SlideShare a Scribd company logo
1 of 2
Woolwich attack: why David Cameron is right to reject knee-jerk
responses
Security hawks have wasted no time in demanding new counter-terror measures
but the PM is wise to resist them
←
Alan Travis, home affairs editor
← guardian.co.uk, Thursday 23 May 2013 14.43 BST
David Cameron's calm rejection on the steps of Downing Street of any knee-jerk responses was a
welcome riposte to the security hawks who have already taken to the airways to demand a battery of new
counter-terror measures.
A former home secretary, a former government reviewer of terrorism laws and two ex-security ministers
have wasted no time in using Woolwich to attack the coalition's decision earlier this month to shelve the
"snooper's charter" bill.
Lord West, the former admiral of the fleet and former Labour security minister, is the latest to warn that
without the communications data bill it will be more difficult in future for police and intelligence
investigators to get hold of terror suspects' phone records to trace their contacts.
"That information is extremely important for our security services to be able to pin down people, find out
who they are linked with, who radicalised them," he said.
Others have focused on the need to step up the ideological campaign, especially in countering jihadist
websites and to restore some of the counter-terror powers that have been scaled back on civil liberty
grounds since the coalition came to power.
As Lord Carlile, who happens to be a Liberal Democrat peer but is close to the security establishment, put
it: "I hope that this will give the government pause for thought about their abandonment, for example, of
the communications data bill and possibly pause for thought about converting control orders into what
[are] now called Tpims [terrorism prevention and investigation measures]."
This is not an academic question. Their public frustration reflects the view inside the security services
and the Whitehall counter-terrorism machine.
The home secretary, Theresa May, was not impressed when Nick Clegg earlier this month blocked any
further immediate progress on the communications data bill, which would allow the tracking of
everyone's email, internet and mobile text use.
Clegg told her it was unworkable and disproportionate but May has since insisted it is still essential:
"This is not about indiscriminately accessing internet data of innocent members of the public, it is about
ensuring that police and other law enforcement agencies have the powers they need to investigate the
activities of criminals that take place online as well as offline," remains the Home Office's public position.
The attorney-general, Dominic Grieve, confirmed to a conference last Saturday organised by the charity
Liberty that talks were still going on within the coalition over the fate of the bill. It is now to be expected
that May, with the backing of several other powerful supporters in cabinet, will demand that it be put
back into this year's legislative programme.
Clegg has already agreed that work should go ahead on the technical problem of there being many more
mobile phones than the unique internet protocol addresses needed to match them to particular
individuals. Cameron will now come under severe pressure to revisit the entire question.
May at the Home Office and Eric Pickles, in charge at the Department for Communities and Local
Government, are also likely to press for much greater investment to go into the Prevent counter-
terrorism programme, especially its relatively successful "channel project" under which more than 200
teenagers believed to be at risk have been turned away from radicalisation.
It is unlikely that Cameron would have made his "no knee-jerk responses" pledge without first talking to
Clegg as well as May but the Whitehall security establishment now sees a clear political opportunity to
expand their powers that did not exist a few days ago.
However, it is worth reflecting however that the Cobra emergency committee meetings took no decision
to raise the current threat level. Despite the Woolwich attack it remains at "substantial", that an attack is
a strong possibility, where it has stood, with the single exception of last summer's Olympics, since July
2011. That is the third out of a possible five levels. It is now nearly six years since the threat level in
Britain has been at "critical".
The current official reviewer of counter-terrorism laws, David Anderson QC, has warned in the past that
terrorism law "gives excessive weight to the idea that terrorism is different, losing sight of the principle
that terrorism is above all crime, and that special laws to deal with it need to be justified by the peculiar
nature of the crime".
His criticism was that "elements of the law have been conceived and applied with excessive enthusiasm".
It is worth reflecting that, so far, Woolwich has proved to be a very nasty but one-off terrorist murder and
no more. Cameron is right to say he is not in favour of knee-jerk responses.

More Related Content

Similar to Woolwich attack communications data bill - the guardian

Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1James Williams
 
TheDrum, Wanted Posters Go Mobile 9.21.16
TheDrum, Wanted Posters Go Mobile 9.21.16TheDrum, Wanted Posters Go Mobile 9.21.16
TheDrum, Wanted Posters Go Mobile 9.21.16David M. White
 
Privacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory PowersPrivacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory Powersrcorrigan
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterJulie Davis
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
B502e2a3 1030-4a98-b6ab-e3648efbaac6
B502e2a3 1030-4a98-b6ab-e3648efbaac6B502e2a3 1030-4a98-b6ab-e3648efbaac6
B502e2a3 1030-4a98-b6ab-e3648efbaac6RobertHannigan5
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerceAbegail Roberts
 
The Security Era
The Security EraThe Security Era
The Security Erajk_welder
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017NgocHaBui1
 
Obama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfastObama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfastbattery-fast. com
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
7-7 London Attacks
7-7 London Attacks7-7 London Attacks
7-7 London AttacksHina Zaidi
 
From the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber EspionFrom the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber EspionJeanmarieColbert3
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015CheapSSLUSA
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 

Similar to Woolwich attack communications data bill - the guardian (20)

Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1
 
TheDrum, Wanted Posters Go Mobile 9.21.16
TheDrum, Wanted Posters Go Mobile 9.21.16TheDrum, Wanted Posters Go Mobile 9.21.16
TheDrum, Wanted Posters Go Mobile 9.21.16
 
Privacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory PowersPrivacy, Surveillance & Investigatory Powers
Privacy, Surveillance & Investigatory Powers
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Wired-feature
Wired-featureWired-feature
Wired-feature
 
NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014NS Civil Liberties & Security Supplement Sept 2014
NS Civil Liberties & Security Supplement Sept 2014
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
B502e2a3 1030-4a98-b6ab-e3648efbaac6
B502e2a3 1030-4a98-b6ab-e3648efbaac6B502e2a3 1030-4a98-b6ab-e3648efbaac6
B502e2a3 1030-4a98-b6ab-e3648efbaac6
 
Senate homeland security and commerce
Senate homeland security and commerceSenate homeland security and commerce
Senate homeland security and commerce
 
The Security Era
The Security EraThe Security Era
The Security Era
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 
Obama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfastObama moves forward with internet id plan by batteryfast
Obama moves forward with internet id plan by batteryfast
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
7-7 London Attacks
7-7 London Attacks7-7 London Attacks
7-7 London Attacks
 
From the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber EspionFrom the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber Espion
 
s4c.paper2010
s4c.paper2010s4c.paper2010
s4c.paper2010
 
Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015Symantec Intelligence Report - Oct 2015
Symantec Intelligence Report - Oct 2015
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 

More from CHSGmedia

Final feedback and exam prep
Final feedback and exam prepFinal feedback and exam prep
Final feedback and exam prepCHSGmedia
 
Revision tip #6
Revision tip #6Revision tip #6
Revision tip #6CHSGmedia
 
Revision tip #5
Revision tip #5Revision tip #5
Revision tip #5CHSGmedia
 
Revision tip #4
Revision tip #4Revision tip #4
Revision tip #4CHSGmedia
 
Section b planning sheet
Section b planning sheetSection b planning sheet
Section b planning sheetCHSGmedia
 
planning section B
planning section Bplanning section B
planning section BCHSGmedia
 
Revision tip #3
Revision tip #3Revision tip #3
Revision tip #3CHSGmedia
 
Planning sheet section a q2 & 3
Planning sheet section a q2 & 3Planning sheet section a q2 & 3
Planning sheet section a q2 & 3CHSGmedia
 
Section a q1 planning sheet
Section a q1 planning sheetSection a q1 planning sheet
Section a q1 planning sheetCHSGmedia
 
Revision tip #2
Revision tip #2Revision tip #2
Revision tip #2CHSGmedia
 
Grade a exemplar answer
Grade a exemplar answerGrade a exemplar answer
Grade a exemplar answerCHSGmedia
 
AQA June 2010
AQA June 2010AQA June 2010
AQA June 2010CHSGmedia
 
A grade war answer and mark scheme q1
A grade war answer and mark scheme q1A grade war answer and mark scheme q1
A grade war answer and mark scheme q1CHSGmedia
 
Section a exam tips from aqa
Section a exam tips from aqaSection a exam tips from aqa
Section a exam tips from aqaCHSGmedia
 
Revision tip #1
Revision tip #1Revision tip #1
Revision tip #1CHSGmedia
 
Revise theory
Revise theoryRevise theory
Revise theoryCHSGmedia
 
New and digital technology – social media case
New and digital technology – social media caseNew and digital technology – social media case
New and digital technology – social media caseCHSGmedia
 
Intro to new and digital media 2017
Intro to new and digital media 2017Intro to new and digital media 2017
Intro to new and digital media 2017CHSGmedia
 
Marginalised identity case study
Marginalised identity case studyMarginalised identity case study
Marginalised identity case studyCHSGmedia
 

More from CHSGmedia (20)

Final feedback and exam prep
Final feedback and exam prepFinal feedback and exam prep
Final feedback and exam prep
 
Revision tip #6
Revision tip #6Revision tip #6
Revision tip #6
 
Revision tip #5
Revision tip #5Revision tip #5
Revision tip #5
 
Revision tip #4
Revision tip #4Revision tip #4
Revision tip #4
 
Section b planning sheet
Section b planning sheetSection b planning sheet
Section b planning sheet
 
planning section B
planning section Bplanning section B
planning section B
 
Theory grid
Theory gridTheory grid
Theory grid
 
Revision tip #3
Revision tip #3Revision tip #3
Revision tip #3
 
Planning sheet section a q2 & 3
Planning sheet section a q2 & 3Planning sheet section a q2 & 3
Planning sheet section a q2 & 3
 
Section a q1 planning sheet
Section a q1 planning sheetSection a q1 planning sheet
Section a q1 planning sheet
 
Revision tip #2
Revision tip #2Revision tip #2
Revision tip #2
 
Grade a exemplar answer
Grade a exemplar answerGrade a exemplar answer
Grade a exemplar answer
 
AQA June 2010
AQA June 2010AQA June 2010
AQA June 2010
 
A grade war answer and mark scheme q1
A grade war answer and mark scheme q1A grade war answer and mark scheme q1
A grade war answer and mark scheme q1
 
Section a exam tips from aqa
Section a exam tips from aqaSection a exam tips from aqa
Section a exam tips from aqa
 
Revision tip #1
Revision tip #1Revision tip #1
Revision tip #1
 
Revise theory
Revise theoryRevise theory
Revise theory
 
New and digital technology – social media case
New and digital technology – social media caseNew and digital technology – social media case
New and digital technology – social media case
 
Intro to new and digital media 2017
Intro to new and digital media 2017Intro to new and digital media 2017
Intro to new and digital media 2017
 
Marginalised identity case study
Marginalised identity case studyMarginalised identity case study
Marginalised identity case study
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Woolwich attack communications data bill - the guardian

  • 1. Woolwich attack: why David Cameron is right to reject knee-jerk responses Security hawks have wasted no time in demanding new counter-terror measures but the PM is wise to resist them ← Alan Travis, home affairs editor ← guardian.co.uk, Thursday 23 May 2013 14.43 BST David Cameron's calm rejection on the steps of Downing Street of any knee-jerk responses was a welcome riposte to the security hawks who have already taken to the airways to demand a battery of new counter-terror measures. A former home secretary, a former government reviewer of terrorism laws and two ex-security ministers have wasted no time in using Woolwich to attack the coalition's decision earlier this month to shelve the "snooper's charter" bill. Lord West, the former admiral of the fleet and former Labour security minister, is the latest to warn that without the communications data bill it will be more difficult in future for police and intelligence investigators to get hold of terror suspects' phone records to trace their contacts. "That information is extremely important for our security services to be able to pin down people, find out who they are linked with, who radicalised them," he said. Others have focused on the need to step up the ideological campaign, especially in countering jihadist websites and to restore some of the counter-terror powers that have been scaled back on civil liberty grounds since the coalition came to power. As Lord Carlile, who happens to be a Liberal Democrat peer but is close to the security establishment, put it: "I hope that this will give the government pause for thought about their abandonment, for example, of the communications data bill and possibly pause for thought about converting control orders into what [are] now called Tpims [terrorism prevention and investigation measures]." This is not an academic question. Their public frustration reflects the view inside the security services and the Whitehall counter-terrorism machine. The home secretary, Theresa May, was not impressed when Nick Clegg earlier this month blocked any further immediate progress on the communications data bill, which would allow the tracking of everyone's email, internet and mobile text use. Clegg told her it was unworkable and disproportionate but May has since insisted it is still essential: "This is not about indiscriminately accessing internet data of innocent members of the public, it is about ensuring that police and other law enforcement agencies have the powers they need to investigate the activities of criminals that take place online as well as offline," remains the Home Office's public position. The attorney-general, Dominic Grieve, confirmed to a conference last Saturday organised by the charity Liberty that talks were still going on within the coalition over the fate of the bill. It is now to be expected that May, with the backing of several other powerful supporters in cabinet, will demand that it be put back into this year's legislative programme. Clegg has already agreed that work should go ahead on the technical problem of there being many more mobile phones than the unique internet protocol addresses needed to match them to particular individuals. Cameron will now come under severe pressure to revisit the entire question. May at the Home Office and Eric Pickles, in charge at the Department for Communities and Local Government, are also likely to press for much greater investment to go into the Prevent counter- terrorism programme, especially its relatively successful "channel project" under which more than 200 teenagers believed to be at risk have been turned away from radicalisation.
  • 2. It is unlikely that Cameron would have made his "no knee-jerk responses" pledge without first talking to Clegg as well as May but the Whitehall security establishment now sees a clear political opportunity to expand their powers that did not exist a few days ago. However, it is worth reflecting however that the Cobra emergency committee meetings took no decision to raise the current threat level. Despite the Woolwich attack it remains at "substantial", that an attack is a strong possibility, where it has stood, with the single exception of last summer's Olympics, since July 2011. That is the third out of a possible five levels. It is now nearly six years since the threat level in Britain has been at "critical". The current official reviewer of counter-terrorism laws, David Anderson QC, has warned in the past that terrorism law "gives excessive weight to the idea that terrorism is different, losing sight of the principle that terrorism is above all crime, and that special laws to deal with it need to be justified by the peculiar nature of the crime". His criticism was that "elements of the law have been conceived and applied with excessive enthusiasm". It is worth reflecting that, so far, Woolwich has proved to be a very nasty but one-off terrorist murder and no more. Cameron is right to say he is not in favour of knee-jerk responses.