTY MURRAY, Washington
ROBERT F. BENNETT, Utah              BYRON L. DORGAN, North Dakota
LARRY CRAIG, Idaho                   DIANNE FEINSTEIN, California
KAY BAILEY HUTCHISON, Texas          RICHARD J. DURBIN, Illinois
MIKE DeWINE, Ohio                    TIM JOHNSON, South Dakota
SAM BROWNBACK, Kansas                MARY L. LANDRIEU, Louisiana
WAYNE ALLARD, Colorado
                      Bruce Evans, Staff Director
              Terrence E. Sauvain, Minority Staff Director
                                 ------                                

                   Subcommittee on Homeland Security

                  JUDD GREGG, New Hampshire, Chairman
THAD COCHRAN, Mississippi            ROBERT C. BYRD, West Virginia
TED STEVENS, Alaska                  DANIEL K. INOUYE, Hawaii
ARLEN SPECTER, Pennsylvania          PATRICK J. LEAHY, Vermont
PETE V. DOMENICI, New Mexico         BARBARA A. MIKULSKI, Maryland
RICHARD C. SHELBY, Alabama           HERB KOHL, Wisconsin
LARRY CRAIG, Idaho                   PATTY MURRAY, Washington
ROBERT F. BENNETT, Utah              HARRY REID, Nevada
WAYNE ALLARD, Colorado               DIANNE FEINSTEIN, California

                           Professional Staff
                             Rebecca Davies
                              Carol Cribbs
                            Shannon O'Keefe
                             Nancy Perkins
                           Mark Van de Water
                       Charles Kieffer (Minority)
                        Chip Walgren (Minority)
                         Scott Nance (Minority)
                      Drenan E. Dudley (Minority)

                         Administrative Support

                            Christa Crawford


                            C O N T E N T S

                              ----------                              
                                                                   Page

Opening Statement of Senator Judd Gregg..........................     1
Statement of Hon. Richard A. Posner, Federal Judge, U.S. Court of 
  Appeals for the Seventh Circuit and Senior Lecturer, University 
  of Chicago Law School..........................................     2
    Prepared Statement of........................................     4
Statement of John Yoo, Professor of Law, Boalt Hall School of 
  Law, University of California at Berkeley......................     9
    Prepared Statement of........................................    11
Statement of Tom Parker, CEO, Halo Partnership Consulting, Former 
  British Counterterrorism Official..............................    16
    Prepared Statement of........................................    19
Statement of Senator Robert C. Byrd..............................    29


     CATCHING TERRORISTS: THE BRITISH SYSTEM VERSUS THE U.S. SYSTEM

                              ----------                              


                      THURSDAY, SEPTEMBER 14, 2006

                               U.S. Senate,
                 Subcommittee on Homeland Security,
                               Committee on Appropriations,
                                                    Washington, DC.
    The subcommittee met at 9:27 a.m., in room SD-192, Dirksen 
Senate Office Building, Hon. Judd Gregg (chairman) presiding.
    Present: Senators Gregg, Allard, and Byrd.


                opening statement of senator judd gregg


    Senator Gregg. We will begin the hearing. The subcommittee 
understands Senator Byrd will be here, but probably not for a 
few minutes.
    We are very appreciative of our witnesses attending today. 
This committee has viewed the issue of homeland security as 
first and foremost an issue of obtaining the intelligence 
necessary in order to stop an attack before it occurs. We have 
worked very hard to change the mind set of the Federal 
Government and our local and State law enforcement community, 
which has always been a reactive mind set, where a crime occurs 
and the Government then comes forward through the FBI or 
through the local police and tries to determine the culprits 
and bring them to justice.
    That mind set does not work in the context of the threat 
that America faces today, which is a terrorist act, because a 
terrorist act once it occurs will create such harm and damage, 
as we saw on 9/11, as we have seen England and other nations 
such as in Spain in Madrid. A terrorist act cannot be 
tolerated, so a legal system which is structured around the 
concept of having an event occur and then having the criminals 
brought to justice is a legal system which is not capable of or 
appropriate to the threat that we have today.
    The question becomes for us how within our constitutional 
limitations, which are obviously critical and which is what we 
are fighting for, how within those constitutional limitations 
will we expand our capability to obtain intelligence to be able 
to thwart an attack. The English system appears to have taken 
significant strides in this area. England, of course, functions 
under a common law system, not under a constitutional system, 
and does not have a Bill of Rights, although they obviously 
have rights which have been evolved over time, and our Bill of 
Rights arguably came in large part from those common law 
rights.
    But the English system has evolved to the point where they 
do have the capability to pursue a potential threat more 
aggressively than we appear to be able to pursue it prior to 
the event occurring. The question that this subcommittee would 
like to pursue with this extraordinarily talented panel is are 
there within the context of our constitutional structure 
actions which we can take which would replicate or take 
advantage of the experience of the English system and the 
English successes, which are considerable, as we just recently 
saw with the situation relative to the bombing of the aircraft 
which did not occur, thank goodness.
    So we have brought together this panel today to give us 
some thoughts on this. We are also interested, should the panel 
wish to comment on it, and we can do this in the question 
period as to the panel's reaction if it has any, to the debate 
which is ongoing right now over the Hamdan decision and how we 
use electronic eavesdropping in order to effectively 
interrogate and learn what the potential information there 
might be from prisoners who we have captured in this war on 
terror.
    But initially we want to get into this discussion of 
American procedure relative to British procedure and where 
America can learn from the British situation legally and what 
are the limitations on the American system that the British 
system does not have and how can we take advantage of the 
experience of the British system and still do so in the context 
of our constitutional structure.
    We have, as I said, a very distinguished panel today: the 
Honorable Richard Posner, Seventh Circuit Court of Appeals 
Judge and a Senior Lecturer for the University of Chicago, a 
person of international reputation on issues such as this; John 
Yoo, a Professor of Law at the University of California at 
Berkeley, also an expert in this area of national prominence; 
and Mr. Tom Parker, who is CEO of the Halo Partnership and a 
former British counterterrorism official.
    So we would like to begin with you, Judge Posner, and then 
we will move to Mr. Yoo and then to Mr. Parker. So please, we 
would like to hear your testimony.

STATEMENT OF HON. RICHARD A. POSNER, FEDERAL JUDGE, 
            U.S. COURT OF APPEALS FOR THE SEVENTH 
            CIRCUIT AND SENIOR LECTURER, UNIVERSITY OF 
            CHICAGO LAW SCHOOL
    Judge Posner. Well, thank you very much, Mr. Chairman. Am I 
audible?
    Senator Gregg. Yes.
    Judge Posner. So in my 5-minute summary I will be very, 
very brief. I want to make just three----
    Senator Gregg. If you need more time, take it.
    Judge Posner. Okay. Well, I will be very brief and I can 
amplify afterwards. I want to make three points: first, that, 
contrary to public impression, we can do almost everything that 
the British do within the limits of the Constitution; second, 
that I think we are overinvested in the criminal justice system 
as a way of dealing with terrorism; and third, that the biggest 
lesson perhaps we can learn from Britain is the need for a 
domestic intelligence service that would be separate from the 
FBI.
    On the first point, our political and legal culture is of 
course derivative from England's and when Americans go to 
England they do not feel that they are stepping into some 
lawless society because the Bill of Rights has not followed 
them to England. In fact, as I explain in my prepared 
testimony, the innovative anti-terrorist measures used by 
England might violate an American statute, which of course 
Congress could change, but would not violate the Constitution.
    I want to give just one example of this which seems to me 
the most important and that is the British rule that permits 
detention of terrorist suspects for 28 days without formal 
charges being lodged, and the popular reaction to this is that 
we could not have--we could not do anything like this, because 
our Constitution requires that a suspect be charged within 48 
hours.
    That simply is incorrect. First of all, there is nothing in 
the Constitution that says anything about 48 hours or prompt 
hearings. The Supreme Court has, by way of free interpretation 
of due process, has said that normally a suspect has to be 
charged within 48 hours, given a probable cause hearing within 
48 hours, but that if the government can show a bona fide 
emergency or other exceptional circumstances then it can hold 
the person longer without the probable cause hearing.
    I think it would be very constructive for Congress to enact 
a statute which would specify a period of days, like 28 or 38 
days, that would be appropriate for detention if there were a 
real emergency, as there is in many terrorist situations. And I 
give other examples in my prepared testimony.
    My second point about overinvestment in the criminal 
justice system, I am echoing some remarks that the chairman 
made. We have not really had a very happy experience with 
prosecuting terrorists in the ordinary criminal courts and the 
reason is that the criminal justice system has been designed 
with ordinary criminal conduct in mind. It has not been tailor-
made to special problems of terrorism. We have seen in the 
prosecutions the problems that our use of the criminal justice 
system involves: public trials which can become platforms for 
terrorists to preen themselves on martyrdom and so on; the 
making public of information that may tip off terrorists about 
investigative methods and knowledge of the government; and also 
the fact it is very difficult to deter terrorists by threat of 
criminal punishment if they are fanatics.
    So we should be thinking about alternative, even more than 
we are, thinking about alternatives to the criminal justice 
system as a way of dealing with terrorists, even in the United 
States, where we cannot use military action or covert action.
    That brings me to my third point, about our need for a 
domestic intelligence agency separate from the FBI. There is an 
op-ed piece in the New York Times this morning by the public 
affairs officer of the FBI in which he intimates, he does not 
quite say, that I advocate breaking up the FBI. Absolutely not. 
I would not disturb the FBI in the least. I think it needs to 
be supplemented by an agency that is not tied to the criminal 
law enforcement system the way the FBI is.
    The FBI criminal investigation agency. The training of its 
agents, its culture, its traditions, are all oriented toward 
arresting people and preparing evidence to enable them to be 
convicted. That is fine. We need that, but we also need an 
agency that is focused exclusively on intelligence, not using 
the methods of criminal law enforcement. So MI5 does not have 
arrest powers. The Canadian Security Intelligence Service, 
which is the counterpart to MI5 in Canada, does not have arrest 
powers. An agency which can focus exclusively on intelligence-
gathering, infiltration, surveillance, disinformation, 
penetration, that is a very valuable adjunct to our efforts and 
can get around a lot of the difficulties that our criminal 
justice system encounters when it tries to deal with 
terrorists.
    This detention for 28 or 30 days that I mentioned where I 
think we can emulate the United Kingdom, I see the real 
significance of this as ancillary to intelligence rather than 
to criminal justice enforcement, because if you are chasing 
terrorists and you seize one you want to be able to question 
this person without tipping off his accomplices that you have 
him and keeping him in isolation for a few weeks is going to 
make it easier to obtain information from him.
    So let us think in terms of alternatives to criminal 
justice system and let us also not exaggerate the 
constitutional limitations on our borrowing from England. Just 
one second more on this. We should recognize that the United 
Kingdom has a much longer history than the United States in 
dealing with terrorist threats. In fact, it goes back at least 
as far as the 16th century, and England has had some very 
important successes, for example in World War II against German 
espionage, later against the Irish Republican Army. So we 
should not be provincial, we should not be too proud to learn 
from the experience of foreign countries, especially a country 
like England, which, as I say, is the source of our own legal 
and political culture.
    Thank you, Mr. Chairman.
    [The statement follows:]

                Prepared Statement of Richard A. Posner

    I am honored \1\ to have been asked to appear before the 
subcommittee to testify concerning this important subject. We must not 
be provincial in our response to the threats to our national security 
that are posed by global terrorism in an era of proliferation of 
weapons capable of inflicting catastrophic harm. We must not be too 
proud to learn from nations such as the United Kingdom that have a much 
longer history of dealing with serious terrorist threats than the 
United States has. Queen Elizabeth I faced serious threats from 
religious fanatics eager for martyrdom dispatched to England by foreign 
powers with which England was at war in the sixteenth century. Germany 
peppered England with spies during World War II. The Irish Republican 
Army waged clandestine war against England for decades. And today 
England faces at least as serious an internal threat of Islamist 
terrorism as the United States does.
---------------------------------------------------------------------------
    \1\ A brief biographical sketch of Judge Posner is appended at the 
end of this statement for background.
---------------------------------------------------------------------------
    The United Kingdom is a particularly apt model for us to consider 
in crafting our counterterrorist policies because our political and 
legal culture is derivative from England's. The major difference is our 
Bill of Rights, which has no direct counterpart in English law, though 
the difference between our two constitutional cultures is narrowing 
because of England's having signed the European Convention on Human 
Rights.
    In considering the effect of the Bill of Rights on measures to 
combat terrorism, it is important that we bear in mind the difference 
between what the Bill of Rights actually says and how the Supreme Court 
has interpreted its words, because judicial interpretations of the 
Constitution are mutable, whereas the words themselves can be changed 
only by the cumbersome procedures for amending the Constitution. 
Important too that we bear in mind the tradition of flexible 
interpretation of the Constitution that permits departures from as well 
as judicial elaborations of the literal language of the document, and 
the essential role of balancing competing interests as a technique of 
flexible interpretation. I have argued in my recent book Not a Suicide 
Pact \2\ that in relation to measures, especially measures initiated by 
or concurred in by Congress, to protect the national security against 
terrorist threats, the Constitution should be regarded as a loose 
garment rather than a straitjacket, a protection against clear and 
present dangers to civil liberties rather than the platform of the 
American Civil Liberties Union. Judges in our system are (with rare 
exceptions) generalists rather than specialists. Very few of us have 
extensive knowledge of the scope and gravity of the terrorist menace 
and of the efficacy and limitations of alternative measures for coping 
with terrorism, and we should be cautious therefore in setting our 
judgment against that of the officials and staffs of the executive and 
legislative branch, who have the relevant expertise.
---------------------------------------------------------------------------
    \2\ Richard A. Posner, Not a Suicide Pact: The U.S. Constitution in 
a Time of National Emergency (2006).
---------------------------------------------------------------------------
    The United Kingdom is a liberal democracy, like the United States, 
and Americans living in the United Kingdom, and therefore fully subject 
to English law, do not walk in fear that they are at the mercy of a 
secret police. Yet England has deployed both before but especially 
after September 11, 2001, counterterrorism measures that frighten our 
civil libertarians. These include: \3\
---------------------------------------------------------------------------
    \3\ The sources on which this summary is based include Antonio 
Vercher, Terrorism in Europe: An International Comparative Legal 
Analysis (1992); Peter Chalk and William Rosenau, Confronting the 
``Enemy Within'': Security Intelligence, the Police, and 
Counterterrorism in Four Democracies (2004); Dana Keith, ``In the Name 
of National Security of Insecurity? The Potential Indefinite Detention 
of Noncitizen Certified Terrorists in the United States and the United 
Kingdom in the Aftermath of September 11, 2001,'' 16 Florida Journal of 
International Law 405 (2004); Jeremie J. Wattellier, Note, 
``Comparative Legal Responses to Terrorism: Lessons from Europe,'' 27 
Hastings International and Comparative Law Review 397 (2004); Kent 
Roach, ``Must We Trade Rights for Security? The Choice between Smart, 
Harsh, or Proportionate Security Strategies in Canada and Britain,'' 27 
Cardozo Law Review 2151 (2006); Laura K. Donohue, ``Anglo-American 
Privacy and Surveillance,'' 96 Journal of Criminal Law and Criminology 
1059 (2006).
---------------------------------------------------------------------------
  --conducting criminal trials without a jury if there is fear of 
        jurors' being intimidated by accomplices of the defendant;
  --placing persons suspected of terrorism under ``control orders'' 
        that require them as an alternative to being detained to 
        consent to being questioned or monitored electronically or 
        forbidden to associate with certain persons, and that limit 
        their travel;
  --detaining terrorist suspects for up to 28 days (with judicial 
        approval) for questioning without charges being lodged;
  --deportation proceedings from which the alien and his lawyer may be 
        excluded--the alien need not be fully informed of the reasons 
        for deporting him and ``his'' lawyer is appointed by and, more 
        important, is responsible to the government rather than to the 
        defendant and secret evidence may be concealed from the 
        defendant
  --indefinitely detaining aliens who have been ordered deported but 
        cannot actually be removed from the country (there may be no 
        country willing to take them);
  --criminalizing the indirect encouragement of terrorism as by 
        ``glorifying'' terrorism by a statement implying that it would 
        be good to emulate the glorified activity;
  --issuance of search warrants by security officials rather than by 
        judges;
  --traffic analysis and other data mining of Internet communications 
        without a warrant \4\ (Internet Service Providers are required 
        to install devices to enable Internet communications to be 
        intercepted in transit)--a warrant is required to read an 
        intercepted communication, but it may be granted by an official 
        rather than by a judge.
---------------------------------------------------------------------------
    \4\ A warrant is not required ``to monitor patterns, such as web 
sites visited, to and from whom email is sent, which pages are 
downloaded, of which discussion groups a user is a member, and which 
chat rooms an individual visits.'' Donohue, note 3 above, at 1179-1180.
---------------------------------------------------------------------------
    A majority of these measures, while they might if adopted by our 
government violate Federal statutes, would not violate our 
Constitution. The Constitution gives illegal aliens much more limited 
rights in deportation proceedings than they or citizens would enjoy in 
criminal proceedings; allows criminal suspects to negotiate for 
``control'' orders in lieu of incarceration; and, contrary to a 
widespread impression, does not require that searches be conducted by 
warrants, whether issued by judges or (other) officials, but only that 
searches be ``reasonable'' (this is patent in the text of the Fourth 
Amendment), and does not require that a criminal suspect must always be 
brought before a magistrate for a probable-cause hearing within 48 
hours of his arrest. Not only is there no such requirement anywhere in 
the text of the Constitution, but the Supreme Court, while imposing 
this requirement by way of free interpretation of the due process 
clauses, has created an exception for cases of ``bona fide emergency or 
other extraordinary circumstance.'' \5\
---------------------------------------------------------------------------
    \5\ County of Riverside v. McLaughlin, 500 U.S. 44, 57 (1991).
---------------------------------------------------------------------------
    That exception is potentially very important, and codifying it 
should in my opinion be a priority in the congressional deliberations 
on strengthening our laws against terrorism. The government may have a 
compelling justification for holding a terrorist suspect incommunicado 
for longer than 48 hours: to avoid tipping off his accomplices that the 
government has caught him, while meanwhile extracting from him 
information that it can use to arrest those accomplices before their 
suspicions are aroused. It may even be possible during this period of 
extended detention to ``turn'' him, so that he becomes a double agent, 
spying on his erstwhile accomplices; recruiting a double agent tends to 
be a protracted process and one that must for obvious reasons be 
conducted in secrecy. Holding a terrorist suspect incommunicado also 
facilitates interrogation without crossing the line that separates 
permissible interrogation tactics from torture and other impermissibly 
coercive methods, simply because a detainee who is isolated, with no 
access to a lawyer, can more easily be persuaded to provide information 
sought by the government.
    How much longer than 48 hours should it be permissible to detain a 
terrorist suspect? That would depend on how likely it is that 
protracted detention would yield significant benefits for national 
security in the form of additional arrests or of a fuller detection, 
penetration, and disruption of ongoing terrorist activities or 
preparations. There must be limits. The longer the period of detention, 
the greater the hardship to the person detained (who may after all be 
innocent) and the less likely further detention is to yield significant 
information or other benefits. The benefits diminish with time, and the 
costs increase; when the curves cross, the detainee should be brought 
before a judicial officer for a determination of whether further 
detention would be proper. There should be a fixed outer limit; 28 days 
might be the place to start in fixing such a limit.
    The English measures that would most clearly run afoul of current 
constitutional interpretations are conducting criminal trials without a 
jury and forbidding the ``glorifying'' of terrorism unless the 
glorification amounts to an incitement to imminent terrorist activity. 
Yet the ``unless'' qualification is significant, as ``glorifying'' that 
came within it would be punishable under U.S. law, so that the 
objection to punishing the glorification of terrorism is not so much to 
the principle of the English law as to the vagueness of the word 
``glorifying.'' And as for criminal trials without a jury, this 
requirement of the Bill of Rights can be bypassed by trying suspected 
terrorists before military commissions, where there is no right to a 
jury. How far such commissions can go to relax the constitutional 
constraints required in orthodox criminal trials is an unsettled 
constitutional issue. It will not be resolved until Congress enacts a 
law authorizing such commissions, which at this writing seems imminent.
    I conclude that, as a matter of constitutional law, Congress and 
the President can if they want go a considerable distance in the 
direction of English counterterrorist law. It then becomes a question 
of policy how far we should go in that direction. And that question in 
turn depends on how salient a role the formal legal system, and in 
particular the criminal justice system, should play in the fight 
against terrorism. My own view is that we are overinvested in criminal 
law as a response to terrorism and should be trying to deemphasize 
(though not of course abandon) the effort to prevent terrorism by means 
of criminal prosecutions, especially in the regular courts, which are 
not designed for the trial of persons, whether military or civilian, 
who present a serious threat to national security. We should be making 
less use of devices such as the warrant that are used mainly in 
criminal law enforcement and more use of executive and legislative 
oversight to curb abuses of counterterrorism, and we should be focusing 
more of our domestic security efforts on intelligence as a means of 
detecting and disrupting terrorist plots without necessarily 
prosecuting the plotters.
    It is telling that no one was ever tried by the military 
commissions set up in the wake of 9/11 \6\ and that criminal 
prosecutions of terrorists have been few and often trivial,\7\ have had 
no demonstrated impact on the terrorist menace, and indeed seem to be 
petering out.\8\ Contemporary international terrorists are difficult to 
deter, not only because many of them are suicide attackers but also 
because most political criminals expect (with considerable basis in 
history) to be released from prison, as part of a swap for hostages or 
a political settlement, before completion of their terms. Locking up 
terrorists (those who survive their terrorist escapades) has only a 
limited preventive effect because the supply of terrorists is at 
present effectively unlimited. And criminal trials, being public, 
provide platforms for terrorists to broadcast their goals and preen 
themselves as martyrs and yield information about investigative methods 
that may enable future terrorists to evade detection.
---------------------------------------------------------------------------
    \6\ A failure that may have contributed to the government's losing 
Hamdan v. Rumsfeld, 126 S. Ct. 2749 (2006). Had the Court had before it 
a judgment in a trial before a military commission, it might have been 
persuaded that the commission's procedures were adequate to prevent 
miscarriages of justice. Of course the Court can also be criticized for 
its impatience in refusing to hold its fire until a trial had been held 
that could have lent concreteness to the Court's consideration of the 
legal issues.
    \7\ According to a recent study, ``the median sentence for those 
convicted [since the 9/11 attacks] in what were categorized as 
`international terrorism' cases--often involving lesser changes like 
immigration violations or fraud--was 20 to 28 days, and many received 
no jail time at all.'' Eric Lichtblau, ``Study Finds Sharp Drop in the 
Number of Terrorism Cases Prosecuted,'' New York Times, Sept. 4, 2006, 
p. A7.
    \8\ Id.; Dan Eggen, ``Terrorism Prosecutions Drop: Analysis Shows a 
Spike after 9/11, Then a Steady Decline,'' Washington Post, Sept. 4, 
2006, p. A6.
---------------------------------------------------------------------------
    Fortunately, if a terrorist plot is detected, often it can be 
neutralized without prosecution of the plotters. Some can be deported, 
some held in administrative detention, some ``turned'' to work for us, 
some discredited in the eyes of their accomplices, some paid off, some 
frightened into neutrality, some sent off on wild-goose chases by 
carefully planted disinformation, and some carefully monitored in the 
hope that they will lead us to their accomplices. The greatest value of 
allowing detention of terrorist suspects for more than 48 hours is not 
to facilitate prosecution but to support the intelligence function by 
enabling the government to obtain more complete and timely information 
concerning the scope, direction, timing, personnel, and links to other 
networks of the terrorist project that has been detected.
    Of course there are incorrigibles who must be prosecuted. But if 
they are truly threats to national security they can be prosecuted 
outside the ordinary criminal justice system, for example by military 
commissions if properly configured to comply with the Supreme Court's 
strictures.
    My concern with our overinvestment in the criminal law response to 
terrorism brings me to the most important lesson that we can learn from 
the English, and that is the need to have a domestic intelligence 
agency that is separate from a police force. The United Kingdom, like 
virtually all nations except the United States, has long had such an 
agency (the Security Service, popularly known as ``MI5'' because it 
originated a century ago as a branch of military intelligence). MI5 has 
no arrest powers--it is a pure intelligence agency--but works closely 
with Scotland Yard's Special Branch. It apparently played a major role 
in breaking up the Heathrow plot, and it had earlier succeeded in 
foiling German espionage in World War II and in limiting IRA violence. 
In the United States, domestic intelligence is primarily the 
responsibility of the FBI. Other agencies have some domestic 
intelligence functions, but there is no counterpart to MI5 or to the 
Canadian Security Intelligence Service, which is our northern 
neighbor's counterpart to MI5 and played an important role in foiling 
the recent Toronto terrorist plot.
    The problem with placing domestic intelligence responsibility 
inside the FBI is that the Bureau is first and foremost a criminal 
investigation agency. It is part of the Department of Justice and its 
special agents work under the direction of the Department and the 
Department's local U.S. Attorneys to make arrests and gather evidence 
looking to prosecution. The Bureau's goal is not to prevent crimes but 
to catch criminals. It is very good at that. But its conception of 
national security intelligence is shaped by its traditions and primary 
focus. It sees such intelligence as an adjunct to criminal 
prosecutions. Its conception of how best to deal with terrorism is to 
arrest and prosecute and convict and imprison the terrorists. That is a 
dangerously incomplete strategy because of the limitations of criminal 
law enforcement, sketched above, as a means of preventing terrorism. 
Like military and covert action against terrorists abroad, like border 
controls, and like hardening potential terrorist targets, criminal law 
enforcement is an important tool for dealing with the terrorist threat. 
But another important tool, which the FBI so far has been notably 
unable to forge, is domestic intelligence as a free-standing mode of 
terrorism prevention. The key to effective intelligence, which is not 
well appreciated by the Bureau, is to cast a very wide net with a very 
fine mesh to catch the tiny clues (most of which would not qualify as 
evidence in a court proceeding) that assembled into a mosaic may enable 
the next attack to be prevented; for once the plot is detected, as I 
have said, it can be disrupted without formal legal proceedings even if 
later it is decided to prosecute some or all of the plotters. The 
process of detection and disruption requires great patience, and some 
risk (a risk the FBI and the Justice Department are unwilling to take) 
that a terrorist act will be committed while the intelligence service 
is still exploring the extent of the terrorist network without tipping 
its hand by recommending arrests.
    I have argued elsewhere and at considerable length for the urgency 
of our need for a domestic intelligence agency separate from the FBI, 
and I will not repeat the argument here but will merely refer the 
interested reader to the relevant sources.\9\ I emphasize that there is 
no constitutional (or, I believe, other legal) bar to the creation of 
such an agency. It has been argued that an MI5 clone wouldn't work here 
because the United Kingdom does not have the Bill of Rights. The 
argument is mistaken. The principal limitations that the Bill of Rights 
imposes on counterterrorism involve arrest, detention, admissible 
evidence, trial procedures, and other incidents of criminal law 
enforcement and are almost entirely irrelevant to an intelligence 
service that would have no arrest or other prosecution-related powers. 
The exception is surveillance by means of physical or electronic 
searches, which are regulated by the Fourth Amendment. But the relevant 
limitations, some of which indeed pinch too hard in my judgment, 
notably the Foreign Intelligence Surveillance Act, are statutory rather 
than constitutional. Warrants are tightly restricted by the warrant 
clause of the Fourth Amendment. But surveillance, even when it takes 
the form of wiretapping or other electronic interception, need not be 
conducted under a warrant. The only limitation the Constitution places 
on searches without a warrant is, as I have noted already, that they be 
reasonable, and none of us would wish to see a domestic intelligence 
agency employ unreasonable methods of surveillance. The potential 
abuses of such surveillance can be minimized, without judicial 
intervention, by rules limiting the use of intercepted communications 
to national security, requiring that the names of persons whose 
communications are intercepted (and the reasons for and results of the 
interception) be turned over to executive and congressional watchdog 
committees, and imposing meaningful penalties on officials who violate 
civil liberties.
---------------------------------------------------------------------------
    \9\ Richard A. Posner, Preventing Surprise Attacks: Intelligence 
Reform in the Wake of 9/11, ch. 6 (2005); Posner, Uncertain Shield: The 
U.S. Intelligence System in the Throes of Reform, chs. 4-5 (2006); 
Posner, Remaking Domestic Intelligence (Hoover Institution, 2006); 
Posner, ``Intelligence and Counterterrorism Five Years after 9/11'' 
(September 2006, unpublished).
---------------------------------------------------------------------------
    So we can learn a lot from the British experience with fighting 
terrorism, in particular about the need for detention of terrorism 
suspects beyond the conventional 48-hour limit and, above all, about 
the need, which should encounter no obstacle based on our Constitution, 
for a domestic intelligence agency separate from the FBI.
        appendix: brief biographical sketch of richard a. posner
    Richard A. Posner was born in 1939. After graduating from Yale 
College and Harvard Law School, Posner served in various government 
positions, including in the Justice Department, before entering law 
teaching in 1968 at Stanford as an associate professor. He became 
professor of law at the University of Chicago Law School in 1969, where 
he remained (later as Lee and Brena Freeman Professor of Law) on a 
full-time basis until 1981. During this period Posner wrote extensively 
on economic analysis of law and also engaged in private consulting, 
mainly in antitrust law, and was from 1977 to 1981 the first president 
of Lexecon Inc., a consulting firm.
    Posner became a Judge of the U.S. Court of Appeals for the Seventh 
Circuit in December 1981 and served as Chief Judge from 1993 to 2000. 
He has written almost 2,200 published judicial opinions. He continues 
to teach part time at the University of Chicago Law School, where he is 
Senior Lecturer, and to write academic articles and books. For several 
years his major academic focus has been on catastrophic risk (including 
terrorism and proliferation), national security intelligence, and the 
intersection between national security and civil liberties. He has 
published in these areas, besides shorter works, Catastrophe: Risk and 
Response (2004); Preventing Surprise Attacks: Intelligence Reform in 
the Wake of 9/11 (2005); Uncertain Shield: The U.S. Intelligence System 
in the Throes of Reform (2006); and Not a Suicide Pact: The 
Constitution in a Time of National Emergency (2006).
    Posner received honorary degrees of doctor of laws from Syracuse 
University in 1986, from Duquesne University in 1987, from Georgetown 
University in 1993, from Yale in 1996, from the University of 
Pennsylvania in 1997, from Northwestern University in 2002, and from 
Aristotle University (in Thessaloniki) in 2002; and he received the 
degree of doctor honoris causa from the University of Ghent in 1995 
from the University of Athens in 2002, and an honorary juris doctor 
degree from Brooklyn Law School in 2000. In 1994 he received the Thomas 
Jefferson Memorial Foundation Award in Law from the University of 
Virginia. In 1998 he was awarded the Marshall-Wythe Medallion by the 
College of William and Mary, and he received the 2003 Research Award 
from the Fellows of the American Bar Foundation. He received the John 
Sherman Award from the U.S. Department of Justice in 2003, for 
contributions to antitrust policy. In 2005 he received the Learned Hand 
Medal for Excellence in Federal Jurisprudence from the Federal Bar 
Council, the Thomas C. Schelling Award for scholarly contributions that 
have had an impact on public policy from the John F. Kennedy School of 
Government at Harvard University, and the Henry J. Friendly Medal from 
the American Law Institute.
    Posner is a member of the American Law Institute, the Mont Pelerin 
Society, and the Century Association, a fellow of the American Academy 
of Arts and Sciences, an Honorary Bencher of the Inner Temple, a 
corresponding fellow of the British Academy, an honorary fellow of the 
College of Labor and Employment Lawyers, a member of the editorial 
board of the European Journal of Law and Economics, and a Consultant to 
the Library of America, as well as a member of the American Economic 
Association and the American Law and Economics Association (of which he 
was President in 1995-1996). He was the honorary President of the 
Bentham Club of University College, London, for 1998. With Orley 
Ashenfelter, he edited the American Law and Economics Review, the 
journal of the American Law and Economics Association, from its 
founding in 1998 to 2005.
    Academic writings by Posner have been translated into French, 
German, Italian, Spanish, Chinese, Japanese, Korean, Greek, Portuguese, 
Ukrainian, Lithuanian, and Slovenian. He and the economist Gary Becker 
write weekly commentaries on policy issues, published in ``The Becker-
Posner Blog,'' at http://becker-posner-blog.com/.

    Senator Gregg. Thank you very much, Judge, for your 
thoughts. We appreciate them.
    Mr. Yoo.
STATEMENT OF JOHN YOO, PROFESSOR OF LAW, BOALT HALL 
            SCHOOL OF LAW, UNIVERSITY OF CALIFORNIA AT 
            BERKELEY
    Mr. Yoo. Thank you, Mr. Chairman, for inviting me to 
testify. These are extremely important hearings, a very 
important subject. In the 5 minutes I have, I find myself in 
the position many law professors are in, in that I might have 
something interesting to say, but Judge Posner got there first. 
So actually a lot of the things I was going to say he has 
already said. So I am just going to try to supplement some of 
the points he made and may talk about some areas of difference 
between the United States and Great Britain where actually the 
Appropriations Committee in particular could do something that 
would bring us up to par with Great Britain, not at a 
constitutional level but at a policy level.
    I think Judge Posner is quite right, the things that people 
have focused on in the media as being great differences between 
the British and American systems that give the British an 
advantage I think are somewhat illusory or exaggerated. He 
correctly pointed out this idea that the British can detain 
people longer than we can in our system might be a correct as a 
matter of formal rules, but does not take account of what has 
happened in the United States over the last 5 or 6 years.
    One way to think about it is that the British system is, as 
you said in your opening remarks, preventative. It aims to try 
to prevent terrorist attacks from happening in the future. The 
American approach had been primarily or exclusively law 
enforcement, which is retrospective. The idea of the criminal 
justice primarily is you look at an event that has already 
happened and you try to historically put the facts together 
about who's responsible. As Judge Posner said, as you have 
mentioned, and as Mr. Parker says in his testimony, those two 
basic goals are often in conflict and may be incompatible 
often.
    So one way you can think about what the administration has 
done over the last 5 years and in the bill about Hamdan which 
you mentioned in your opening remarks has been to try to move 
the American system to have some ability to conduct 
preventative measures rather than just be stuck in a criminal 
justice system, which was the approach administrations of both 
parties took until September 11, I would say.
    So on the detention issue, the formal rule is quite right, 
the United States cannot hold people for longer than 48 hours 
in the criminal justice system. In Great Britain you can hold 
people for 28 days without criminal charge. But the 
administration, in a move approved by the Supreme Court, has 
said that it will detain people as enemy combatants without 
criminal charge and that can go on for much longer than 28 
days. Obviously it can go on for months or years, until the end 
of the conflict. That is an example where the administration, I 
think with Congress' support and Supreme Court approval, has 
tried to introduce some of these preventative measures.
    Another area is surveillance, which you mentioned in your 
opening remarks. The British have lower standards for the 
collection of non-content communication, data about phone 
calls, emails, not the content but the other kind of 
information connected with that. In Great Britain, as I 
understand it, one can just go to an agency official for 
permission to conduct, to collect that kind of information. In 
the United States you would usually have to go to the FISA 
court, the FISA court or a regular court, to collect that 
information.
    In an effort to move the system to a more proactive future, 
forward-looking perspective, the administration introduced the 
NSA terrorist surveillance program, which is more like the 
British system. This was I think particularly important, 
although I think overlooked in the accounts of how Great 
Britain broke up the plot last month. If you read the accounts 
carefully, they say there was an initial tip given by a 
community member. But then it appears that Great Britain used 
that information to engage in massive amounts of data mining 
and communications interceptions to try to piece together the 
network.
    That would be difficult under the FISA system, which is 
based on individual warrants, based on suspicion of a 
particular person. But under the programs that have been 
publicly revealed, the administration has tried to move the 
system in that direction and, as you said, Congress is 
currently considering right now how far to go in authorizing 
that. That is one area, at the very least, where I think, as 
you asked in your opening remarks, what can Congress do now 
consistent with the Constitution to bring is closer to the 
British system. It would be to approve at least some elements, 
I think, of the terrorist surveillance program.
    So the two I think really big areas where Great Britain 
does possess advantages is data mining--and this is 
particularly I think of interest to the Appropriations 
Committee. As you might remember, in the winter of 2001-2002 
there was a big controversy over research being conducted at 
the Defense Department to engage in data mining, the total 
information awareness program, and my understanding was that 
Congress through an appropriations rider cut off all funding to 
the Defense Department to conduct that kind of research, not to 
put the program in operation, but at least to consider some 
issues of how can you even balance privacy using computers 
against the kind of information you could gather and analyze 
using computers. Research on that has been halted through 
appropriations and that could be something that this committee 
could think about and monitor, balance, in order to bring us 
closer to what the British are able to do.
    My sense is the British do not have any constitutional 
restrictions on data mining and the reports in our press are 
that the British use that tool quite extensively.
    The last thing I will mention--again, Judge Posner beat me 
to it--is the MI5 model. Another thing that this committee 
could do is to start the transition of the FBI from a law 
enforcement-focused setup to something he mentioned, 
prospective, preventative. There's been a lot of studies done 
by people in this country and elsewhere about whether it's 
possible or consistent for that goal to sit with the law 
enforcement goal.
    As someone who has worked in the Justice Department, I have 
a lot of respect for the FBI agents and their managers, who 
have a very difficult problem. But I think it is fair to say 
over the last 5 years the FBI has had serious difficulty trying 
to upgrade its systems and change its mentality towards a type 
you would want for national security purposes.
    So that is something I think this committee could usefully 
do in addition to data mining, is to consider whether it wants 
to start using appropriations as a method to prod the FBI to 
move faster or even to consider other options, like 
supplementing the FBI with a new independent agency or telling 
the FBI to get out of the business of catching bank robbers and 
kidnappers and focus exclusively on national security and leave 
those other issues, which are perfectly appropriate in 
peacetime, to State and local law enforcement.
    But thank you very much for having me. I look forward to 
your questions.
    [The statement follows:]

                     Prepared Statement of John Yoo

    Mr. Chairman, thank you for the opportunity to testify before the 
Subcommittee on Homeland Security regarding American and British laws 
for investigating and detaining suspected terrorists. I am a professor 
of law at the University of California, Berkeley. From 2001 to 2003, I 
served as deputy assistant attorney general in the Office of Legal 
Counsel at the Department of Justice, where I worked on issues 
involving national security, foreign relations, and terrorism. My 
academic writing on these subjects can be found in two books, one 
published last year, The Powers of War and Peace, and one appearing 
later this month, War by Other Means. The views I present here are mine 
alone.
    Great Britain's successful prevention of a recent terrorist plot to 
destroy multiple American airliners flying from London to the United 
States in mid-air has prompted questions whether our counter-terrorism 
efforts can be improved. Some have suggested that British authorities 
enjoy broader law enforcement powers to investigate and detain 
terrorists, and asked whether we can learn from and adopt British 
practices. This idea has a basic attractiveness because the United 
States and Great Britain share a common cultural heritage, face a 
similar threat from international terrorism, and operate a common law 
legal system.
    As I will explain, differences result from both constitutional and 
policy choices. I hope to demonstrate in what areas the American 
Constitution prohibits adopting British standards, as well as areas 
where American laws can be made more effective at fighting terrorism, 
that is, where our policy choices are not limited by the Constitution. 
First, I will discuss important constitutional differences between the 
United States and Great Britain.
Constitutional Differences
    Unlike the United States, the United Kingdom does not have a 
written constitution. The British system lacks formal constitutional 
protections of many of the rights we consider fundamental as deriving 
from the constitutional text, structure, and history. Britain's 
unwritten constitution does not enforce a strict separation of powers 
at the national level, nor does it have a Federal system of government. 
Rather than an independent Presidency and Congress, executive power is 
exercised by a prime minister and cabinet which represent the majority 
party in Parliament.
    The American Constitution protects many important civil liberties 
through explicit guarantees in the Bill of Rights which are lacking 
under the British system. For instance, the Fourth Amendment was 
enacted in 1791, partly in response to British practices during the 
Colonial period. This Amendment states:

    The right of the people to be secure in their persons, houses, 
papers, and effects, against unreasonable searches and seizures, shall 
not be violated, and no Warrants shall issue, but upon probable cause, 
supported by Oath or affirmation, and particularly describing the place 
to be searched, and the persons or things to be seized.

    The Fourth Amendment imposes restrictions upon the power of the 
government to monitor and detain individuals, even for legitimate law 
enforcement purposes. The Supreme Court has interpreted an individual's 
right under the Fourth Amendment to require that to allow extended 
detention after a warrantless arrest, the suspect must be promptly 
presented before a judge to determine probable cause to stand trial for 
a crime--in almost all cases, within 48 hours. Gerstein v. Pugh, 420 
U.S. 103, 125 (1975); County of Riverside v. McLaughlin, 500 U.S. 44, 
56 (1991). If the evidence is found insufficient, the arrestee must be 
released. It is well established that the suspect may appeal under the 
writ of habeas corpus to challenge his continued detention. See, e.g., 
Ex Parte Bollman, 4 Cranch 75 (1807). Britain has no such 
constitutional limits, and has greater flexibility to legislatively 
alter the time and procedure of detention without charge.
    The First Amendment, likewise ratified as part of the Bill of 
Rights, protects among other things individuals' freedom of speech, 
religion, and association, which can come into conflict with law 
enforcement and intelligence purposes. Britain does not have a 
constitutional analogue to the First Amendment. Finally, the Sixth 
Amendment guarantees accused criminals certain rights, such as the 
right to a speedy trial and the right to be informed ``of the nature 
and cause of the accusation,'' and the right ``to be confronted with 
the witnesses against him.''
A Comparison of American and British Anti-Terror Laws
    The British Parliament has recently enacted several important 
pieces of anti-terrorism legislation: the Terrorism Act 2000, the 
Regulation of Investigatory Powers Act of 2000, the Anti-terrorism, 
Crime and Security Act of 2001, the Prevention of Terrorism Act 2005, 
and the Terrorism Act of 2006. These laws set forth comprehensive 
definitions of terrorism and related offenses, and establish procedures 
authorities shall follow in combating terrorism. The laws represent 
Britain's response to two distinct forms of terrorist threat. The first 
was from Irish separatists who committed acts of terrorism and murder 
in Northern Ireland and Britain. This was the United Kingdom's greatest 
domestic security threat for much of the latter part of the 20th 
Century. The second form of terrorism addressed by the British laws is 
Islamic fundamentalist terrorism perpetrated by al Qaeda and groups 
affiliated with it. This has taken on great prominence in Britain post-
9/11, and more so in light of the deadly attacks on the London 
Underground on July 7, 2005, and the recently foiled plot to hijack or 
blow up passenger jets departing Britain bound for the United States.
    The following provides a brief description of the differences in 
American and British anti-terrorism laws topic by topic. It examines 
the laws regarding arrest, searches, and detention of suspects; 
monitoring suspects' bank accounts; monitoring communications data; 
intercepting communications, i.e. wiretapping; infiltrating suspected 
groups; and finally, sharing information among law enforcement and the 
domestic and foreign intelligence communities.
Arrest, Searches, and Detention of Suspects
    Under the Terrorism Act of 2000, a British officer may arrest a 
suspected terrorist or conduct a search of a suspect he ``reasonably 
suspects'' is a terrorist or is in possession of ``anything which may 
constitute evidence that he is a terrorist.'' An American officer, by 
contrast, must have ``probable cause'' to make an arrest or conduct a 
search of a person he suspects to have committed a crime. See, e.g., 
United States v. Watson, 423 U.S. 411 (1976). This is the minimum under 
the Fourth Amendment and cannot be changed by Congress.
    The British have greater power to detain a terrorist without 
criminal charge. Section 23 of the Terrorism Act of 2006 sets forth a 
procedure under which a suspect may be detained for up to 28 days 
before he must be charged with a crime or released. After 48 hours, 
judicial approval is required, and is required a second time if the 
authorities wish to detain the suspect beyond 7 days. The judge does 
not need to find probable cause, but must be satisfied that ``there are 
reasonable grounds for believing that the further detention of the 
person to whom the application relates is necessary to obtain relevant 
evidence whether by questioning him or otherwise or to preserve 
relevant evidence,'' and ``the investigation in connection with which 
the person is detained is being conducted diligently and 
expeditiously.'' The suspect has access to counsel and may make written 
or oral communications before the judge; however, the suspect and his 
counsel may also be excluded from portions of the hearing. The British 
government has already invoked this power to detain the individuals 
arrested in conjunction with the August, 2006 plot to blow up airliners 
departing Britain. This allowed the plot to be halted, but also allows 
more evidence to be gathered prior to formally charging the suspects 
with crimes.
    In the United States, law enforcement authorities must generally 
present probable cause before a judge that a suspect has committed a 
crime or the suspect will be released. The Supreme Court has 
interpreted the Fourth Amendment to require the government to charge 
suspects at most within 48 hours. The Court has made clear that it is 
unreasonable to delay a probable cause hearing for purposes of 
gathering evidence to justify the arrest. McLaughlin, 400 United States 
at 56. There are few exceptions to the American probable cause 
paradigm. One is the material witness statute, 18 U.S.C. . 3144, which 
allows the arrest and detention of suspects whose testimony in a 
criminal proceeding might be difficult to obtain. This has been applied 
in the war on terrorism to initially detain Jose Padilla, as well as 
others who may have had information about the 9/11 hijackers, but its 
applicability and usefulness are limited.
    It is not clear, however, that the unwritten nature of the British 
constitution permits broader detention authority than in the United 
States as a constitutional matter. The Supreme Court has made clear, as 
recently as in Hamdi v. Rumsfeld, 124 S. Ct. 2633 (2004), that the 
government may detain enemy combatants without criminal charge or 
hearing until the end of hostilties. On September 18, 2001, Congress 
voted in the Authorization to Use Military Force statute to approve the 
President's authority to use force against those connected to the 
September 11, 2001 terrorist attacks. Ever since the earliest days of 
warfare, the lesser power to detain combatants has been understood to 
fall within the greater authority to use force against the enemy. As 
the Court recognized, the purpose of detention in the military context 
is not to punish, but merely to prevent combatants from returning to 
the fight. In fact, such detention is the merciful, humanitarian 
alternative to a practice of granting no quarter to the enemy. That 
power extends even to U.S. citizens, as it did in the case of Ex Parte 
Quirin, 317 U.S. 1, 28 (1942), in which the Court upheld the World War 
II detention and trial by military commission of Nazi saboteurs, one of 
whom apparently was a citizen. After noting that the laws of war 
permitted the detention without criminal charge of Confederate soldiers 
during the Civil War, the Court observed that ``A citizen, no less than 
an alien, can be `part of or supporting forces hostile to the United 
States or coalition partners' and `engaged in an armed conflict against 
the United States.''' No specific congressional authorization, the 
Court further concluded, was needed. ``Because detention to prevent a 
combatant's return to the battlefield is a fundamental incident of 
waging war,'' the Court concluded, ``in permitting the use of 
`necessary and appropriate force'' Congress authorized wartime 
detention of enemy combatants.
    The Constitution imposes much narrower restrictions on the 
detention of criminal suspects than the British system. But if the 
subject is a terrorist connected with al Qaeda or with the September 11 
attacks, he or she might meet the standard for an enemy combatant. In 
that case, the U.S. government could detain the subject as an enemy 
combatant, without having to meet the criminal justice system's 48 hour 
requirement. The only complication in this argument is that Hamdi 
addressed a case in which the enemy combatant had been detained in the 
course of hostilities in Afghanistan, and did not address a different 
factual circumstance presented by an American citizen affiliated with 
al Qaeda who is detained on United States soil. While the U.S. Court of 
Appeals for the Fourth Circuit in Padilla found the same logic applied 
to both cases, the Department of Justice transferred Jose Padilla to 
the criminal justice system before the Supreme Court could hear an 
appeal.
Restricting Movements of Suspects
    Britain's Prevention of Terrorism Act allows authorities to issue 
``control orders'' which impose restrictions upon a suspect's civil 
liberties without incarcerating him. These orders, which require 
judicial approval and are valid for up to one year at a time, could 
restrict an individual's freedom to travel, to meet with certain groups 
or visit certain locations, to be away from his home during certain 
hours of the day, or to use cell phones or the internet. Currently the 
regime of control orders is under challenge as a potential violation of 
European human rights laws. The United States has no comparable Federal 
laws, and such provisions would run into constitutional difficulties 
due to the First Amendment's protections of individuals' freedom to 
travel and associate.
Monitoring Bank Accounts and Communications
    The Anti-terrorism, Crime and Security Act of 2001 allows British 
authorities to monitor bank accounts upon obtaining a warrant from a 
judge. The judge must find that the monitoring relates to a terrorist 
investigation, and also that the particular monitoring order sought 
will further that investigation. Anti-terrorism, Crime and Security Act 
of 2001, Schedule 2 Part 1 (amending Terrorism Act 2000 . 38). The 
order lasts for 90 days. Additionally, the Regulation of Investigatory 
Powers Act of 2000, and an accompanying Code of Practice, allows 
British law enforcement and intelligence authorities to evaluate 
communications data for patterns suggestive of terrorist activities. 
This means the attributes of communications, such as the location where 
a call was placed and its destination, but not the actual contents of 
the communication. To monitor communications data, a law enforcement or 
intelligence agency need only complete a written application, which is 
considered by a designated individual within the body or agency. 
Authorizations are valid for up to one month, and can be renewed. The 
government may also inquire into subscriber information, or the 
identity of persons to whom a telephone number is registered or who 
controls an email account or internet domain. British law enforcement 
and intelligence agencies are allowed to share any information obtained 
by these or other investigatory means.
    In the United States, authorities may obtain a warrant or 
administrative subpoena for financial records under the Right to 
Financial Privacy Act, 12 U.S.C. . . 3401-3422, which grants 
individuals some privacy rights over financial records in the hands of 
third parties. Authorities may also obtain a warrant for tangible items 
held by third parties, under section 215 of the USA Patriot Act. In 
2001, the Patriot Act authorized domestic law enforcement and 
intelligence agencies to share financial documents for the purposes of 
fighting terrorism. The ability of American authorities to obtain 
financial records by administrative subpoenas is somewhat easier than 
that granted to their British counterparts, and the rules on sharing 
the information among agencies are comparable. With regard to other 
tangible items, section 215 of the Patriot Act requires that the 
Foreign Intelligence Surveillance Court issue a warrant. Britain does 
not have a statute with scope analogous to section 215.
    Upon first examination, it would appear that the British system 
permits the government easier access to non-content data about 
communications because of its ability to seek authorization from an 
agency official. But the administration has sought a similar ability 
through its warrantless surveillance of communications, with one end of 
the message or conversation beginning or ending abroad, with a 
suspected al Qaeda member. These communications do not as yet require a 
judicial warrant, because the administration claims that the program is 
authorized by the AUMF of September 18, 2001, and the President's 
Commander-in-Chief authority to conduct war. The program is under 
challenge in the courts as a violation of the Foreign Intelligence 
Surveillance Act, and Congress is currently considering legislation 
that would approve the program or consolidate it for judicial review 
before the FISA court.
Data Mining
    Data mining uses supercomputers to analyze vast amounts of 
information for suspicious patterns of behavior. While British anti-
terrorism legislation does not address data mining, some commentators 
claim that data mining is already widely used in the United Kingdom to 
combat terrorism. A common misperception about data mining is that it 
involves gathering information about millions of individuals, and hence 
implies increased surveillance. Rather, data mining applies algorithms 
to information that is either already public or on record with third 
parties.
    Analyzing this type of information does not violate an individual's 
Fourth Amendment right to be free of unreasonable searches and 
seizures. As the Supreme Court has held with respect to bank records, 
once information is turned over to a third party in a commercial 
setting, the individual loses his reasonable expectation of privacy in 
that information. United States v. Miller, 425 U.S. 435 (1976). The 
Supreme Court likewise has held that an individual does not have a 
reasonable expectation to the privacy of the phone numbers he dials, 
because the phone user voluntarily gives this information to the phone 
company; thus, a ``pen register'' to record dialed phone numbers does 
not require a warrant. Smith v. Maryland, 442 U.S. 735 (1979). Data 
mining is constitutional and does not threaten civil liberties because 
it deals first and foremost with raw data. It is not an impermissible 
``fishing expedition'' that looks for dirt on a particular person, as 
civil libertarians may claim.
    American restrictions on data mining do not arise because of 
significant constitutional differences between the United States and 
Great Britain. Rather, restrictions on data mining in the United States 
have resulted from policy decisions made by Congress in response to 
reports of Defense Department efforts to create a ``Total Information 
Awareness'' program. I believe that Congress reacted prematurely to 
exaggerated reports of data mining research. Data mining could be 
controlled and developed so that it protects us from terror and 
maintains our privacy. Analysis could be limited to data already turned 
over to third parties.
    Searches could be performed initially by computer. Only after a 
certain level of suspicious activity had been registered would an 
intelligence or law enforcement officer be allowed to see the results. 
A warrant could still be required to investigate the content of 
communications or the purpose of purchases. Only after a suspicious 
pattern is detected would authorities seek more complete records about 
a particular individual's activities, either through a warrant or 
administrative subpoena. Because data mining does not violate Fourth 
Amendment norms, Congress can authorize data mining programs that 
strike the appropriate balance between providing law enforcement access 
to useful information and protecting civil liberties.
Profiling, Infiltration, and Privacy
    British authorities have the power to monitor ethnic and religious 
groups, and radical elements within those groups. British police can 
infiltrate the groups, instead of merely relying on informants' 
accounts. It is unclear precisely where and how often British 
authorities have infiltrated or attempted to infiltrate such groups. 
However, there is no indication that such actions are considered 
illegal or unconstitutional under the British legal system.
    In the United States, guidelines issued by the Attorney General set 
forth the extent to which the FBI can monitor potential terrorist 
activities and infiltrate criminal or terrorist ventures.\1\ These 
guidelines explicitly allow the FBI to check initial leads that may be 
related to crime or terrorism, including attending public events. The 
FBI may also infiltrate terrorist organizations, but such operations 
are normally considered ``sensitive circumstances'' requiring approval 
of high-level FBI officials. The decision regarding when infiltration 
is appropriate requires that officials weigh factors, but the 
Guidelines neither prescribe nor proscribe particular instances when 
infiltration is advisable or forbidden.
---------------------------------------------------------------------------
    \1\ See The Attorney General's Guidelines on General Crimes, 
Racketeering Enterprise and Terrorism Enterprise Investigations, http:/
/www.usdoj.gov/olp/generalcrimes2.pdf; The Attorney General's 
Guidelines on Federal Bureau of Investigation Undercover Operations, 
http://www.usdoj.gov/olp/fbiundercover.pdf.
---------------------------------------------------------------------------
    The areas of profiling, infiltration, and privacy present fewer 
constitutional restrictions and more policy choices. Profiling, which 
may perhaps represent a useful tool, can run afoul of equal protection 
rules and non-discrimination norms.
Conclusion: administrative reform
    Differences between British and American anti-terrorism policy does 
not turn on constitutional differences for their scope. Many of the 
powers thought to be more advantageous to the British, such as 
detention and surveillance, in fact have some counterpart in the 
American system. Congress could help by further authorizing these 
powers, which are under attack in the court. Other important areas, 
such as in the area of data mining, are restricted in the United States 
not because of constitutional prohibitions, but because of policy 
choices made by Congress.
    Perhaps the most important British-American difference, however, 
which can have significant effects on the war on terrorism is the 
structure of the domestic intelligence agencies. American efforts so 
far to reform our national security system in response to the lessons 
of 9/11 have focused on changes of high-level administrative 
reorganization, such as the creation of a Director of National 
Intelligence or the Department of Homeland Security. These changes have 
consumed energy and resources, but have placed an additional layer 
between the President and those who directly collect and analyze 
intelligence.
    At the same time, Congress has not undertaken any sweeping reform 
of the Federal Bureau of Investigation. The United States is different 
from Britain, and France, Canada, and Australia, for that matter, in 
that it assigns domestic counter-terrorism and counter-intelligence 
functions to an agency that is also responsible for domestic law 
enforcement. As I argue in my book, the approaches to law enforcement 
and national security are very different. The former is retrospective, 
depends on building cases, and focuses on prosecution and 
incarceration. The latter is prospective and focuses less on 
convictions than on preventing future attacks.
    In Great Britain, these functions are split up, with MI5 performing 
the role of an internal intelligence service. Arguably this allows 
those tasked with counter-terrorism to focus on gathering intelligence, 
engage in long-term monitoring and investigation, and develop expertise 
on the enemy that may go beyond what is possible in a domestic law 
enforcement system, which depends on cases and prosecutions for 
success. Congress should devote deeper thought to whether our counter-
terrorism efforts would meet with greater success if it divided the 
FBI's current duties between two agencies, one for domestic law 
enforcement and one for counter-terrorism and national security 
affairs. This could be a greater contribution to our anti-terrorism 
laws than making changes to the scope of the substantive powers 
available to the government.

    Senator Gregg. Thank you, professor. I appreciate those 
comments. We have actually had that debate going on for a 
while, so I appreciate the reinforcement on the points.
    Mr. Parker.
STATEMENT OF TOM PARKER, CEO, HALO PARTNERSHIP 
            CONSULTING, FORMER BRITISH COUNTERTERRORISM 
            OFFICIAL
    Mr. Parker. Thank you, Mr. Chairman, and thank you for 
inviting me. I find myself in the position of an echo to an 
echo, I think.
    I would start by saying the two systems, the United States 
system and the British system, are much more similar than I 
think commonly perceived over here. Britain has a large number 
of restraints on what it can and cannot do, imposed by its 
membership in the European Convention on Human Rights, the 
European Convention. Perhaps appropriately, we have heard how 
the British common law system informed the American 
Constitution. Well, the European Convention on Human Rights is 
very strongly informed by the U.S. Constitution. It draws its 
inspiration from human rights and the codification of private 
rights pioneered really by the United States in the 18th 
century and by revolutionary France. So there is a certain 
symmetry to this.
    The big difference, though, is we have oversight that sits 
outside the United Kingdom, and that is the European Court of 
Human Rights in Strasbourg. That is our last court for appeals 
and it is staffed by foreign judges. So although a British 
judge will sit on a European court case, there will be 7 or 
perhaps 14 foreign judges hearing the case and the submissions. 
So there is no natural sympathy on the bench to the British 
perspective when they hear the British government make its 
arguments.
    That is a very powerful enforcement mechanism. We are--it 
is a binding court. We are obligated to respond to its 
judgments, and that means that we are held to a very high 
standard, one that can be very aggressive in pursuing the 
reasons behind British legislation. And it has rolled back 
British counterterrorist strategies in a number of very 
significant areas over time, most significantly in the area of 
coercive interrogation.
    The other thing that is interesting about the European 
court and is worth mentioning is its focus is on creating a 
margin of appreciation for each individual European country. 
The court does not, and has actually several times made it very 
explicit in its judgments, ever set out to make any form of 
judgment about what is or is not appropriate governmental law 
enforcement action. What it looks at is purely whether or not 
the convention itself has been violated, and if it has, if 
actions of governments are up against the limits of the 
convention, the degree to which that is appropriate within that 
forum. For example, it will treat Britain's response to 
counterterrorism different to the way that it treats Turkey's 
response to counterterrorism.
    So you do not have the same sort of framers' intent, people 
poring back to a foundational document and trying to tease out 
nuances. There is a little bit more sympathy for trying to 
understand the local conditions. But at the same time, there is 
no great political sympathy for any governmental point of view. 
So it is kind of an interesting contrast to the Supreme Court 
in a number of different ways.
    Perhaps the most important area for me to dwell on I guess 
is our approach to counterterrorism activity, which is 
essentially one of criminalization. We have a doctrine of 
criminalization in the United Kingdom. We have not always had 
that and we adopted it primarily because of the lack of success 
we enjoyed in the early 1970s against the Provisional IRA in 
Northern Ireland.
    One of the reasons, one of the factors in returning back to 
this doctrine of criminalization, was the European Court on 
Human Rights and the checks that it imposed on British activity 
and the embarrassment the British government felt having its 
different operations held up to scrutiny in Strasbourg.
    I am going to read you the home office strategy because I 
think it is quite interesting. The home office basically gives 
four core strategic areas for combating terrorism. It is 
prevention, which it lists as basically falling into four 
different areas: social inclusion, international dialogue, 
legislation, border security. So that is block number one, 
preventative.
    Block number two is pursuit and we see pursuit basically as 
falling into only two spheres, intelligence activity and law 
enforcement activity. There is no real mention of military as 
an option within the British counterterrorist strategy.
    Protection, that is target hardening, protective security; 
and then preparedness, focus on emergency responses.
    So that is sort of the four pillars, if you like, for the 
British counterterrorism approach. The other interesting thing 
that the idea, the doctrine of criminalization, does is there 
is always pull back to the status quo ante. We have had a 
history of having temporary legislation for counterterrorism. 
In Northern Ireland we had basically over an almost two decade, 
three decade period, annual renewal of the laws, prevention of 
terrorism acts, that define terrorism purely in the context of 
Northern Ireland. This meant, for example, until 2000, the year 
2000, in the United Kingdom you could not be a terrorist unless 
you were Irish, unless you were one of the proscribed 
organizations within the Prevention of Terrorism Act, which was 
very, very tightly defined just to focus on the terrorist 
threat in Northern Ireland. It is only in the year 2000 that we 
ended up with permanent counterterrorist or anti-terrorist 
legislation. Up until this point there was always this doctrine 
that this is an extraordinary circumstance and we will limit 
our deviations from the norm and try and get back to the norm 
as soon as possible.
    But having said that, there are many, many areas in which 
we compromise the norm. A good example, particularly after 
Judge Posner's comments, the Diplock courts. In Northern 
Ireland it really was impossible to have a normal jury trial of 
terrorism offenses. So we introduced a court system where a 
judge heard cases without a jury sitting and somewhat relaxed 
the rules of evidence, so that it would be easier to present 
evidence and protect security concerns in that court. Again, 
Diplock courts only sat in Northern Ireland and so they were 
only relevant for offenses that occurred in Northern Ireland, 
not for offenses that occurred on the mainland.
    So there is this interesting, again, tension in the British 
system between a desire and focus on treating terrorists as 
criminals. We flirted--we in the early 1970s gave terrorists 
special category status as prisoners, effectively recognizing 
that they fell into a political character, category of 
offender, rather than simple criminals, and we moved back away 
from that in 1974 and 1975.
    So the statute of criminalization has served us pretty 
well. And I think--far be it, I do not feel like I really 
represent Her Majesty's government, but at the same time I 
think it would be fair to say that the current government in 
the United Kingdom still clings to that as a very important 
touchstone of its counterterrorist approach, that we should 
always see this as a temporary circumstance, one in which we 
should always be pulling back away toward normalization of our 
normal criminal justice system. That is essentially the 
concept.
    Finally, since--and I am thrilled to hear MI5 get such a 
good press in front of the committee. I will say a few brief 
words about what I think the strengths of our system are. The 
primary strength is the focus. You have an agency that is 
devoted, not exclusively to counterterrorism, but now at least 
80 percent of the service's work is counterterrorism. It 
recently released its support of organized crime function, 
which it had got in the mid-1990s, simply so it could focus 
more closely on the threat of international terrorism. So you 
have a laser beam focus on a threat, which is very useful.
    You also have a central coordinating point, and that for me 
is the really key thing about our system. We have one agency 
whose job it is to get the word out to everybody. We do not 
have 4,000--I forget the number of police and law enforcement--
--
    Senator Gregg. 18,000.
    Mr. Parker. 18,000 law enforcement agencies. We have less 
than 60, which makes life a lot easier. I think there is about 
50 regional police forces. It keeps changing and there is a 
bill to make it--reduce the number of forces even more in front 
of Parliament at the moment. Then we have a small number of 
very specialized police forces, like the transport police.
    But basically MI5's role is to make sure that the 
information, the intelligence, gets out to the people who need 
it, whether that is law enforcement, whether that is people 
responsible for protective security in individual buildings, 
whether that is to government ministers who need to make policy 
judgments. MI5 is the hub and it makes sure that all 
information that comes through it gets out to the right people.
    Now, this of course does not happen overnight. You do not 
just create something and have it function perfectly. What you 
would not get from my written statement is a sense of the 
conflicts which certainly did occur, particularly with the 
metropolitan police special branch in the early 1990s, when the 
security service took over primacy for counterterrorist 
investigations on the mainland.
    But what has happened is the service has proved that it 
adds value, and it has added value by sharing intelligence and 
working very closely with police forces. But it still keeps the 
wall. I hesitate to mention the wall, but the wall is very 
important in Britain. You know, you have intelligence 
investigations and you have law enforcement investigations. The 
fact that it sits in a different agency makes it much easier to 
draw where that line is.
    Security service officers and police officers work very 
closely together. Although MI5 is the central coordinating 
point, it has a filter in regional special branches. So there 
are police officers in every police force who have, if you 
like, an intelligence hat on that can to a degree take the 
security service's concerns in mind when they are working day 
to day with the police forces.
    So it is a very effective system. It is one that keeps 
intelligence out of the courts, although the security service 
has on occasion engineered ways to perhaps use obsolete 
equipment in court cases where you might actually want to 
disclose the methods used. But primarily it tries to keep the 
two things separate. It will go to court in support of police 
investigations if absolutely necessary. There is certainly no 
constitutional or legal bar from them doing that.
    The final mechanism that we have that is tremendously 
useful is a thing called a public interest immunity 
certificate. Then the service can apply to a judge for a 
certificate of immunity for disclosure of information that 
could be damaging from an intelligence perspective. Essentially 
what happens there is the judge gets to see what the 
information is and rule whether or not this is a legitimate 
concern. And if it is, the government is issued with a PII that 
protects intelligence from disclosure in court. That is a very, 
very useful little legal nicety or statutory nicety.
    I think I probably should wind up there. Thank you very 
much.
    [The statement follows:]

                    Prepared Statement of Tom Parker

    Acts of terror on British soil have been remarkably commonplace in 
the past 35 years. In addition to Irish nationalist and Loyalist 
violence relating to the Troubles in Northern Ireland, groups as 
diverse as Black September, the Animal Liberation Front and the Angry 
Brigade, individuals with links to Hezbollah and Al Qaeda, and agents 
of foreign powers such as Libya, Iraq and Syria have all mounted 
attacks in the United Kingdom. In the past 5 years British citizens 
have been killed in terrorist attacks in Turkey, Jordan, Qatar, Saudi 
Arabia, Indonesia and the United States. More Britons were killed in 
the World Trade Center on September 11, 2001 than in any terrorist 
event before or since. In July 2005 52 people were killed and more than 
700 injured in suicide bombings that targeted the London Transport 
system. Suffice it to say, the British government takes the threat from 
terrorism, whether domestic or international in origin, extremely 
seriously.
What constitutional limits does the United States have that Great 
        Britain does not have?
    There appears to be a perception in the United States that there 
are fewer civil liberties protections in the United Kingdom and that 
the British government consequently has a far freer hand to develop 
stringent counterterrorist measures. However, this impression is not 
entirely accurate. The protective framework for civil liberties in the 
United Kingdom is dense and complex, and at times can be both more 
flexible and more implacable than the equivalent protective measures in 
the United States.
    Unlike the United States, Great Britain does not possess a single 
foundational document that amounts to a written constitution. 
Constitutional practice has evolved over centuries and is embedded in 
common law and a series of legislative instruments. In this sense there 
is a great deal of flexibility for British legislators to shape the 
legal landscape. However, in past 50 years a significant external check 
on this power has emerged in the shape of the European Convention on 
Human Rights (ECHR).
    The ECHR is a treaty that operates within the framework of the 
Council of Europe. It was ratified by Britain in 1953, which is 
currently one of forty-six Contracting States. The original draft of 
the Convention was inspired by the United Nations' 1948 Universal 
Declaration of Human Rights. The closest that Britain comes to a Bill 
of Rights, in the American sense, is the Human Rights Act of 1998. This 
Act of Parliament was passed to ``give further effect'' to the rights 
and freedoms detailed in the ECHR by enshrining them in British law.
    As a signatory of the ECHR, Britain has voluntarily submitted to a 
binding enforcement mechanism in the shape of the European Court of 
Human Rights in Strasbourg, France. Britain, like the other Contracting 
States, has accepted the Strasbourg Court's ultimate jurisdiction in 
adjudicating matters arising from alleged breaches of the Convention. 
This means that the judgments of British courts are no longer sovereign 
in such cases but must give way to a higher authority staffed by 
foreign judges. The Court seeks to empathetically balance Contracting 
States' individual circumstances against the human rights standards 
embodied in the Convention by allowing each State ``a margin of 
appreciation'' in interpreting their treaty obligations. In such 
instances, the basic test applied by the Court is whether or not the 
disputed practice answers a pressing social need and, if so, can be 
considered proportionate to the legitimate aim pursued. The domestic 
margin of appreciation is thus accompanied by a level of European 
supervision.
    This margin of appreciation has been applied by the Court in 
considering cases related to terrorism and other threats to 
parliamentary democracy with a flexibility not enjoyed by the U.S. 
Supreme Court. For example, in 1972 the Federal Republic of Germany 
adopted a decree aimed at excluding political extremists from 
employment in the civil service and reiterating all civil servants' 
legal duty of loyalty to the free democratic constitutional system. In 
a series of cases arising from the dismissal of members of the left-
wing German Communist Party (KPD) and right-wing National Democratic 
Party (NDP) from Civil Service positions (most often in the teaching 
profession), the Court accepted that ``a democratic state is entitled 
to require civil servants to be loyal to the constitutional principles 
in which it is founded'' and took into account ``Germany's experience 
under the Weimar republic and the bitter period that followed the 
collapse of that regime'' (Vogt v. Germany, 1995).
    In questions of free speech the Court has recognized that there is 
a balance to be struck between protecting national security and 
protecting fundamental human rights. The Court has explored where this 
balance lies most carefully in a series of complaints from Turkey 
arising from the local prosecution of articles and statements critical 
of Turkish government policy towards the Kurdish Workers' Party (PKK) 
finding for the government in Zana v. Turkey (1997) and against it in 
Incal v. Turkey (1998) and Arslan v. Turkey (1999). In its 
deliberations the Court weighed such factors as the prominence of the 
individual concerned, the circumstances of publication, the political 
climate at the time the statement was made and the ``virulence'' of the 
language used. It is therefore unlikely that the Court will strike down 
the most controversial section of Britain's Terrorism Act (2006) which 
creates a new offence of ``glorifying terrorism.''
    The Court made it clear in Ireland v United Kingdom (1978) that it 
did not see that it was any part of its function ``to substitute for 
the British Government's assessment any other assessment of what might 
be the most prudent or most expedient policy to combat terrorism.'' The 
Court restricted its role to reviewing the lawfulness, under the 
Convention, of the measures adopted by the Government in Northern 
Ireland. In this context, in Ireland v. United Kingdom the Court did 
not find extra-judicial internment a breach of the Convention nor did 
it find the British primary focus on Irish nationalist groups 
discriminatory. It did, however, rule against the use of coercive 
interrogation methods in detention centers in the Province (of which 
more below).
    The reason for this discrepancy is that, although States do have 
the right under Article 15 of the ECHR to lodge a derogation from some 
aspects of the Convention--during a period of public emergency 
``threatening the life of the nation'' to the extent strictly required 
by the exigencies of the situation--there can be no derogation from the 
core values embodied in Article 2 (right to life), except in respect of 
deaths resulting from lawful acts of war, Article 3 (prohibition on 
torture or inhuman or degrading treatment), Article 4 (prohibition on 
compulsory labor) and Article 7 (prohibition on retrospective 
criminalization).
    The United Kingdom was the only European state to register a 
derogation from the Convention after the attacks in the United States 
on September 11th, 2001. The British government formally derogated from 
article 5(1)(f) of the ECHR, which protects against deprivation of 
liberty except for purposes of deportation or extradition. The reason 
for this decision was to allow the government to operate a special 
detention regime for political asylum applicants to the United Kingdom 
suspected of involvement in terrorism, where it was not possible to 
deport them because they would be at risk of torture or death if 
returned to their country of origin.
    Introduced in December 2001 as part of the Anti-Terrorism Crime and 
Security Act (ATCSA), this detention regime was finally overturned by 
the Law Lords (the British equivalent of the U.S. Supreme Court) in 
December 2004 as a breach of Britain's Human Rights Act (1998). In all, 
sixteen individuals were detained under the ATCSA and all were 
subsequently released although most are still subject to control orders 
restricting their freedom of movement.
    Britain has contributed more to the evolving jurisprudence of the 
European Court in the area of national security than other nation 
(except perhaps for Turkey) because of the Troubles in Northern 
Ireland. A number of landmark cases have had a major impact on British 
counterterrorism practice in areas such as the use of telephone 
intercepts, the legal status of the intelligence services, the use of 
military forces in a civilian context, oversight mechanisms, and the 
use of coercive interrogation methods. A selection of relevant cases 
can be found at Annex A.
How do the British balance individual liberties with the need for 
        collective security?
            A Doctrine of Criminalization
    In the early 1970s a series of missteps in Northern Ireland--
notably the introduction of internment, the deployment of troops armed 
with live ammunition in public order situations and the use of coercive 
interrogation (see below)--resulted from the initial decision to treat 
the Troubles in much the same way as a colonial disturbance. Emblematic 
of this approach was the arrival Brigadier Frank Kitson, the celebrated 
author of the classic counterinsurgency manual Low Intensity Operations 
and a veteran of British military campaigns in Malaya, Kenya and Oman, 
to command the British Army Brigade in Belfast. The legacy of this 
policy was a major escalation in the level of violence across the 
Province and the extension of the nationalist terror campaign to the 
British Mainland. As Sinn Fein leader Gerry Adams noted in his memoir 
Before the Dawn: ``The attitude and presence of British troops was also 
a reminder that we were Irish, and there was an instant resurgence of 
national consciousness and an almost immediate politicization of the 
local populace.''
    A change of government in 1974 ushered in a new approach in 
Northern Ireland, one that aimed to delegitimize PIRA violence by 
treating terrorism as just another criminal activity to be dealt with 
at a local level. This strategy, which became known as criminalization, 
normalization and Ulsterization, guided British attitudes for the 
remainder of the conflict and has become a benchmark for British 
governmental responses to terrorism. In Northern Ireland this policy 
ultimately created a climate in which both cross-border co-operation 
could flourish and a meaningful peace process could gain ground amongst 
the warring parties. Since 1974 successive British governments from the 
two major parties have pursued a policy of treating terrorism--both 
foreign and domestic--as a law enforcement problem.
    Having tried brute force and found it wanting, the British 
government has come to appreciate the importance of legitimacy in 
counterterrorism operations. Criminalizing terrorism adds greatly to 
the appearance of legitimacy. It also creates a framework which 
significantly mitigates the sort of abuses that can discredit a 
government internationally:
  --The British criminal justice system has demonstrated an increasing 
        willingness to address and eventually rectify past mistakes, 
        such as the wrongful convictions of the Birmingham Six and 
        Guildford Four who had been suspected of involvement in a 
        series of pub bombings in the autumn of 1974.
  --The Stalker and Stevens independent police enquiries into 
        allegations of a government sanctioned ``shoot-to-kill'' policy 
        in Northern Ireland together comprise the largest criminal 
        investigation ever undertaken in the United Kingdom generating 
        9,256 witness statements, 10,391 seized documents and 16,194 
        exhibits. The enquiries have resulted in almost 100 convictions 
        for a variety of offences but they ultimately failed to 
        demonstrate the existence of an official ``shoot-to-kill'' 
        policy.
  --The Courts have been vigilant in upholding basic human right 
        standards. As outlined above, in December 2004 the Law Lords 
        overturned the immigration detention regime established under 
        the ATCSA. In December 2005 the Law Lords ruled that material 
        gathered overseas by means of torture would be inadmissible as 
        evidence in British Courts.
    Finally, it should also be noted that Parliament has played a major 
role in advocating for civil liberties in recent years. In 2005 the 
Labour government introduced a Terrorism Bill that proposed a maximum 
90 day period of detention without charge for terrorism offences. This 
Bill was defeated despite a substantial government majority in the 
House of Commons because a number of Labour MPs voted against their own 
front bench. The Terrorism Act (2006) introduced a shorter 30 day 
maximum period of detention and this passed with significant misgivings 
and a commitment to further consultation.
            Oversight
    It is probably fair to say that the British public lacks ``the 
dread of government'' often ascribed to the American people and this 
can be seen in the relatively benign oversight mechanisms that govern 
the operations of the security and intelligence agencies. Although a 
former Director General of the Security Service, Dame Stella 
Rimmington, has observed that accountability lies at the heart of the 
tension between liberty and security, this is an area in which the 
United Kingdom differs markedly from the United States.
    In the United Kingdom the oversight applied to the operation of the 
intelligence and security services is primarily either Ministerial (the 
Home Secretary or Foreign Secretary) or bureaucratic (the Joint 
Intelligence Committee and National Audit Office) although some public 
mechanisms for redress exist through designated Tribunals or 
Commissioners. Parliamentary oversight is limited to a single statutory 
committee with a legally defined brief restricted to matters of 
expenditure, administration and policy. This is a constitutional 
oddity--the parliamentary oversight of governmental bodies is usually 
conducted by Parliamentary Select Committees which have greater freedom 
to set their own agendas. More details on the oversight regime in the 
United Kingdom can be found at Annex B.
What can the United States Learn From the British?
            Coordination
    The greatest single strength of the British approach to 
counterterrorism is the high degree of coordination that now extends 
throughout the national security hierarchy. This was not something that 
happened overnight but has evolved over several decades. At the apex of 
this system is the Joint Intelligence Committee (JIC) comprised of the 
heads of each intelligence agency and chaired by a senior civil servant 
with experience of, but not necessarily from, the intelligence 
community.
    The Committee meets weekly or more frequently should circumstances 
require it. Its primary role is to produce definitive top-level all-
source assessments for British ministers and senior officials. These 
assessments are produced by Cabinet Intelligence Groups (CIGs) chaired 
by Cabinet Office staff and comprised of subject experts from the 
intelligence community. Every relevant party is represented and the 
objective of the group is to agree a corporate assessment that reflects 
a consensus view across government. Thus ministers are not bombarded by 
conflicting information and left to reach their own conclusion 
regarding the most compelling interpretation.
    Each Service also submits an account of its overall performance to 
the Joint Intelligence Committee (JIC) for consideration by the 
Security and Intelligence Coordinator as part of the Agency Performance 
Review. The JIC reviews and validates the Services' plans and 
priorities for the forthcoming year as part of this process.
    Subject experts from different agencies frequently have the formal 
opportunity to add their comments to intelligence reports issued by 
other agencies ensuring that key intelligence--HUMINT and SIGINT--is 
presented along with corroborating or discrediting material from other 
sources. Finally, it is worth noting that the relatively small size of 
the British intelligence community allows subject experts to develop 
strong relationships with their counterparts in other agencies. This 
greatly facilitates the flow of information between agencies and helps 
to reduce inter-service rivalry.
    The Joint Terrorism Analysis Center (JTAC) was established in June 
2003 as the United Kingdom's center for the analysis and assessment of 
international terrorism. JTAC sets threat levels and issues warnings of 
threats and disseminates in-depth reports on trends, terrorist networks 
and capabilities to its partners in government. Eleven government 
departments and agencies are represented on the staff of JTAC and the 
center is based in Thames House, the headquarters of the British 
Security Service. The head of JTAC reports directly to the Service's 
Director General.
The Role of the Security Service (MI5)
    The Security Service has primacy in all counterterrorism 
intelligence investigations conducted either on the British mainland or 
overseas. According to the Intelligence and Security Committee report 
on the July 2005 London Transport bombings, the number of MI5's 
``primary investigative targets'' rose from 250 to 800 between 
September 11, 2001 and July 2005. Intelligence-gathering operations 
relating to these ``primary targets'' are the Service's main priority.
    The Security Service also acts as an interface between the 
intelligence community and law enforcement. It has developed a deep 
institutional understanding of the demands and operational constraints 
of each paradigm. The Service is not an executive agency and its 
officers have no powers of arrest. Executive action can only be taken 
by the nation's law enforcement agencies although Chief Constables have 
the option of requesting military support in certain circumstances. 
Post-incident primacy rests with the police service in whose force area 
a terrorist incident has occurred, although MI5 can continue to act in 
a supporting role to the police investigation. The Service can bring a 
range of resources not usually available to Chief Constables to support 
local operations. The Northern Ireland Police Service still enjoys 
intelligence primacy in Northern Ireland although this status is 
currently under review.
    As the central coordinating point in Britain's pre-emptive 
counterterrorist effort, the Security Service also disseminates 
intelligence to regional police forces and other governmental partners 
in the form of both actionable reports and background bulletins which 
can cover anything from briefings on different terrorist organizations 
to technical reports on terrorist weapon systems. The Service advises 
Whitehall and the business community on protective security measures 
and runs training courses for external--even foreign--personnel. It 
spearheaded the installation of nationwide secure communications system 
for police Special Branches and provides national coverage in a system 
which is otherwise robustly regional in character.
    The Security Service can be seen as the glue that holds the 
architecture of the British counterterrorist effort together. There are 
currently forty-three regional police forces in England and Wales most 
with less than 4,000 officers, another eight in Scotland operating 
under a separate judicial system, the Northern Ireland Police Service 
and a small number of forces with specialized roles such as British 
Transport Police or the Ministry of Defence Police. There is no 
national police force equivalent to the Federal Bureau of Investigation 
(FBI) although the newly created Serious Organized Crime Agency (SOCA) 
is beginning to partly develop in this direction. The fact that the 
government chose a former Director General of the Security Service, Sir 
Stephen Lander, as the first head of the SOCA is an important 
illustration of the reputation MI5 has established for building 
effective coalitions within the law enforcement community.
An American MI5
    Post incident investigation and pre-emptive intelligence gathering 
require a different--and not always symbiotic--skill set. Furthermore, 
from a managerial perspective prosecution and intelligence exploitation 
can frequently be mutually exclusive objectives greatly detracting from 
clarity of purpose. While clearly there is no a priori reason why both 
functions cannot effectively be undertaken by the same agency, the 
British experience suggests that this can prove problematic.
    The counterterrorist function in the United Kingdom was initially 
vested in Police Special Branches (SB) comprised of detectives 
operating within regional constabularies. The first Special Branch was 
established by the Metropolitan Police in 1883 to counter the threat 
from the Irish Republican Brotherhood. Police Special Branches, 
coordinated by the Metropolitan Police, enjoyed primacy in 
counterterrorist intelligence investigations on the British mainland 
for most of the Twentieth Century.
    At the outset of the 1990s a degree of governmental dissatisfaction 
at the lack of success of this arrangement, coupled with an expectation 
that the collapse of the Warsaw Pact would free up intelligence 
resources, led in 1992 to the transfer of primacy from the Special 
Branches to the Security Service. The Special Branches had been able to 
boast very few successful intelligence-led arrests. The Service by 
contrast had an almost immediate impact and the number of pre-emptive 
disruptions of terrorist activity increased, with Service operations 
leading to 21 convictions for terrorism-related offences between 1992 
and 1999.
    However, this consideration also needs to be balanced against 
another important lesson of the British experience, which is that 
institutional relationships need time to bed down and that once 
agencies start operating effectively these relationships improve and 
strengthen over time. Police Special Branches have been working closely 
with the Security Service since 1910 when the then Home Secretary, 
Winston Churchill, provided MI5's first Director General, Vernon Kell, 
with a letter directing the chief constables to extend him ``the 
necessary facilities for his work.'' The Security Service and the 
Secret Intelligence Service were both born out of the same government 
agency, the Secret Service Bureau, and ties have remained close. The 
key to this virtuous circle in the United Kingdom has been effective 
executive leadership. There is definitely a sense in which disrupting 
existing relationships can have a retrograde effect on effective 
cooperation.
The Mistakes of the Past
    The British government's early missteps in its counterterrorism 
campaign against the Irish Republican Army (IRA) and the Provisional 
IRA (PIRA) are also instructive. Comparison and analogy are not always 
reliable policy guides but the British experience in Northern Ireland 
offers some useful insights into the inherent risks involved in the 
following areas: internment without charge, coercive interrogation and 
the use of military personnel in a traditional law enforcement role.
Internment
    In the fall of 1971, faced with escalating violence in the 
Province, the Unionist Prime Minister of Northern Ireland Brian 
Faulkner persuaded the British government that the introduction of 
internment might bring the situation under control. On August 9, 1971 
British troops mounted a series of raids across Northern Ireland which 
resulted in the detention of 342 IRA suspects. The operation, codenamed 
Demetrius, was characterized by poor and out of date intelligence which 
resulted in many individuals being wrongly detained. Joe Cahill, then 
Chief of Staff of the Provisional IRA and a prominent target of 
Operation Demetrius, taunted the authorities by surfacing to hold a 
press conference in Belfast at which he claimed only 30 of the men who 
had been detained were actually members of PIRA.
    Within Northern Ireland internment further galvanized the 
nationalist community in its opposition to British rule and there was 
an immediate upsurge in violence against the security forces. 27 people 
had been killed in the first 8 months of 1971 prompting the 
introduction of internment, in the four remaining months of the year 
147 people were killed. 467 were killed in 1972 as a result of 
terrorist action. The number of terrorist bombings in the Province 
increased dramatically from around 150 in 1970, to 1,382 in 1972. In 
the words of a former British Intelligence officer Frank Steele who 
served in Northern Ireland during this period: ``[Internment] barely 
damaged the IRA's command structure and led to a flood of recruits, 
money and weapons.''
    Internment was to continue in Northern Ireland until December 5, 
1975 by which time a total of 1,981 people had been detained, the vast 
majority of them from the Catholic community. The British Army 
estimated that up to 70 percent of the long-term internees became re-
involved in terrorist acts after their release so the measure clearly 
did little to deter committed activists. The British government finally 
took the decision to discard the power of internment in January 1998. 
Announcing the decision, the Junior Northern Ireland Minister Lord Dubs 
told the House of Lords: ``The Government have long held the view that 
internment does not represent an effective counter-terrorism measure. 
The power of internment has been shown to be counter-productive in 
terms of the tensions and divisions which it creates.''
Coercive Interrogation
    In the immediate aftermath of the introduction of internment in 
August 1971 the British security forces implemented a policy of 
``interrogation in depth'' for selected detainees. RUC interrogators 
working ``under the supervision'' of the British Army applied five 
well-established techniques which had previously been practiced in the 
course of colonial emergencies: (1) hooding, (2) wall-standing, (3) 
subjection to noise, (4) relative deprivation of food and water and (5) 
sleep deprivation. Almost a third of those detained on the first day of 
Operation Demetrius were released within 48 hours and with these 
releases came the first stories about the ill-treatment of those held 
by the security forces. In addition to the use of the ``five 
techniques'', detainees reported being forced to run an obstacle course 
over broken glass and rough ground whilst being beaten and, perhaps 
most seriously of all, being deceived into believing that they were 
about to be thrown from high flying helicopters unless they agreed to 
co-operate with the authorities.
    In August 1971 British Home Secretary Reginald Maudling responded 
to growing public concern by appointing Sir Edmund Compton to 
investigate forty such complaints made by suspects apprehended on the 
first day of internment. Despite accepting that the events described by 
the plaintives did indeed take place, Sir Edmund reported: ``Our 
investigations have not led us to conclude that any of the grouped or 
individual complainants suffered physical brutality as we understand 
the term.'' The failure of the Compton Report to meaningfully address 
the abuses that had occurred in British detention facilities further 
damaged the government's credibility.
    Ultimately, the government's failure to act decisively to curb 
abuses and put an end to the use of the ``five techniques'' led the 
Republic of Ireland to file an application with the European Commission 
on Human Rights alleging that the emergency procedures applied against 
suspected terrorists in Northern Ireland violated several articles of 
the European Convention on Human Rights. The case was referred to the 
European Court of Human Rights for adjudication which found that the 
``five techniques'' were ``cruel, inhuman and degrading'' and thus 
breaches of Article 3 of the Convention (See Annex A).
    The actual utility of coercive interrogation was also addressed at 
some length in the course of the Ireland v. United Kingdom case. The 
British government sought to argue that it had been necessary to 
introduce such techniques to combat a rise in terrorist violence. The 
government claimed that the two instances of ``interrogation-in-depth'' 
addressed by the Court had obtained a considerable quantity of 
actionable intelligence, including the identification of 700 active 
Republican terrorists and the discovery of individual responsibility 
for about 85 previously unexplained criminal incidents. However, other 
well-informed sources are more skeptical. The former British 
intelligence officer Frank Steele told the journalist Peter Taylor: 
``As for the special interrogation techniques, they were damned stupid 
as well as morally wrong . . .  in practical terms, the additional 
usable intelligence they produced was, I understand, minimal.'' 
Certainly the last quarter of 1971, the period during which these 
techniques were most employed, was marked by mounting not decreasing 
violence--a fairly obvious yardstick by which to measure their 
efficacy.
Military Operations
    The final incident to have a major impact on the evolution of IRA 
violence in the period 1971-1972 was the event that has become known as 
Bloody Sunday. On January 30th, 1972 soldiers from the British 
Parachute Regiment opened fire on civilian demonstrators in 
Londonderry/Derry killing 13 and wounding 29. The march that sparked 
the violence had been called to protest internment, rocks had been 
thrown at the soldiers and a shot allegedly fired, but the 
disproportionate British response prompted widespread international 
condemnation. In Dublin an enraged mob stormed the British Embassy 
burning it to the ground. The British government appointed the Widgery 
Tribunal to investigate the incident but it exonerated the soldiers 
involved handing the Republican community yet a further propaganda 
victory.
    The nature of IRA violence changed dramatically after Bloody Sunday 
as the incident prompted the first mainland bombing of the Troubles in 
February 1972 when the Official IRA left a car bomb outside the 
Officer's Mess of the Parachute Regiment in Aldershot, Hampshire. An 
Official IRA spokesman issued a statement in Dublin that the attack had 
been carried out ``in revenge'' for the Bloody Sunday killings. 
Deliberate attacks on civilian targets on the British Mainland soon 
followed including four simultaneous car bombs left in London in March 
1973, bombs at mainline London railway stations in September 1973 and 
in public houses in Guildford and Birmingham in the autumn of 1974.
    Throughout the Troubles Britain found itself defending the use of 
deadly force against terrorist suspects in a succession of ECHR cases. 
In perhaps the most damaging case--McCann and Others v. United Kingdom 
(1995)--the court found that three members of a PIRA Active Service 
Unit (ASU) had been killed unlawfully when British Special Forces 
troopers indicted their operation on the British overseas territory of 
Gibraltar (See Annex A). Lingering suspicions that Britain operated a 
`shoot-to-kill' policy in its counterterrorist operations against PIRA 
were extremely damaging to the country's international reputation and 
became a major source of resentment in the nationalist community.
                                annex a
Ireland v. United Kingdom (1978)
    In August 1971, faced with escalating violence in the Province of 
Northern Ireland, the British government introduced non-judicial 
internment for suspected members of nationalist terrorist 
organizations. On the first day of internment 342 suspected members of 
the Irish Republican Army (IRA) were detained by the British security 
forces. A small number of these detainees (there are only 14 well-
documented cases) were selected by the security forces for a new 
coercive regime of ``interrogation in depth.''
    Royal Ulster Constabulary (RUC) interrogators working ``under the 
supervision'' of the British Army applied five well-established 
techniques which had previously been practiced in the course of 
colonial emergencies: (1) hooding, (2) wall-standing, (3) subjection to 
noise, (4) relative deprivation of food and water and (5) sleep 
deprivation. As details of these techniques became public there was an 
outcry against their use which was eventually discontinued in April 
1972.
    The terms used are fairly self explanatory. Hooding meant that a 
prisoner's head was covered with an opaque cloth bag with no 
ventilation, except during interrogation or when in isolation. The 
prisoner would often also be stripped naked to enhance his feeling of 
vulnerability. Wall-standing consisted of forcing prisoners to stand 
balanced against a cell wall in the ``search position'' for hours at a 
time inducing painful muscle cramps. One prisoner was forced to remain 
in this position for 43.5 hours and there were at least six other 
recorded instances of prisoners being kept like this for more than 20 
hours. Subjection to noise meant placing the prisoner in close 
proximity to the monotonous whine of machinery such as a generator or 
compressor for as long as 6 or 7 days. At least one prisoner subjected 
to this treatment, Jim Auld, told Amnesty International that having 
been driven to the brink of insanity by the noise he had tried to 
commit suicide by banging his head against metal piping in his cell. 
Food and water deprivation meant a strict regimen of bread and water. 
Sleep deprivation was practiced prior to interrogation and often in 
tandem with wall-standing. Detainees were usually subjected to this 
conditioning over the course of about a week.
    However, the matter did not end there. On December 16, 1971 the 
Republic of Ireland had filed an application with the European 
Commission on Human Rights alleging that the emergency procedures 
applied by the British security forces in Northern Ireland violated 
several articles of the European Convention. In its February 1976 
report to the Committee of Ministers of the Council of Europe the 
Commission unanimously found that the ``five techniques'' amounted to 
``a modern system of torture'' and a violation of Article 3 of the 
Convention. The case was referred to the European Court of Human Rights 
for adjudication.
    Ireland v. United Kingdom (1978) was the first inter-state case 
ever brought before the European Court. Reviewing the evidence the 
Court found the ``five techniques'' to be ``cruel, inhuman and 
degrading'' and thus breaches of Article 3 of the Convention but 
stopped short of describing them as torture noting that ``they did not 
occasion suffering of the particular intensity and cruelty implied by 
the word torture.'' The UK was directed to pay compensation to the 
victims.
    In the course of the hearings British Attorney General, Samuel 
Silkin, gave the following commitment to the Court: ``The Government of 
the United Kingdom have considered the question of the use of the `five 
techniques' with very great care and with particular regard to Article 
3 of the Convention. They now give this unqualified undertaking, that 
the `five techniques' will not in any circumstances be reintroduced as 
an aid to interrogation.'' And, to this day, they have not.
Malone v. United Kingdom (1984)
    Article 8 of the Convention guarantees a right to privacy and 
protects citizens from state interference with this right ``except such 
as is in accordance with the law and is necessary in a democratic 
society in the interests of national security, public safety or--for 
the prevention of disorder or crime.''
    Article 8 was put to the test in Malone v. UK. In March 1977, a 
British national, Mr. James Malone, was charged with a number of 
offences relating to dishonest handling of stolen goods. It emerged in 
the original trial that the police had been privy to private telephone 
conversations between Malone and his associates although this material 
was not (and could not be in) tendered in evidence.\1\ Malone 
ultimately challenged what he believed to be the extended monitoring of 
his telephone line in the Strasbourg Court. In Malone v. UK the Court 
found that the mechanisms governing the interception of communications 
by the police were sufficiently legally ill-defined to place Britain in 
breach of Article 8 of the ECHR. The Malone case also raised the 
question of effective remedy, a right established under Article 13 of 
the ECHR, although the Court did not rule on the issue.
---------------------------------------------------------------------------
    \1\ Britain remains one of the few legal regimes in the world in 
which telephone intercept material is still not admissible as evidence 
in Court. Curiously, material gathered from eavesdropping devices is 
considered admissible.
---------------------------------------------------------------------------
    The British government of the day responded to the Malone judgment 
by introducing the Interception of Communications Act (IOCA) in 1985. 
IOCA was designed to govern all circumstances in which the interception 
of communications might be required including the exigencies of 
national security. Under the terms of the Act this method of 
intelligence collection could only be undertaken in a domestic context 
if expressly authorized by a warrant signed by the appropriate 
Secretary of State. IOCA also established a right of redress for anyone 
who believed that interception had taken place unlawfully in the form 
of an independent Interception of Communications Tribunal and 
Commissioner.
McCann and others v. United Kingdom (1995)
    On March 6, 1988, forewarned by intelligence sources, British 
soldiers from the Special Air Service (SAS) interdicted what they 
thought to be a Provisional IRA attempt to plant a car bomb on the 
route of a military parade on Gibraltar. The soldiers' mission was to 
affect an arrest in support of the local police, but because the 
suspects allegedly adopted ``an aggressive stance'' when challenged, 
they were shot dead by the troopers.
    All three PIRA members proved to be unarmed at the time of the 
shooting and the car they had positioned along the parade route did not 
contain a bomb although a car linked to the trio, discovered later in 
nearby Marbella, was found to be packed with explosives. Daniel McCann, 
Sean Savage and Mairead Farrell were all well known PIRA activists, 
indeed Farrell had served 10 years for her part in the bombing of a 
hotel outside Belfast in 1976.
    There was widespread criticism of the SAS's failure to apprehend 
three unarmed suspects without loss of life. Allegations of ``a shoot-
to-kill policy'' resurfaced--primarily in a controversial BBC 
television documentary entitled Death on the Rock in which two alleged 
eyewitnesses alleged that the British soldiers had opened fire on the 
PIRA trio without warning.
    The families of the dead PIRA volunteers took the case to the 
European Court of Human Rights in McCann and others v. United Kingdom. 
In September 1995 the Court narrowly ruled in a 10-9 majority decision 
that the PIRA team had been ``unlawfully killed'' in breach of Article 
2(2) because it was not convinced the use of lethal force by the SAS 
troopers had been ``absolutely necessary'' to protect the public. In a 
closely argued opinion the majority members of the Court criticized the 
British actions on three main grounds.
    First, the British authorities could have chosen to apprehend the 
PIRA suspects at an earlier stage in their preparations but chose to 
allow the operation to run long to gather further incriminating 
evidence of their activities, thus in part assuming some of the 
responsibility for placing the public at risk. The Court commented that 
allowing the operation to proceed to the point that it was thought a 
bomb may have been activated was a ``serious miscalculation'' which 
``set the scene'' for the fatal shooting.
    Second, the Court noted that the British authorities had rushed to 
judgment in assuming that the car parked by the PIRA Active Service 
Unit would contain a remotely activated bomb. The briefings received by 
the SAS troopers disproportionately focused on this possibility and did 
not sufficiently reference other, less threatening, but equally 
reasonable alternatives. This too created a climate which made recourse 
to lethal force ``almost unavoidable.''
    Finally, the Court found the reflexive resort to lethal force by 
the SAS troopers themselves troubling. The Court noted that the 
training received by Special Forces soldiers lacked ``the degree of 
caution in the use of firearms to be expected from law enforcement 
personnel in a democratic society'' and failed to emphasize ``the legal 
responsibilities of the individual officer in the light of conditions 
prevailing at the moment of engagement.''
McKerr v. United Kingdom (2001)
    The ECHR was again called to rule on four separate cases in which 
14 people had been killed in Northern Ireland between 1982 and 1992 
allegedly by or with the collusion of the security forces--McKerr v. 
United Kingdom (2001), Hugh Jordan v. United Kingdom (2001), Kelly and 
Others v. United Kingdom (2001) and Shanaghan v. United Kingdom (2001). 
However, on each occasion the Court stopped short of finding that the 
victims had been unlawfully killed, commenting instead in May 2001 that 
the post-incident proceedings for investigating the use of lethal force 
by the security forces had sufficient shortcomings for the UK to be in 
breach of the procedural obligations imposed by Article 2 of the 
Convention but nothing more.
                                annex b
Oversight
    Prior to 1985 none of the work of the British intelligence or 
security agencies was done on a statutory basis. The Government denied 
the very existence of the Secret Intelligence Service (SIS) and the 
Security Service (MI5). The agencies derived their authority from 
ministerial directives, such the Maxwell Fyfe Directive \2\ which 
governed the operation of MI5, and the royal prerogative. There were no 
oversight mechanisms outside the chain of command of both agencies 
other than those afforded by the government departments to which they 
reported--the Foreign and Commonwealth Office and Home Office 
respectively. Financing for the agencies was obtained through an annual 
``Secret Vote'' which approved a global figure submitted to Parliament 
without any supporting explanatory material. As a former Home 
Secretary, Jack Straw, has publicly acknowledged, the main catalysts 
for change were a series of cases before the European Court Human 
Rights, commencing with Malone v. United Kingdom (see Annex A), which 
incrementally addressed issues relating to the gathering of 
intelligence material and the operation of the intelligence agencies.
---------------------------------------------------------------------------
    \2\ The Maxwell Fyfe Directive is named after the Conservative Home 
Secretary and former Nuremburg Prosecutor who issued it on the occasion 
of the Security Service's formal transfer from the authority of the War 
Office to the Home Office.
---------------------------------------------------------------------------
    The government responded to this criticism by introducing the 
Security Service Act in 1989. This placed the UK's domestic 
intelligence agency on a statutory footing for the first time. The Act 
also established a Security Service Commissioner and a Complaints 
Tribunal. Between the introduction of the Security Service Act in 1989 
and the end of 1997 the Tribunal investigated 275 complaints. No 
complaint was upheld. In the great majority of cases, the complainants 
were unknown to the Service.
    The European Court of Human Rights considered that the Security 
Service Act placed the Service on sufficient legal footing for two 
pending cases involving alleged Security Service investigations to be 
discontinued. In the 1993 case Esbester v. UK the Court explicitly 
recognised that the Security Service Act struck a reasonable compromise 
between the requirements of defending a democratic society and the 
rights of the individual.
    Although the Security Service Act went far enough to satisfy 
Britain's European Convention on Human Rights obligations it still fell 
short of providing for the sort of parliamentary oversight that many 
critics of the intelligence apparatus were calling for. It also made no 
mention of the Secret Intelligence Service (SIS) the existence of which 
was only avowed for the first time by Prime Minster John Major in 1992. 
These shortcomings were addressed in the Intelligence Services Act of 
1994 which in addition to placing both SIS and GCHQ on a statutory 
footing and creating a complaints apparatus to cover both agencies also 
created a committee of Parliamentarians, the Intelligence and Security 
Committee, to ``examine the expenditure, administration and policy'' of 
all three intelligence and security agencies (SIS, GCHQ and MI5).
    The Intelligence and Security Committee (ISC) is constitutionally 
unique within the British system. Despite the fact that it is made up 
of Parliamentarians, it is not a Parliamentary Select Committee but a 
statutory committee with a legally defined brief. In some respects this 
gives it greater authority, adding weight to the Committee's requests 
for information. Its members are appointed from both Houses of 
Parliament by the Prime Minister after consultation with the Leader of 
the Opposition. Despite the executive's control over its appointments, 
the Committee has been characterized by its bipartisanship.
    The bulk of the Committee's work is done in camera and its findings 
must effectively be taken on trust. The Committee also reports to the 
Prime Minister rather than to Parliament. As with the Commissioners' 
reports, the Prime Minster is free to withhold material from Parliament 
out of security concerns. In the words of one former Committee member: 
``A good oversight committee will never be able to answer all the 
questions that are raised by honourable Members about the secret 
agencies or their work. It may never be able to answer questions about 
all the issues that it is investigating. That is inevitable. However, 
colleagues in the House should be able to feel confident that someone 
is investigating issues on their behalf and has the power to do the job 
properly, even if ordinary Members of Parliament are not able to get 
the answers themselves.''
    The Committee's original remit was strictly limited by the 
Intelligence Services Act to the examination of ancillary issues. Any 
responsibility for the oversight of operational matters was pointedly 
omitted from the Act. However, the members of the ISC have been 
effective advocates for some extension of their powers in this area and 
in recent years they have been briefed on a wide range of the Services' 
operational work--often at the request of ministers who see the utility 
in gaining independent validation for policy decisions. Since 1998 the 
ISC has employed an Investigator to undertake specific enquiries under 
the Committee's direction. Intelligence officials themselves have 
largely embraced the ISC as a new source of legitimacy for their work.

    Senator Gregg. Thank you, Mr. Parker.
    We have been joined by our senior member, the Senator from 
West Virginia. Do you have an opening statement you want to 
make, Senator?

                  STATEMENT OF SENATOR ROBERT C. BYRD

    Senator Byrd. Mr. Chairman, thank you. Thank you, Mr. 
Chairman--my favorite chairman, right here. One might as well 
proclaim his choice, had he not, openly and publicly?
    Senator Gregg. Very kind of you. My favorite ranking 
member.
    Senator Byrd. Bless your heart.
    Well, thank you, Mr. Chairman.
    Five years ago, more than 3,000 people lost their lives due 
to the September 11 attacks. Since then, Congress has passed 
and reauthorized the PATRIOT Act to give law enforcement more 
powers, and has reorganized government twice. Yet, polls 
indicate that many Americans still feel less safe than before 
the 9/11 attacks, including I.
    President Bush has said many times that those attacks were 
inspired by hatred of the freedoms that Americans enjoy. 
Surrendering our constitutional liberties, and especially the 
system of checks and balances that allow those liberties to 
endure, would seem to me to be a strike at the very principles 
upon which this country was founded.
    In this age of international terrorism, there is much that 
our Government can learn from the experience of other 
countries. Controversial British anti-terrorism laws, such as 
the suspension of the right to trial by jury in terrorism cases 
and the so-called ``Diplock courts,'' were passed as merely 
temporary measures. However, these temporary measures were 
extended time and again for nearly three decades. So, there is 
a lesson here. Could our country already be headed down the 
same path, in which our legislative branch approves curbs on 
civil liberties that last for decades even though they are 
labeled temporary?
    Take, for instance, the warrantless wiretapping that allows 
government to eavesdrop on millions of Americans without their 
knowledge. As Edmund Burke wrote in 1777, ``The true danger is 
when liberty is nibbled away for expedience and by parts.'' 
Listen to what Edmund Burke said again. Edmund Burke wrote in 
1777: ``The true danger is when liberty is nibbled away for 
expedience and by parts.''
    Mr. Chairman, we have worked on a bipartisan basis to 
strengthen our defense against terrorists by adding billions of 
dollars to border security and billions of dollars to airline 
security, billions of dollars to law enforcement, intelligence 
collection, and other essential programs. Yet, the funding has 
not caught up with the vast security vulnerabilities that 
remain.
    So, this brings us to what may be the key question of this 
hearing. If we do not adequately fund vital homeland security 
programs, might our vulnerabilities lead to even greater 
demands to set aside existing individual liberties in pursuit 
of more security? Is there not a close relationship between 
better funding of existing homeland security, law enforcement, 
and intelligence programs and the preservation of our 
liberties?
    There must be better ways to protect the American people 
from terrorism absent the abrogation of constitutional 
protections and the adoption of foreign models which 
concentrate more and more power in the hands of one man, the 
President.
    I thank the chairman for calling this important hearing. I 
thank the witnesses who are appearing before us.
    Senator Gregg. Thank you, Senator Byrd. That is a very 
interesting question you raise, which is, if we do not 
adequately fund and we respond to that by some action which 
limits liberty or the rights instead of funding. That is an 
interesting issue and maybe we can expand on that as we go 
forward.
    But initially the question which I think I would like to 
get to is this issue of, looking at British successes, what can 
we do to replicate those successes here without affronting our 
liberties and our constitutional rights. Judge Posner, you made 
it pretty clear that you felt that we could--do we need to do 
anything legislatively to give the executive branch the right 
to restrain people or to hold people longer than 48 hours? Do 
we have to declare that a person is--is there some sort of--
should there be some sort of court approval of that event in a 
FISA type of situation, or does that authority basically lie 
with the executive branch? That is my first question.
    The second question is, you suggest that we not bifurcate 
the FBI, although I have to tell you I used to chair the 
committee that had the FBI and my biggest frustration was that 
they were not able to move that culture from law enforcement 
into intelligence, and I still do not think they have even 
though I have not chaired that committee for 2 years. This was 
something we put a tremendous amount of pressure on them to do 
and they just--basically, the culture resisted.
    But let us assume we are not going to bifurcate it. Does 
that mean that an organization like Mr. Negroponte's new 
intelligence responsibility as sort of the intelligence czar is 
the place where you might set up a structure that would mirror 
the MI5 effort, and is that appropriate?
    So I would like to get those thoughts from all three of the 
witnesses--well, Mr. Yoo relative to whether American law, 
there is any statutory need in order to get to this British 
position of being able to hold people for a longer period of 
time if they are deemed to be terrorists, beyond the 48 hours, 
and then get your thoughts on those.
    Judge Posner. Let me respond briefly in reverse order, 
starting with the question of the FBI, MI5. Mr. Parker made a 
very important point. He said that the fact that the MI5, the 
security service, has a laser beam focus on intelligence is of 
great value because the FBI--you mentioned, Senator, that maybe 
FBI should be shifting its focus from kidnapping and bank 
robberies to national security and intelligence. Well, the 
problem is--this happened in Chicago--when the FBI tries to do 
that, the banks and the people in Chicago, they say: Well, wait 
a second. The number of bank robberies in Chicago is rising 
because the FBI is allocating resources to intelligence. That 
is the problem.
    So the FBI is torn. We want it to be the premier criminal 
investigation agency and that is of course what they are 
accustomed to doing, what they are trained to do, what they 
want to do. So very difficult to change their culture. You are 
quite right, 5 years, very little progress has been made in 
actually altering the focus of the FBI.
    He also mentioned, Mr. Parker, the fact that of course MI5 
works closely with the special branch of Scotland Yard and of 
the other British police offices. The special branches are 
specialized for criminal law enforcement focused on terrorism 
and espionage and so on. Well, we have the germ of that system 
here because the FBI--the President did insist, over the FBI's 
objections, that it fuse its terrorist-related units into a new 
division called the national security branch. It is 
interesting, they use the same word, ``branch.''
    That national security branch, which is really very similar 
to the special branch of Scotland Yard, that would work well, I 
think, with a separate domestic intelligence service. Where to 
place that service, whether it should be free-standing, whether 
it should be in the Department of Homeland Security--as I 
understand it, MI5 reports to the home secretary in the United 
Kingdom, which corresponds to the Secretary of Homeland 
Security. Whether it should be free-standing like the CIA and 
report to the Director of National Intelligence, whether it 
should actually be in his office, those are important 
organization questions which would require further study.
    In fact, what I would like to see from Congress, from the 
Director of National Intelligence, would be as a first step a 
feasibility study: Is this something we need, a separate 
agency, and concretely how would we establish it, where would 
we put it, would it work, and so on.
    With regard to your previous question, the first question 
about detention, Professor Yoo reminded me that the Supreme 
Court has permitted detention of terrorists outside the 
criminal justice system as enemy combatants. I was thinking 
more of a system of detention of terrorist suspects which would 
not require actually designating them as enemy combatants. The 
value of congressional intervention here is that Supreme Court 
has left everything very vague. You can hold a person--the 
government can hold a person for more than 48 hours if it can 
show that it is a bona fide emergency or there are other 
exceptional circumstances.
    I think it would be helpful for Congress to specify what 
constitutes an emergency and also to set some limit, so that 
the Government officials have some sense how long can they hold 
a person beyond 48 hours. We do not want it to be indefinite. 
Under the English system as I understand it--and it would be a 
good feature of our system--you do not just make an initial 
decision this person is going to be in for 28 days. You have 
frequent reauthorization by a judge. That I think, prescribing 
the procedures and the timetable for this sort of thing, that 
would be a function for Congress, rather than leaving it to the 
courts, I would think.
    Senator Gregg. Thank you, Judge.
    Mr. Yoo, did you want to comment on those?
    Mr. Yoo. Yes, thank you, Senator. I quite agree with what 
Judge Posner says on the detention issue. It is the case that 
the Supreme Court has read the authorization to use military 
force that you passed on September 18, 2001 as authorization to 
detain enemy combatants outside the criminal justice system. 
But the case of Hamdan where this was decided, the individual 
in question was captured outside the United States, in 
Afghanistan, so it left open the question whether these rules 
would apply within the United States.
    The Government detained Jose Padilla under that same claim 
of authority. The U.S. Court of Appeals for the Fourth Circuit 
upheld that as an exercise of this power to detain enemy 
combatants, but it did not reach the Supreme Court. So there is 
unclarity and ambiguity about whether this power could be used 
in the future, and so that would be an appropriate area, I 
agree, for further congressional explication of the standards.
    The other difference I would just point out is I take it 
under the British system, even when you are in this 28-day 
period, there are regular hearings, there is regular 
opportunity to go to a judge. In the enemy combatant process we 
use the system of habeas corpus, which can take much longer, 
and then under the Defense Department regulations there is an 
annual, I think, review of the combatant status. So the British 
system actually has more judicial review than ours does.
    One question you might want to ask if you are going to go 
ahead and draft legislation is whether you want to have more 
than just annual reviews. This is also tied up in the 
litigation about--I am sorry, the consideration of how Congress 
is going to react to the Hamdan bill. There is elements in that 
bill which talk about civilian judicial review over these 
determinations and how often they might occur. That is 
something you could change as that bill goes forward.
    In terms of the division between MI5--whether to have an 
MI5 type agency or not, I think everyone on the panel seems to 
agree that the current system is not working, that the FBI's 
mixture of criminal law enforcement and national security 
purposes is not a good one.
    I do not think it is a question of whether you need the 
change the statutory authority of the FBI. In a way, what Judge 
Posner describes, and I quite agree with this, is that maybe 
the statutory focus of the FBI has become too diffuse. They 
have too many things which they try to focus on--criminal law 
enforcement, bank robberies. You know, bank robberies, if you 
look at the history of the FBI the reason why bank robberies 
and kidnappings became their initial focus was because they 
were relatively easy to solve, you had high publicity when you 
solve them, and it is easy to measure how agents were doing. 
You could say, I caught five bank robbers this month. So it led 
to this case-based system for promotion within the FBI.
    That is an example of how you cannot change that kind of 
culture easily, because it is difficult to count, well, is this 
man or this agent doing a good job stopping terrorist attacks. 
Someone cannot come in and say, I stopped five terrorist 
attacks, because often you do not now how many terrorist 
attacks you stopped, if any, by taking a measure, because it is 
more future and prospective.
    So I think one thing you could do through the 
appropriations tool which I think would be a quite appropriate 
exercise of your power would be to start moving resources out 
of those areas of the FBI that focus on criminal justice, like 
bank robbery and kidnapping, and devote more money toward the 
counterterrorism and national security mission.
    You might also use your funding tool to try to change the 
way that the FBI measures success and how they reward 
employees, who gets promoted or not. That also I think would be 
a legitimate use of the appropriations tool.
    It may be that we made a mistake--I know you--I think you 
think this, is that we might have made a mistake trying to 
evolve the FBI into what we want, rather than making a clean 
break, whether you detach another agency or just start a new 
one. That might have been in the long run the more effective 
way to go, although there would be much more disruption when it 
happened. That is the kind of thing I think is something the 
committee can do.
    I do not know whether there is a lot of good studies on 
that in the United States. Most of the studies have been about 
how difficult it is to combine agencies into something like 
DHS. We have as far as I know very little work on how you split 
up an agency's functions and what is the most effective way to 
do it.
    One place one could look would be to look into the 
literature and work that has been done on corporations, which 
go through this all the time, and they make various choices 
about how to organize things appropriately.
    Senator Gregg. Thank you, Mr. Yoo.
    Did you wish to comment on either of those points, Mr. 
Parker?
    Mr. Parker. I thought it might be quite useful just to 
explain the genesis behind the 30-day detention period. The 
logic there is very specific and it has to do with operating in 
Europe with porous borders. There is a perception, I think a 
legitimate perception, as we have seen from the London 
transport bombings, with one of the suspects fleeing 
immediately to Italy where he had previously been a resident, 
that people would be able to cross national boundaries within 
Europe to carry out attacks very easily. It is almost 
impossible to get a response from a foreign police agency in 
less than 30 days. That was why police needed more time. A 
letter rogatoire, if you were to deliver it to the French 
authorities, even with great urgency by the time that has been 
processed and action has been taken and that information comes 
back your 48-hour detention period is certainly gone. The 7-day 
detention period that you had under the Prevention of Terrorism 
Act has almost certainly expired.
    That was why police agencies asked for more time. It was 
primarily--there were three cases cited. I believe one was 
European, one was North African, and it was the length of time 
that key information took to come back from local law 
enforcement in foreign countries that would have had a material 
effect on the cases brought before the courts. So that was the 
logic behind it.
    There is judicial review every 7 days, so the police have 
to go back, the crown prosecution service has to go back, and 
make the case for the continued detention.
    It is tremendously controversial. The government originally 
asked for 90 days. It was Parliament, despite the fact that 
Labour Party has a significant majority, that voted against 
that proposal and forced a change in the legislation. So it is 
controversial. There has been a commitment from the government 
to continue consultations on this issue, to review its 
effectiveness.
    It is going to be very interesting to see how the recent 
airplanes plot impacts on the use of this 30-day detention 
procedure. If the prosecutions are successful, I suspect it 
will be claimed as evidence that this detention process works. 
If the prosecutions collapse, I am sure there will be great 
pressure to reduce the length of detention prior to charging.
    On the point of an American MI5, it is quite useful to 
think of these agencies as a triage process. The role that the 
security service plays in Britain is kind of the spear of the 
point in the intelligence world. But investigations do not just 
begin and end there. There are still investigations at police 
district levels. There are still detectives carrying out 
investigations. It is only when it becomes significant and 
serious that the intelligence service becomes involved.
    You do not need a huge agency. In the mid-1990s the 
security service, at the height of the mainland bombing 
campaign by the Provisional IRA, had 200 officers and 1,800 
support staff and that was it. It has doubled in size since 
then, but it is still a relatively small agency, and it can get 
a lot of bang for your buck. This is very innovative. If 
designed properly, this can be a very, very effective way to 
focus on cases.
    The point has been made--I have worked both in intelligence 
and in law enforcement. There are different mind sets. There is 
a huge tension between gathering information for prosecution 
and looking for opportunities to exploit for intelligence 
purposes an ongoing investigation. The British tend to let 
cases run as long as possible because that is the greatest way, 
the greatest intelligence opportunity. The longer the case 
runs, the greater the opportunity you have to gather more 
information about people's contacts, funding sources, and so 
forth.
    As we saw recently in the Florida case, law enforcement's 
approach tends to be: This is worrying, this is dangerous; we 
cannot take the risk that something might happen. 
Interestingly, the European Court of Human Rights has 
criticized the United Kingdom in the McCann case, about the IRA 
attempt to put a bomb in Gibraltar on a military parade, for 
allowing a case to run so long that it put the public in 
danger, necessitating the use of force to apprehend, in fact 
kill, the three terrorists involved. The court said: Look, you 
let this case run too long; you put the public in danger every 
bit as much as the terrorists did. And Britain got rapped on 
the knuckles for that.
    But that was primarily because it was intelligence-led and 
they wanted to see how the operation was going to work, learn 
as much as possible, particularly because it was in Europe, and 
improve protective measures in the future from that 
information.
    Senator Gregg. Thank you.
    Senator Byrd.
    Senator Byrd. Thank you, Mr. Chairman.
    The United Kingdom, unlike the United States, has a 
specialized domestic intelligence agency known as MI5. Due 
largely to concerns about Big Brother and past intelligence 
abuses within our borders, the United States has been hesitant 
to permit the FBI, for example, to undertake broad domestic 
surveillance. What in the United Kingdom legal system 
constrains MI5 from conducting overly intrusive or unwarranted 
surveillance of the average law-abiding British citizen?
    Judge Posner. If I could respond, a domestic intelligence 
agency in the United States would be subject to all the 
restrictions that the Constitution and statutes impose on the 
FBI. So it is not proposed to create an agency that would have 
some kind of immunity from the Constitution or the laws. It is 
really an organizational question: Is it more efficient to 
place this surveillance, intelligence operation inside the FBI 
or to put it somewhere else? It is not a legal matter. It is a 
matter of organization theory really.
    Mr. Parker I think gave really strong arguments for why it 
makes sense to separate these, and it is not to take anything 
from the FBI. It is to add a small additional service with a 
very special focus, which would work with the FBI.
    One point he made earlier which I would like to echo is the 
importance of communication between Federal intelligence 
authorities and our local police. Our 18,000 police forces of 
course have a great deal of knowledge of what is going on in 
their communities, but if they are going to be a first line of 
defense against terrorism they have to know what to look for. 
We have to have effective communication with them, what should 
they be on the lookout for.
    This has been a serious problem with the FBI because of 
historic rivalries and tensions between the FBI and local 
police, because they compete for the same cases and there is 
cultural differences. The FBI are kind of, they wear suits and 
they have college educations, they do not wear uniforms, and so 
on. So just the communication function, which would not raise 
any kind of legal issues, is I think a very strong argument for 
having a separate agency.
    Mr. Parker. If I could add on that, the security service in 
the United Kingdom is restricted in what it can do by the 
Regulation of Investigatory--sorry--Regulation of Investigatory 
Powers Act of 2000. So like all law enforcement and 
intelligence agencies in the United Kingdom, there is a legal 
structure. It is relatively new, but it is binding on the 
security service.
    The security service also has to obtain home office 
warrants--these are warrants signed by the home secretary--to 
authorize telephone intercepts, property invasions, or 
eavesdropping operations, beaconing a car or something like 
that. Any sort of property or communications interference 
requires a warrant signed by the home secretary. Now, this is 
clearly an elected political official and not a judge, one of 
the big differences between the two systems. But it is still a 
very stringent process. There is an ombudsman, there is a 
commissioner that oversees independently the proper use of this 
power. Then finally, Parliament has a committee, the 
intelligence and security committee, that, although it was 
strictly established not to look at operational issues, has 
increasingly taken on that role. In fact, the security service 
has really benefited from that, the legitimacy that comes from 
having a degree of support from the legislative branch. Very 
noticeably, this committee was very supportive actually of the 
actions taken by the security service in the run-up to the 
London transport bombings, even though, as you are aware, the 
security service reduced its threat level just before the 
bombings took place. The inquiry in the intelligence and 
security committee found that that was a logical inference 
given the intelligence they had. That is useful. The public 
gets a very useful steer from people who have access to the 
material but are outside the system, very beneficial. It is a 
great example of bipartisan cooperation in the United Kingdom 
as well.
    I think I will probably stop there. Thank you.
    Senator Byrd. Thank you.
    Why do you believe that the British do not share our 
suspicion of state authority, or perhaps they do. Do they?
    Mr. Parker. The dread of Government. No, I think would be 
the answer. It is instructive, the sort of language we use. 
This is a sort of a bit extempore sort of sociology, is it not, 
but we refer to ``the Nanny State,'' not ``Big Brother,'' even 
though ``Big Brother'' is George Orwell's great phrase. We tend 
to talk of the state in terms of an overprotective mother 
rather than as a frightening, to be feared bully figure. Now, 
that no doubt has lots of cultural wellsprings and so forth.
    The other thing that I think is quite significant is there 
has not been any great history of abuse by Government. That is 
not to say Government has not committed abuses, but we never 
had the experience that Germany had, for example, or Italy had 
with an authoritarian power taking control of the government of 
the country, or at least we did have that experience for 10 
years in the 17th century.
    Senator Gregg. Not since Cromwell, you mean?
    Mr. Parker. Not since Oliver Cromwell, exactly.
    So again, the British government has not got a particular 
reason to fear. That obviously does not necessarily hold true 
for every community in the United Kingdom. If you were Catholic 
and you came from Belfast or Londonderry, clearly you would not 
necessarily take such a rosy view of the actions of the British 
state. But typically most citizens feel that the state is there 
to protect it, that it has discharged those functions fairly 
effectively.
    Bear in mind, this is not a new experience for us. We have 
had terrorist bombings in London going back now 120 years. I 
cannot think of a decade since the 1880s when a terrorist bomb 
has not exploded in London, whether it is Russian anarchists or 
the Fenians or the Provisional IRA, the Angry Brigade, the 
Animal Liberation Front, Hezbollah, al Qaeda. We have had 
pretty much everybody pass through London and kill somebody or 
blow something up, and this is a feature of our lives, and the 
state has been dealing with it continually for a long period 
without losing the public's confidence. Add to that two world 
wars on top of that, with the inevitably increased security 
regime that that entails.
    The public has faith the restrictions will be lifted when 
the emergency is passed because it has always been in the past, 
and we have a great reverence for tradition in the United 
Kingdom, so if it has happened before thus it will happen 
again. I think we are very comfortable that that weight of 
history will protect us.
    Judge Posner. Could I offer a brief footnote----
    Senator Gregg. Certainly, Judge.
    Judge Posner [continuing]. To what Mr. Parker said? His 
mention of Germany reminded me, after World War II when we 
permitted West Germany to have its own government again, as a 
condition the allies insisted that Germany separate domestic 
intelligence from law enforcement in a separate agency because 
they had been combined in the Gestapo and we thought that 
combination dangerous.
    So historically having a separate domestic agency, 
intelligence agency, has not been thought to compromise civil 
liberties, but quite the contrary.
    Senator Gregg. Senator Byrd.
    Senator Byrd. Judge Posner, you state in your testimony 
that the only limitation the Constitution places on searches 
without a warrant is that they be ``reasonable.'' You then 
state that any unreasonable methods of surveillance can be 
minimized ``without judicial intervention'' by rules subject to 
oversight by the executive and congressional watchdog 
committees. But, are there not three equal branches of 
Government under our constitutional system of checks and 
balances? Why would we trust the executive and a Congress of 
the same party to determine in every instance what is 
reasonable? Is that not the job of the Federal judiciary?
    Judge Posner. That certainly is an important function of 
the judiciary, but the question is the efficacy of judicial 
control over surveillance when it is exercised through the 
grant or denial of warrants. Of course, a warrant proceeding is 
ex parte. The Government goes in, tells its side of the story 
to the judge, and there is no adversary process and the judge 
grants or denies the warrant. So there is some judicial check, 
but it is not like an ordinary litigation.
    So the question is would some alternative be more effective 
than a warrant, such as simply reporting to the Congress and to 
the executive branch what the surveillance agencies are doing, 
who did they listen to and why, and are they targeting 
political enemies or is it legitimate investigation.
    It is important to emphasize that the fourth amendment does 
not require warrants. It limits warrants. It requires that 
searches be reasonable, and that reasonableness requirement, 
which is constitutional and fundamental, can be enforced in 
ways other than warrant requirements.
    The warrant approach--this is the criticism of FISA--it 
really is not designed for a situation where you are not 
wanting to monitor the people you know are terrorists, you want 
to find out, are there terrorists, where are they, who are 
they. For that, you cannot give the kind of information to the 
magistrate or the judge that you would when you ask for a 
warrant.
    So I think--it is part of what I said in my opening--we do 
not want to--we do not want to be confined by the criminal 
justice system and judicial norms and customs in thinking about 
how to protect civil liberties while not endangering national 
security.
    Senator Gregg. Thank you.
    Two questions here. Let me try to frame the Hamdan issue as 
I see it, as we are wrestling with it here in the Senate, and 
get your thoughts as legal experts, Judge Posner and Mr. Yoo, 
as to which is the proper approach. As I see it, it comes down 
to essentially this. The administration wants to set up a 
regime where they interpret Common Article 3 under the Geneva 
Conventions specifically enough so that they can basically give 
a safe harbor to the interrogators who are trying to find out 
from terrorists who we captured information which will stop us 
from being attacked by somebody, without using torture or 
processes which would be outside the bounds of reasonable 
interrogation.
    Those who oppose that specific, defining Common Article 3 
with specific language that would give a safe harbor, take the 
position that if we do that then we will be having--we will 
have set up a regime which basically says we can define the 
Geneva Convention in whatever way we desire to define it, which 
means that North Korea could do the same thing, theoretically, 
were it a signatory to the Geneva Convention, which I do not 
know if it is or not. It probably is not. So it would mute the 
effectiveness of the Geneva Convention.
    The bottom line, of course, is how do we stop people from 
attacking us who might use a weapon of mass destruction and how 
do we get the intelligence to do that. This is a war of 
intelligence. It is not a war of armies. I think that was an 
interesting point that you made, Mr. Parker, that you do not 
have the military as part of your structure. We have become too 
absorbed as a war of armies instead of a war of intelligence.
    But independent of that, which is another side issue of 
very big significance, I would be interested in you, Judge and 
professors, if you feel an expertise in this area or 
comfortableness in this area, giving us your thoughts on this, 
because this is an issue that is very current and very hot here 
in the Senate.
    Judge Posner. You are the expert.
    Mr. Yoo. Well, if a judge orders me to speak I will speak.
    It had been my view before Hamdan that Common Article 3 did 
not apply to the war on terrorism or the Geneva Conventions, 
which is a view I worked on in the Justice Department after 9/
11. But assuming it does apply, as the Supreme Court suggested 
in Hamdan, one important thing to just mention is you have 
focused on I think what really is the most important part of 
this military commission bill. If you think about it, the 
military commission issue is about how to deal with people who 
are no longer a threat. They have already been removed from the 
battlefield. All the fights we are having are about things we 
could defer until the war was over. We could try them, as we 
did in World War II, after the conflict was over.
    The part you are focused on is really the most important 
part of the bill in terms of our ability to fight the war going 
forward. It is interesting that there has been less focus on it 
actually than whether we give certain kinds of evidence to the 
defendant. But I think it is the most important part of the 
bill in terms of our future abilities.
    One is I think no one would deny that Common Article 3 is 
very vague. It goes well beyond cruel and inhumane treatment. 
It also says you cannot engage in affronts to the personal 
dignity of a prisoner, and if the prisoner is a fundamentalist 
Islamic person I would think they might be offended, for 
example the hypothetical that is actually raised, what if we 
used female interrogators? Would that be a violation of Common 
Article 3 if they are personally, if they feel their dignity is 
offended by that?
    So I think it is perfectly appropriate for Congress, and 
Congress has traditionally done this with vague treaty terms, 
is to pass laws that specify what they mean. And I quite agree 
with you, I think it is also important for Congress to do that 
because otherwise our interrogators are going to not use 
measures which may be legal, but they are just uncertain, so 
they may hold back. That may be the wrong attitude we want our 
counterintelligence and counterterrorism people to have in this 
kind of war. I think Mr. Parker is quite right, it is a very 
different kind of war, where information, as you said, where 
information is of the highest priority.
    The other thing that is different, that makes it different 
than the IRA example, we are fighting a purely non-state 
network that is not attached to any certain kind of territory 
or has territorial claims against the United States. It really 
is much more, in many ways much more difficult than the IRA 
example because of that, which may require that we try harder 
to get intelligence than the British may have had to. That is a 
cost-benefit decision that you and the executive branch should 
make.
    Let me also get to the reciprocal treatment argument. I 
think that is a very important policy argument. It is not clear 
to me whether that holds in the war on terrorism. Traditionally 
under the laws of war, nations have used reciprocal threats to 
prevent the opponent from conducting certain kinds of 
operations. The greatest example is why there was no use of 
chemical or biological weapons in World War II on the western 
front. Both sides essentially deterred each other through 
threat of reciprocal harm.
    One question to ask is that really something that is 
possible with al Qaeda. From everything we see, they will 
violate the laws of war, they will behead our soldiers, they 
will try to kidnap and behead civilians, no matter how we treat 
their prisoners. So it is really this--it is a really I think 
more tenuous claim that is being made about reciprocal 
treatment, which is suppose the United States got in a war with 
China, for example. Would the fact that the Chinese--would the 
fact that we did not apply the Geneva Conventions to al Qaeda 
affect how the Chinese treat our own soldiers?
    Just two points on that. One is I would think that what 
would be most important to the Chinese or any future opponent 
is how we treat their prisoners in that war, not how we treated 
prisoners from this non-state terrorist organization in a 
previous conflict.
    The second thing you ought to ask--I am sorry, which you 
raised, is historically our prisoners have been quite badly 
abused in many conflicts since the Geneva Convention even when 
we followed the highest standards. So that is another question 
you ought to take into consideration when you and the executive 
branch consider how to define Common Article 3.
    Senator Gregg. Well, I thank you for that answer. I wish 
you would communicate it to some of my colleagues.
    My last question, and you have given us a lot of your time 
and we very much appreciate it, is: Under our system--the 
English were able to move to an MI5 system rather comfortably. 
It is a great country, but a small country compared to us. We 
have got this now huge complexity of intelligence capability. 
We have got the FBI, we have got the CIA, we have got 
Ambassasor John Negroponte's group, we have Homeland Security's 
initiatives, and then almost every sub-agency has their own 
intelligence capability. CDC has an intelligence capability.
    If you were to take the FBI's responsibility for 
intelligence out of the FBI, I guess the question becomes, do 
you undermine one of the few premier agencies we have in the 
area of fighting people who might do us harm and get very 
little for it? And if you did do that, how robust would this 
new agency be, because it is going to compete with turf--with 
the CIA, which is a vicious turf organization, with DIA, which 
is even more vicious, and the FBI. And those are just three of 
the big boys, is it even feasible for us to have an MI5 that is 
functional in the way we have this Government structured or do 
we just sort of have to get all these guys, all these agencies 
to work together, through the National Center for Terrorism 
which we have set up or some other agency like that?
    What do you think, Judge?
    Judge Posner. Well, I would not take anything out of the 
FBI, because what the FBI--the FBI's conception of intelligence 
is really intelligence in support of criminal law enforcement, 
and that is similar to the intelligence focus of Scotland Yard 
Special Branch. So I would leave the FBI as it is and set up a 
separate agency.
    It is true, we have a very complicated Government. We have 
too many agencies. But we do have a kind of vacuum, and it is 
extremely--we have a real hole in our counterterrorism 
structure and that hole is that we do not have a domestic 
intelligence service. Every other country that I know of has 
recognized that domestic intelligence--that there should be a 
domestic intelligence function which is separate from the 
national police force or the national criminal investigation 
system. It could be France, Germany, Spain, Italy, New Zealand, 
Australia, Japan, India, Israel, Canada, and the United 
Kingdom. They all think that.
    Many of these are countries which have much longer 
histories of struggling with terrorism than we do. So yes, we 
have a huge number of agencies, maybe too many, but we do not 
have a really critical component of an all-around 
counterterrorist structure and that is a separate domestic 
intelligence agency. But again to repeat, I do not think we 
should take anything out of the FBI because even if we had a 
separate intelligence agency it would need to work with 
specialists in counterterrorist criminal law enforcement.
    So if you look inside the FBI and inside its new national 
security branch, you have a counterterrorism division which is 
a division that tries to arrest and prosecute terrorists, and 
you have a counterintelligence division, which tries to do the 
same thing with foreign spies, and you have a directorate of 
intelligence, which gathers information in support of these 
criminal law investigative activities involving terrorists and 
spies.
    So we need that. We need that national security branch. But 
we want it to--we need it to be working with people who are 
specialized in intelligence. One of the things Mr. Parker 
pointed out is that the intelligence services like to continue 
investigations and allow these terrorist plots to evolve to the 
point where you know the extent of the network. You know, it is 
like cutting a worm in half or something like that. You do not 
want to by arresting a few people simply warn the others, so 
the terrorist gang regrows the part you have lopped off, 
because there are so many prospective terrorists.
    I will mention just one more point on the difference. 
During World War II--and this recurred during the struggle with 
the Irish Republican Army--there were cases in which the MI5 
learned that there was a planned attack. In World War II they 
caught a German saboteur who had been instructed to blow up an 
electrical plant, and MI5 said: Let us let him blow up the 
electrical plant because this will give him such tremendous 
credibility in Germany that we will then be able to use him to 
feed the Germans with all sorts of disinformation that they 
will believe.
    Scotland Yard, being a police force, said: No, we must not 
do that; it is too dangerous. So the dispute was raised to a 
higher level and the government said: Yes, we will go ahead and 
let him blow up the plant. And he did that and it was reported 
in the newspapers, got back to Germany. The Germans thought: 
This guy is terrific; he did what we told him; he blew up the 
plant. They sent him a lot of money, which of course the 
British confiscated, and from then on anything that he told his 
German masters they believed, even though it had been made up 
by MI5.
    This very similar incident with blowing up a building in 
London happened during the fight with the IRA. Again, 
disagreement with the police. They always want to--they do not 
want to take risks. The intelligence service argues, it is 
raised to a higher level, and again a judgment is made.
    That is what we need. We need a domestic intelligence 
service that will argue with the FBI and say: Do not arrest 
those jokers in Miami, they are harmless; use them, play with 
them, see if you can, if through them you can learn more about 
international terrorism. But we do not have an agency that has 
that commitment to intelligence. There is no one to argue with 
the FBI in the Justice Department. So they arrest these people 
prematurely. That is my concern.
    Mr. Yoo. Mr. Chairman, I would say there is two different 
issues wrapped up in your question. One is an organizational 
theory of when do you want to develop a capability from within 
your corporation and when do you go out and buy a new unit 
instead of trying to build it from within. That is sort of the 
same issue corporations have.
    Then the second thing I think built into your question is 
just a question of allocation of resources, whether we should 
be spending so much on domestic law enforcement versus 
intelligence. So I think that is what the FBI is concerned 
about, is you create this new agency and it is going to start 
drawing resources and funding that would have been given to the 
FBI in the first place.
    On the first question, I think it is fair to say that the 
usual response that we have had from 9/11 in terms of 
organization has been just to create new layers between, new 
layers of bureaucracy between the people who are on the ground 
fighting terrorism and the President. So I think about the 
creation of DHS and now the DNI. They impose just another layer 
between the different agencies and the President, and that may 
not be a good thing.
    What Judge Posner is essentially applying is a sort of free 
market approach to the way intelligence agencies work. He wants 
them to compete with each other to do better work, which is not 
a surprise because this is how he got started in his academic 
career, was calling for more competition amongst corporations. 
I think that makes a lot of sense. If you look at the failures 
about the Iraq WMD and so on, everybody may use the same 
information, but they may analyze it differently. And it would 
be a better system, it seems to me, to create more units at a 
lower level that can produce alternate strategies, an alternate 
way of looking at things. We are always saying we want people 
to think outside the box, to be aggressive. It is harder to do 
that when everybody works for one giant bureaucracy.
    So I would probably think that it is not that you want to 
undermine the FBI, but you want to create a competitor that 
will have maybe a different viewpoint and different 
capabilities. It may not be possible to have that done within 
the FBI itself.
    In terms of the allocation of resources, I think, again I 
think you ought to ask as the Appropriations Committee whether 
you want to spend so much money on the enforcement of crimes 
that can also be handled by State and local law enforcement. 
The FBI does pour a lot of resources into fighting drug crime. 
Our Federal courts are choked with drug cases. This consumes an 
enormous amount of Federal resources and attention. State and 
local law enforcement can do that, too, and whether you want to 
move the bulk of those resources into fighting terrorism, which 
seems to me the more--more the kind of thing that the national 
government should be doing, which is protecting us from an 
external threat rather than focusing its resources on problems 
that also overlap with the competences of the 18,000 other 
police forces we have in the country.
    Senator Gregg. We have been joined by Senator Allard. Did 
you have some questions, Senator Allard?
    Senator Allard. Mr. Chairman, I do have some questions. We 
have a number of committee meetings running this morning and 
hopefully the questions I have are not repetitive of what you 
covered.
    But I was curious. If we look at the recent terrorist plot 
that was foiled by the British authorities, if this had been 
put together in the United States, given the tools that U.S. 
law enforcement agencies currently have at their disposal, 
would we have been equally successful as they were? I would 
like to have some kind of comparison between the way they 
handle their investigations and the way we handle our 
investigations and whether that leads to more successful 
outcomes.
    Who wants to start with that?
    Judge Posner. Well, it is of course difficult to say, but I 
think there would have been a danger that we would have begun 
arresting people too soon and as a result would not have gotten 
as many of the terrorists. I am not sure the British are sure 
that they have everybody, but they did arrest I think more than 
20 people.
    Our tendency has been not to take the risk of allowing a 
plot to develop, to evolve, but instead pouncing at the 
earliest opportunity. There is a big danger there that we get 
the small fry and we miss their accomplices.
    Mr. Parker was saying before you arrived, Senator, that the 
British do tend to let the investigation continue longer before 
they intervene. You have to--it requires a certain amount of 
guts because you are watching these people and you know there 
is always some danger that they are going to act before you 
intervene. But taking that risk is often the right way to go 
because you take a small risk, but the payoff is that you may 
be able to uncover the entire network and not let little pieces 
out there which can regrow and hit you.
    Mr. Parker. Can I make two observations. I think that is a 
really important point and, without going into any operational 
details, I am aware of cases where attacks are taken place 
because the preventative mechanisms put in place failed. If you 
let a case run wrong, you do run the risk that attacks will 
occur and you do run the risk that citizens will lose their 
lives, and that has I believe on one occasion at least happened 
in the United Kingdom, through no intention on the part of 
either the police or the security service.
    I wanted to address one point. Security service officers 
are not allowed in any way, shape, or form to commission an 
offense or participate in the commissioning of an offense. So 
they would not be allowed to participate through an agent, for 
example, in allowing a building to get blown up so the agent 
would get better access. In fact, we spend an awful lot of time 
in training trying to come up with imaginative ways to get 
potential agents over hurdles like carrying out a terrorist act 
to infiltrate further within a group. There is a red line there 
and the security service--I cannot imagine it would cross it 
except in the most extreme of circumstances. I am not aware of 
them ever having done it. I had not heard the case from World 
War II.
    What is true in the Second World War, the British security 
service ran the Doublecross system. I think we got something 
like 15 Iron Crosses for our double agents, several personally 
pinned on by Hitler himself. And as far as I am aware I do not 
believe any German agent successfully operated from the 
beginning of the Second World War to the end of it on British 
soil. So it was tremendously successful.
    But again, the idea that one would actually participate in 
an event that led to destruction of property or loss of life 
intentionally would be a red line for the United Kingdom.
    To address also this issue of how one might help nurture a 
new agency, one thing you will notice from the London bombings 
is who took the credit for stopping it. You will never see a 
security service spokesman. There is no security service 
spokesman. It is a home office spokesman talking on behalf of 
the security service. They never take credit. They never take 
credit. Always a police officer, always a police officer up 
there taking the credit.
    What is interesting in the last 3 or 4 years is the 
metropolitan police have started to actually acknowledge that 
the security service was involved and extend thanks for their 
participation, which I can assure you was not the case in the 
early 1990s.
    But nothing succeeds like success, and effective 
relationships where everybody is able to share in a result, 
which you have with an intelligence division and a law 
enforcement division, where the intel guys help the law 
enforcement chaps get a result, everybody looks good, and that 
is why it has grown closer in England. It has been this sort of 
benign circle, virtuous circle of success, where the police 
have maintained their public role as the guardians of law and 
order and the security service has been able to direct their 
activities or assist in directing their activities more 
efficiently than the special branches had before.
    So it has worked out well.
    Mr. Yoo. May I just give a quick point?
    Senator Allard. Yes, Mr. Yoo.
    Mr. Yoo. Thank you. I think Judge Posner and Mr. Parker 
focused on the human intelligence side of investigation and I 
think one issue that I think the British do not have the same 
kind of strengths we have is on the signals intelligence, 
interception of emails, phone calls, financial records. It 
looks like from the accounts that the British were able to 
quickly move based on one tip, to use those kinds of methods to 
quickly identify the network of people through those kinds of 
links.
    I think our FISA system allows us to have that same scope, 
but it is much slower because you have to put together a case 
that involves probable cause and so on, and that takes a lot of 
work and it takes time. So I think it is doubtful that we could 
have put the case together as fast as the British did. It might 
have taken much longer, not because of human intelligence 
sources, but just because we have more restrictions on the 
collection of information.
    Senator Allard. Well, I appreciate your comment. I have 
always been very appreciative of the relationship that we have 
with the British. I mean, we have a very close relationship on 
intelligence gathering, and it is a lot of confidence in both 
our systems and I just think that statement needs to be made.
    Mr. Yoo, you were talking about more competition in law 
enforcement. The only way I can see that we can make things 
more competitive is to contract it out. I mean, to keep people 
within the Government where you have the protections of the 
civil service system, it just, you take away incentives many 
times that you need to have in a more competitive environment.
    Then when you talk about contracting out, then there 
becomes issues about who you are contracting with and whether 
they are secure or not and whether they have the legal 
authority to do what needs to be done.
    Can you address those problems a little more in your 
comments?
    Mr. Yoo. I have to confess it is a really interesting point 
that I had not thought of quite clearly, as to whether you 
could create competition just by privatization of some aspects 
of it. I think one thing that you would get is you would get 
certain skills that are not common in the Government, 
entrepreneurial skills. So if you think about it, one of the 
things we are trying to do or the Government is trying to do in 
law enforcement is we are trying to destroy a network, an enemy 
network of agents, and this is much like the mentality that 
hackers might have attaching computer networks. That is not 
probably the kind of mentality you have in law enforcement, is 
how do you destroy other networks. They are usually focused on 
protecting them.
    So it is an interesting point, that there may be ways to 
use things like--I know the CIA had a venture capital firm in 
Silicon Valley where they tried to seed research that they 
thought might be helpful, and the Defense Department has done 
similar things historically. It may be the case there might be 
opportunities to do something like that using Federal funding 
to promote research by the private sector into technologies.
    That is one of our great advantages in this war on 
terrorism, is that the United States is a technological leader. 
The enemy is very good at using technology, too, but maybe we 
can encourage research and development--I think it is less 
likely we will develop those tools from within the Government. 
That has not, I do not think, been historically the case really 
when it comes to sort of fine-tuned kind of approaches. Our 
kind of research and development I think within the Government 
is more sort of a brute force approach to sparking big changes 
by pouring in a lot of money.
    So your idea could lead to--there might be a better way to 
create that kind of work with less expenditure of funds. It is 
interesting.
    Judge Posner. If I could add something, there has been a 
big talent drain from the intelligence community since 9/11 
because private companies, banks, investment banks, telephone 
companies, computer companies, and so on, very concerned about 
security, have hired a lot of very good intelligence people 
from the Government. What that means is that, just as Professor 
Yoo is saying, we want to make sure that these private security 
people, private intelligence people, are part of an overall 
national network to protect us, and one need we have is to 
coordinate our Federal intelligence activities, not only with 
other Federal agencies and with State and local police, but 
also with the private security firms and the private 
intelligence units of major banks.
    For example, one of the senior officials at CIA, Ted Price, 
became the senior security officer for Lehman Brothers in New 
York, very experienced intelligence officer and very concerned 
about threats to his bank from terrorists. So we should be 
drawing on these people.
    Echoing what Professor Yoo said about technology, one of 
the big problems we have--this is an FBI problem. You know, of 
course the FBI has acknowledged having blown more than $100 
million on a computer system that did not work. One of the 
problems is that the Government agencies tend to hire 
contractors to custom build a computer system for a Government 
agency. They do not sufficiently exploit the opportunities to 
buy commercial equipment, adapt it for Government needs, but 
not try to build a computer system from scratch, because in 
fact the commercial systems, they are cheaper, they are tested, 
and they have very efficient security features, encryption and 
so on.
    So yes, we should not--the Government should not think it 
can do everything itself in this area.
    Senator Allard. Well, Mr. Chairman, if I can continue here 
to follow up on that. We have had a tough time----
    Senator Gregg. I unfortunately have to go to a meeting. Can 
I turn the hearing over to you?
    Senator Allard. That would be fine. I did not realize you--
--
    Senator Gregg. I want to thank the witnesses, though, for 
their time and their courtesy. It has been an extraordinarily 
informative hearing for me and hopefully we can take some of 
the knowledge you have imparted to us and make good use of it. 
Thank you very much.
    I have got to go to a meeting with the Leader here at 11 
o'clock and I will turn it over to Mr. Allard to chair the 
balance of the hearing.
    Senator Allard [presiding]. Thank you, Mr. Chairman, and I 
will not take up too much more of the witness' time.
    The problem we have had here is getting the FBI to talk 
with the CIA, and they are both Government agencies. I see even 
greater barriers in getting either one of those agencies to 
talk to somebody in the private sector. It is a confidence 
issue, I think, that you have very sensitive information, and 
of course the more people who know about it the more apt it is 
to leak out when you have an open society, particularly like 
what we have here.
    I do agree, I understand your concerns with these 
contractors coming in on computer systems and tailoring that 
computer system just to that Department and they do not worry 
about interactivity between other Departments. I think that is 
a big problem, not only in the security but throughout the 
Government, and I think it needs to be dealt with, and there 
are some attempts to do that.
    I guess we need to do some things, I think, to encourage 
them to participate with the private sector. Have you got any 
thoughts on how we can break down those barriers of confidence? 
The only way I can think of is maybe if they pick up people who 
had previous clearance experience and had worked within the 
agencies, if they go in the private sector then obviously they 
have already maybe established some confidence there. But I 
think it is a tough problem.
    Judge Posner. Well, one of the problems is that 
overclassification makes it difficult for the Government people 
to communicate with private people. But especially when we are 
talking about terrorism, some of the most important information 
to guide our conflict with the terrorists is knowledge of 
foreign cultures, foreign languages, foreign history and so on. 
Much of that expertise resides in universities and other 
private sector activities. So we do want to make sure that the 
Government officials can talk to these people, can consult them 
and bring them in, and not be impeded by overclassification, by 
paperwork, by conflict of interest rules that makes it very 
difficult for private people to consult with the Government.
    I do think the Director of National Intelligence is 
concerned about that problem and is trying to lower the 
barriers to intercommunication with the private sector.
    Mr. Yoo. I very much agree with what you say, Senator, 
about the classification and clearance issue. In part it is a 
hangover from the cold war cultural problem, because a lot of 
the rules on clearances and so on were built up to prevent the 
Soviet Union from getting an agent inside and learning 
information. That does not seem to be the challenge that we 
face with al Qaeda. We do not as far as I know have examples of 
al Qaeda agents infiltrating into the United States Government.
    So I think this would be an appropriate area for the 
Appropriations Committee to consider, is whether it wants to 
change the way clearances are given, how many people are 
permitted to have them. This does not just cause problems for 
interoperability between Federal agencies; it is a major 
barrier for interoperability between the Federal agencies and 
State and local law enforcement. That is I think where you even 
see more resistance to the sharing, not even just between the 
FBI and the CIA, but then down to the people who actually have 
to make the tough decisions.
    This is also an area where computers could provide help. 
Corporations and universities, other entities, have all used 
technology to control the flow of information in different ways 
using commercially available products. I have always wondered 
why we do not--it does not seem like we have a chief 
information officer in the Federal Government. There are 
certain kinds of innovations, the technology you can use, which 
the private sector is way ahead in, which I think could be 
rather easily adapted to face some of those problems you have 
raised. But we do not have anyone in the Government who is 
looking at the use of information technology centrally. Each 
agency has their own CIO, but we do not have one for the 
Government as a whole, it seems. That might be an area, the 
Appropriations Committee might call for that kind of work to be 
done by the executive branch, and it would be very helpful, I 
think.
    Mr. Parker. If I could offer a personal observation, I am 
not sure it is quite as bad as you fear. I spent 6 months in 
Baghdad in 2003 as the British special adviser on transitional 
justice and I was struck actually at how closely the other 
Government agencies worked with contractors, how heavily 
involved they were in all aspects of operations in the field.
    I was there essentially as a private sector contractor for 
the foreign office. Within a month and a half, I sat on the 
high value detainee video conferencing, telephone conferencing 
system, with the CIA and Defense Intelligence Agency. I was 
amazed, absolutely amazed that they would allow me in the room, 
and in fact we had very useful, very fruitful discussions.
    So I think again successful collaboration tends to breed 
relationships of trust. Perhaps one of the things, the good 
things that does come out of Iraq, is that there is a much, 
much greater awareness now of the values sometimes of these 
sort of contractor relationships and the skills that are out 
there in the private sector and how that can be utilized by the 
intelligence agencies. So maybe there is a ray of hope perhaps 
already there.
    Senator Allard. I am going to change the subject just a 
little bit, but it is very pertinent to the debate going on in 
the Congress as we sit here. You brought up the issue of 
detainees and one of the debates that we are having is, because 
of our Constitution and the way we protect the rights of the 
accused, citizens have to face their accuser and they have to 
be informed of those facts in a civilian court.
    With the recent Supreme Court decision which has now 
extended certain rights to detainees, we have a problem. If we 
disclose all that information that we know about to the accused 
in a court case, we make it public, or potentially public. This 
creates a problem on security issues where we do not 
necessarily want them to know how we got the information or who 
the informer is and those kind of things.
    How do other countries deal with that issue, or are we just 
unique in that because of the protections we provide to the 
accused? I wonder, maybe you could comment on that, Mr. Parker, 
and any of you on the panel that may be familiar with--and 
maybe some suggestions on how we can deal with that?
    Mr. Parker. Disclosure became an issue in British law in 
the early 1990s. It took a while for the British intelligence 
agencies to adapt to that. The first case in fact was an animal 
rights case, I believe in Reading just west of London, where 
the police were forced to drop the case because the judge ruled 
in the interest of disclosure the identity of the informant had 
to be revealed and the police simply dropped the case at that 
point.
    We have moved a long way from that. There is an instrument 
in British law called a public interest immunity certificate, 
where agencies who want to protect intelligence can apply to a 
judge to have it excluded from the rules of disclosure. The 
judge gets to read it, he gets to make his own judgment about 
the sensitivity of the document, and if he feels that the 
Government puts together a reasonable case he will issue a 
public interest, a PII certificate. So that is the mechanism 
that we use in the United Kingdom.
    Also, the other thing we have done is reverse engineer 
cases, so that if for example technical capabilities might be 
exposed in the course of a trial we might use obsolete 
equipment for that particular case, a listening device or some 
sort of beacon device. We might deliberately use equipment for 
that case simply hoping that it will get disclosed to the 
court.
    The IRA used to send intelligence officers to every trial. 
They would sit there, they would write down, they would do 
lessons learned on every single case that came before the 
court. One of the biggest intelligence successes we had in the 
early 1990s was this debate about whether or not digital phones 
could be intercepted, cell phones, digital cell phones could be 
intercepted. There was what is essentially an urban myth that 
analog cell phones could be intercepted but digital phones 
could not be. For a 3- or 4-year period, a lot of people used 
digital cell phones when they were perfectly easy to intercept 
and talked quite openly on it.
    Well, that was clearly a capability that we had no wish in 
revealing in court. In this particular instance, of course, we 
are I think the only country in the world where telephone 
intercept material is not admissible as evidence, period. So 
that issue does not come up specifically. But sharing 
intelligence, identity of sources, technical capabilities, are 
serious issues, and we have typically tried to protect our 
techniques by going for these public interest immunity 
certificates.

                         CONCLUSION OF HEARING

    Senator Allard. If we do not have any other comments on the 
question, I do not have any more questions. I want to thank the 
panel for your participation and your comments. I want to check 
with the staff and see if there is anything here on closing the 
committee we need to mention. 10-day comment period or anything 
like that?
    Then I am going to declare the committee recessed.
    [Whereupon, at 11:10 a.m., Thursday, September 14, the 
hearing was concluded, and the subcommittee was recessed, to 
reconvene subject to the call of the Chair.]

                                   - 
.