Table of Contents
Chapter 4: Intragovernmental Intelligence Flows
The rapid evolution of surveillance technology is a commonly discussed theme in many policy circles in the United States and across Europe. Less so, are the consequences of the trend whereby the hardware and software for data collection and data processing are increasingly converging across several agencies in the security sector. Whether it is a military intelligence service, police-led intelligence, or customs, border, and migration services, there is a constant and growing demand for different government agencies to cooperate more seamlessly in response to complex, cross-border security threats. This entails data transfers and joint access to common databases and the use of so-called cross-system information analysis platforms, many of which are tailormade by contractors such as Palantir, BAE Systems, Deloitte, IBM, or Rola, and others.
The push for more cross-system analysis, as relevant for modern security provision as it may be, should invite lawmakers to ponder more intensely over various associated risks. As indicated by the Council of Europe鈥檚 Venice Commission, it is not only 鈥渢he issue of who may query the bulk data collected and for what purposes鈥 but also 鈥渓ax controls on acquisition, combined with lax minimisation rules and lax controls on access to the data鈥 that is is 鈥渁 dangerous combination,鈥1 especially in the context of international security cooperation.
Analysis of Common Points of Friction
This section highlights typical risks and unresolved governance aspects regarding the cooperation of various security agencies鈥攂oth nationally and internationally. It also discusses how they relate to the current transatlantic quest for a better agreement on cross-border data transfers and lawful government access.
Fragmented Legal Frameworks for Similar Data Collection and Data Processing
Unlike other democracies, Germany still sports more than a dozen separate bodies of law on the mandates and democratic governance processes for its intelligence community alone.2 This stands in stark contrast to countries like the United Kingdom, which has gone to great lengths to establish a main regulatory framework for the use and governance of investigatory powers across several agencies of the security sector (the Investigatory Powers Act). However, German lawmakers continue to focus primarily on the individual security service at hand and have thus far shied away from adopting a more functional approach that focuses instead on the general nature of investigatory powers that the state may use to obtain access to different types of data鈥攊rrespective of which agency then deploys them. Their approach to regulation has arguably done very little to improve legal clarity. Quite the contrary, new reforms in 2021 have added to the sheer complexity of the legal framework by inserting various new cross-references to similar yet still different provisions in other laws.
Consider, for example, that the BND鈥檚 bulk collection practice remains regulated in two separate bodies of laws, namely the BND Act and the Article 10 Act. Depending on whether the bulk data collection pertains to foreign-domestic traffic or foreign-foreign traffic, one must consult the Article 10 Act and the BND Act, respectively. Providers can be compelled to provide government access under two different regulatory frameworks, even though the obligation is very comparable in substance and duration. This causes undue duplications in the authorization and oversight process as well as frustration among the service providers who must unnecessarily navigate different legal regimes.
Overlapping and Unsynced Oversight
More generally, it is worth examining whether having different accountability mechanisms and fora for similar investigatory powers defies the protection of human rights, the rule of law, and core democratic principles. This is particularly important in light of growing and more seamless cooperation between different domestic and international security agencies, including the automated sharing of unevaluated personal data.
In Germany, bulk collection is not only regulated in separate laws, it is also overseen very differently鈥攄epending on whether it is the foreign intelligence service or the military that practices it. Yet, even with regard to bulk collection by the foreign intelligence service, it is overseen by two separate judicial bodies, namely the G10-Commission and the Independent Control Council.3 This creates a potential mismatch between the different oversight bodies conducting different types of reviews on similar intelligence collection practices with substantial differences in resources and competencies. Other countries should therefore not follow this model because, amongst other concerns, it carries inherent risks of duplication, turf battles, and likely deficits in the overall accountability and transparency performance.
In the United States, the Title 10-Title 50 debate has long demonstrated the jurisdiction and mismatched oversight problem between military and intelligence activities. This debate is ultimately about the proper roles and missions of U.S. military forces (鈥淭itle 10鈥) and intelligence agencies (鈥淭itle 50鈥).4 One crux of the debate has been the vast differences in oversight between military operations and intelligence activities. Former CIA General Counsel Jeffrey H. Smith summarized the issue, noting 鈥渋f the activity is defined as a military activity (鈥楾itle 10鈥) there is no requirement to notify Congress, while intelligence community activities (鈥楾itle 50鈥) require presidential findings and notice to Congress.鈥 The natural inclination for executive branch lawyers, according to Smith, is to prefer the Title 10 paradigm to escape congressional notification requirements.5
Bulk data collection through signals intelligence and computer network exploitation (hacking) are practices that both the German armed forces and Germany鈥檚 foreign intelligence service (BND) regularly use.6 Computer network exploitation is particularly noteworthy in this regard: It is "the Swiss army knife of surveillance" because it combines many powerful surveillance functions in one powerful tool. This can include audio, visual, email, texts, communications metadata, online activity surveillance, as well as location tracking through one single method.7
While these practices by the civilian intelligence services and military intelligence are often closely aligned, often for a good reason, such as force protection, they remain subject to substantially different oversight bodies with radically different control densities.8 The requirements for data processing, transfers, and deletion within the armed forces are fewer and less transparent. There is, however, a need for a more holistic perspective, for example, when the BND automatically transmits data that it collected as part of its 鈥渃old-start collection via suitability testing鈥 (which does not carry data minimization requirements) to the German armed forces (搂 24 (7) sentence 3 BND Act). Comparing the oversight remits and resources for civilian intelligence with that for military intelligence and recalling the increased cooperation between these actors, it is deplorable that the newly created German judicial and administrative oversight body (ICC) will have no mandate to review the use of such data by the German armed forces. This is done very differently, for example, in Canada. See the discussion further below.
Furthermore, the practice to establish limited oversight mandates for separate oversight bodies runs counter to the norm established in international conventions, notably the modernized Convention of the Council of Europe for the protection of individuals with regard to the processing of personal data.9 As observed recently by the Dutch intelligence oversight bodies CTIVD and TIB in their memo on that convention, 鈥渨hen appointing the oversight body/supervisory authority (i.e., Article 11.3, 15, and 16(2) of the Convention), it must be clear that the entire national security domain falls under the responsibility of the oversight body or bodies to be appointed.鈥10
U.S. government 鈥渇usion centers鈥 have also brought this information-sharing issue into focus. Fusion centers are state-owned and operated centers, funded by the Department of Homeland Security, that serve as focal points in states and major urban areas for the receipt, analysis, gathering, and sharing of threat-related information between state, local, tribal and territorial; federal; and private sector partners.11 According to the Brennan Center, which has done in-depth analyses of fusion centers, 鈥渢he theory is that in their normal activities, state and local police come across information that might be useful in uncovering terrorist plots. The Department of Homeland Security funded and promoted fusion centers as a means to harvest this information and provide it to intelligence analysts so they could 鈥榗onnect the dots鈥 and prevent terrorist attacks… But as early as 2007, leaked reports from fusion centers showed serious problems with their intelligence gathering. Instead of looking for terrorist threats, fusion centers were monitoring lawful political and religious activity.鈥12
Most recently, the January 6, 2021 insurrection in the United States has brought attention back to these issues, as intelligence sharing between the various domestic U.S. agencies has come to the forefront鈥攕ome officials blaming failures in intelligence sharing for the severity of the attack.13
Roadmap toward Positive Change
As government agencies are increasing their interconnectedness thanks to the rapid evolution of surveillance hardware and software, there is also a substantial increase in automated data transfers and cross-system information analysis between different actors of the security sector. In light of this, narrow horizontal oversight mandates and fragmented legal frameworks can unduly contribute to obfuscation and an increase of accountability gaps and transparency deficits. This also carries the risk of creative non-compliance or malfeasance. Therefore, U.S. and EU policymakers should be interested in learning how to overcome such risks, especially in view of a potential review of a new cross-border data sharing agreement. A future European Court of Justice or a U.S. court will have to assess whether robust safeguards exist in both entities to legitimize lawful government access to personal data obtained in such contexts, many of which also concern data held by the private sector.
Establishing Holistic All-Inclusive Oversight Remits
Fortunately, as argued below, there are positive examples from which to draw inspiration for a rights-based cross-border data agreement. While the German government sees no problem with the above-mentioned mismatch of having different oversight bodies review similar intelligence collection practices with substantially different resources and review competencies,14 recent statutory reforms in Canada15 and the United Kingdom16 point in a notably different direction.
The new Canadian oversight body, NSIRA, for example, can 鈥渞eview any activity in the federal government that relates to national security or intelligence.鈥 The organization calls it 鈥渉orizontal, in-depth interagency review.鈥嬧17 It [鈥 allows NSIRA to break down the previously compartmentalized approach to review and accountability, and replace it with horizontal, in-depth interagency review.鈥18
While compartmentalized oversight setups might lack the general overview of all data processing and data transfers across national security agencies, they have become specialized, which is also an important feature. Hence, lawmakers should be cautious not to merely opt for centralized oversight at the expense of resources and precision in investigations.
Multilateral and Transatlantic Oversight Cooperation
Transnational threats prompt closer cross-border cooperation among intelligence services, but increasingly also involve a range of other security agencies, including the military, police, and other branches of the security sector. Typically, joint databases are run multilaterally, with all participating services adding and accessing data, albeit with several restrictions and caveats. In such cases, there is a need for creating joint responsibility among the participating states for the database and subsequent data processing.
The Dutch Intelligence Oversight Body鈥檚 (CTIVD) 2018 report on the European Counter Terrorism Group鈥檚 (CTG) operational database in the Netherlands provides a useful illustration of typical open questions related to government responsibility and oversight in the context of international intelligence cooperation. The CTG facilitates, amongst other things, the multilateral exchange of evaluated data on individuals who have traveled to and returned from conflict areas. The CTIVD concluded, for example, that safeguards for the protection of fundamental rights were not sufficiently addressed and recommended setting up multilateral controls.19
While some states may accept responsibility and oversight for their services鈥 submissions to joint databases, the subsequent data processing is rarely covered, certainly not if the database is not hosted by a foreign government, on foreign territory. This creates the potential for severe accountability gaps: Who is held responsible for the processing of erroneous data? Furthermore, as acknowledged by the Dutch government, there is a pressing need to ensure effective oversight over the use of joint databases, possibly in the form of multilateral oversight.20
The forward-looking recommendations by the Dutch oversight body with respect to multilateral oversight is something that policymakers should pay greater attention to鈥攂eyond the complex accountability deficits of the European CTG鈥檚 operational platform鈥攖o which the United States has apparently an observer status.21
Summary
EU member states and the United States may find it increasingly difficult to defend the fact that data processing across their respective security sectors is done with similar investigatory powers, yet is governed and overseen by substantially different statutes, review bodies, mandates, and with different resources.
According to a recent study by the Geneva Centre for Security Sector Governance (DCAF) and NATO鈥檚 Parliamentary Assembly, 鈥渁 sub-standard legal base, insufficient expertise and little public attention have deprived military intelligence oversight of effectiveness in too many countries and for too long. In most parliaments there is no routine oversight over military intelligence.鈥22
Bulk collection by military intelligence services can present the same risks to fundamental rights as similar practices by (civilian) intelligence agencies. Yet, oversight over military intelligence鈥檚 access and use of such data is rarely as comprehensive and resourceful as intelligence oversight has become in some jurisdictions.
Given the privileged partnership between the military and the civilian intelligence services, a comprehensive legal framework would go a long way to mitigate the inherent risk of creative non-compliance. For example, a government may be inclined to maintain separate oversight regimes and accept accountability deficits as part of a hidden motive to foster 鈥渁utonomy-enhancing capacities and opportunities to somehow forestall, neutralize, transform, resist, or overcome the societal constraints imposed upon them.鈥23 To illustrate this further, the federal German government may be inclined to delegate more tasks to intelligence units of the military due to the fact that processing of data from bulk collection there is far less rigidly overseen there than for the BND鈥檚 data processing. This is unlikely to be the sole decisive criteria for such data transfer decisions, but good legislative and oversight practice ought to be more mindful of such potentially hidden raisons d鈥櫭﹖at, too.24
Accordingly, a more comprehensive framework with reduced but strengthened oversight bodies would limit the risks to oversight effectiveness discussed above.
Citations
- Venice Commission of the Council of Europe. 鈥淩eport on the Democratic Oversight of Signals Intelligence Agencies.鈥 December 15, 2015.
- In 2018, the German Parliament published a collection of federal intelligence laws, and this collection consists of 31 separate pieces of legislation.
- See, the remit of these bodies in 搂15 of the Article 10 Act and 搂 41 of the BND Act, respectively.
- Andru E. Wall. 鈥淒emystifying the Title 10-Title 50 Debate: Distinguishing Military Activities, Intelligence Operations, & Covert Action.鈥 Harvard National Security Journal, Vol. 3. 2011.
- Ibid.
- See also Vieth-Ditlmann, Kilian and Thorsten Wetzling. 鈥淐aught in the Act?: An analysis of Germany鈥檚 new SIGINT reform.鈥 2021.
- Smith, Stephen W. 鈥淐louds on the Horizon: Cross-Border Surveillance under the U.S. Cloud Act.鈥 2021, p. 129.
- See Wetzling, Thorsten. 鈥淪tellungnahme zum Entwurf eines Gesetzes zur A虉nderung des BND-Gesetzes zur Umsetzung der Vorgaben des Bundesverfassungsgerichts und des Bundesverwaltungsgerichts.鈥 February 21, 2021, p.16f.
- Council of Europe. 鈥淐onvention 108+ – Convention for the protection of individuals with regard to the processing of personal data.鈥 2018.
- CTIVD and TIB. 鈥淢emo CTIVD and TIB on Convention 108+.鈥 February 17, 2021. . For a more detailed discussion on the relevance of Article 11 of this modernised Convention for democratic intelligence in Europe, see: Wetzling, Thorsten and Charlotte Dietrich. 鈥淩eport on the need for a guidance note on Article 11 of the modernised Convention.鈥 June 11, 2021.
- Department of Homeland Security. 鈥淔usion Centers.鈥 September 19, 2019.
- Patel, Faiza and Michael Price. 鈥淔usion Centers Need More Rules, Oversight.鈥 Brennan Center for Justice. October 18, 2012.
- Alfaro, Mariana. 鈥淯.S. Capitol Police鈥檚 failure to share intelligence internally crippled its response to Jan. 6 attack, former official says.鈥 Washington Post. October 11, 2021.
- Federal Government. 鈥淎nswer of the Federal Government to the minor interpellation 19/2583.鈥 January 26, 2021, p.5.
- Bill C-59 entered into force on 21 June 2019. The new Canadian oversight body NSIRA can access 鈥渃lassified information in the possession or under the control of any department or agency (except Cabinet confidences).鈥 In: NSIRA. 鈥2019 Annual Report.鈥 2020, p. 16. content/uploads/2020/12/AR-NSIRA-Eng-Final.pdf (emphasis added).
- In the 2016 Investigatory Powers Act (IPA), the Investigatory Powers Commissioner鈥檚 competencies are defined by whether or not investigatory powers are exercised no matter which government agency is involved: 鈥渢he Investigatory Powers Commissioner must keep under review 鈥 the exercise by public authorities of statutory functions鈥 (IPA, section 229 (1), emphasis added). It is thus not restricted to reviewing certain intelligence agencies only. Exceptions to these provisions are defined in IPA 229 (4).
- NSIRA. 鈥2019 Annual Report.鈥 2020, p. 20. content/uploads/2020/12/AR-NSIRA-Eng-Final.pdf
- Ibid., p.16
- CTIVD. 鈥淩eview report 56 on the exchange of personal data on (alleged) jihadists by the AIVD.鈥 April 26, 2018.
- 鈥淏earing joint responsibility also requires joint, multilateral oversight. After all, the different national oversight bodies will each face the question whether the service they are overseeing gives sufficient implementation to the joint responsibility that the service bears. National oversight alone is insufficient in this case. The government recently agreed that there must be multilateral oversight. […] it is necessary that the safeguard of independent, adequate and effective joint oversight is included in a common data protection framework for the CTG database. […] Another option would be to explicitly divide the oversight tasks, with one or a few oversight bodies being charged with organising the joint oversight. […] One or more oversight bodies could be assigned the responsibility to perform the oversight on behalf of all of them. […] A third option would be to institute overarching, international oversight. To that end a new international oversight body would have to be created, to which certain oversight powers are assigned. This is the most far-reaching option and would require a public-law basis, such as a treaty between States.鈥 CTIVD. 鈥淩eview report 56 on the exchange of personal data on (alleged) jihadists by the AIVD.鈥 April 26, 2018.
- Jirat, Jan and Lorenz Naegeli. 鈥漈he Club de Berne: a black box of growing intelligence cooperation.鈥 about:intel. April 1, 2020.
- Jasutis, Grazvydas et al.,鈥淧arliamentary Oversight of Military Intelligence.鈥 DCAF. 2020, p. 39.
- Nordlinger, Eric A. 鈥淥n the Autonomy of the Democratic State.鈥 1982, p. 30.
- Koenig-Archibugi, Mathias. 鈥淚nternational Governance as New Raison d鈥橢tat? The case of EU Common Foreign and Security Policy.鈥 European Journal of International Relations. 2004.