Parliamentary oversight of security and intelligence agencies in the EU

One of the reasons for the lack of posts on this blog the past months is that I co-authored this large study (446 pages), together with Aidan Wills, for the European Parliament’s Civil Liberties, Justice and Home Affairs Committee (LIBE). The study came out today, and also includes a number of attachments written by national intelligence oversight bodies.

Abstract: This study evaluates the oversight of national security and intelligence agencies by parliaments and specialised non-parliamentary oversight bodies, with a view to identifying good practices that can inform the European Parliament’s approach to strengthening the oversight of Europol, Eurojust, Frontex and, to a lesser extent, Sitcen. The study puts forward a series of detailed recommendations (including in the field of access to classified information) that are formulated on the basis of indepth assessments of: (1) the current functions and powers of these four bodies; (2) existing arrangements for the oversight of these bodies by the European Parliament, the Joint Supervisory Bodies and national parliaments; and (3) the legal and institutional frameworks for parliamentary and specialised oversight of security and intelligence agencies in EU Member States and other major democracies.

We will present the study at the LIBE Committee at 15h on Monday the 3d of October. An Interparliamentary Committee Meeting on  “Democratic Accountability of the Internal Security Strategy and the Role of Europol, Eurojust and Frontex” will be held on Wednesday 5 October from 15.00 to 18.30 and on Thursday 6 October from 9.00 to 12.30 in the Hemicycle of the Paul-Henri Spaak building of the European Parliament as well, which is open to the public. You can register for this meeting until the 29th of September.

Dennis Blair: US intel relationship with brutal countries damages national interest

Quote from the NY Times

Dennis C. Blair, the former top American intelligence official, said that while spy services in places like Libya and Egypt were cooperating with the United States against Al Qaeda, they were “aggressively and sometimes brutally suppressing dissent in their own countries.”

“Not only did these intelligence relationships interfere with our ability to understand opposition forces, but in the eyes of the citizens of those countries they often identified the United States with the tools of oppression,” said Mr. Blair, who served until last May as President Obama’s director of national intelligence. He added that the recent uprisings offer an opportunity to “align our intelligence relationships with our national values.”

A C.I.A. spokesman declined to comment about the agency’s ties to foreign intelligence services. But Michael Scheuer, who spent two decades at the C.I.A. in counterterrorism operations, said it was absurd to believe that such work could be done without the help of unpalatable allies.

“Foreign policy and intelligence doesn’t have anything to do with values,” Mr. Scheuer said. “It has to do with material interests and security. We would be blind in most of the world if we only dealt with Rebecca of Sunnybrook Farm.”

Tightening links between the external and internal aspects of EU security

A note from the Hungarian EU presidency to the Standing Committee on operational cooperation on internal security (COSI) describes the desires of the Presidency to tighten the links between the external and internal aspects of EU security.  On the list is:

* Enhancing the exchange of personal and strategic information and criminal intelligence between EU civilian crisis management missions and relevant EU agencies, namely Europol, Eurojust and Frontex. How can data-sharing be enhanced in a context where civilian CSDP missions have no legal personality, information is often classified, Frontex is not allowed to exchange personal data, and only some of Europol’s formal agreements with third countries extend to the sharing of personal data?

* Involving JHA actors, including COSI and the relevant agencies in the early phase of the planning process, during the conduct and the review process of EU civilian crisis management missions including lessons learned. What are the main political and legal barriers that prevent FSJ actors from contributing to the planning and monitoring of CSDP civilian missions in third countries? How can FSJ actors be involved in the drafting of Crisis Management Concepts (CMC) and Concepts of Operations (CONOPS)?

* Integrating threat and risk assessments supplied by a variety of actors. The EU has anexcellent opportunity to utilise its current resources; crisis management missions, both civilian and military, have been developing their analysis capabilities, and it is suggested developing a toolkit to support the implementation of an ILP process in host countries where civilian CSDP missions are deployed. How can the various intelligence products supplied by specialised actors and agencies, such as SITCEN’s country and thematic reports, EUROPOL’s (S)OCTAs and TE-SAT reports, FRONTEX’s risk assessments and the Mission Analytical Capabilities’ (MAC) assessments, be streamlined so that actors dealing with the internal and externalaspects of European security have access to the relevant information? How does the confidentiality of reporting affect actors’ access to such products?

* Advocating the interests of CSDP and FSJ actors in the EU’s changing data protection landscape. Article 16 of the TFEU on data protection applies fully to the former first and third pillars, i.e. the internal market and police and judicial cooperation in criminal matters, but it only partially covers the CFSP area, including the CSDP. Europol, Eurojust and Frontex have their own data protection supervisory mechanisms. In view of the Commission’s intention to issue in 2011 a proposal on a comprehensive new legal framework on the protection of personal data in the EU, how will the EU’s changing legal landscape affect the exchange of personal data between CSDP and JHA actors?

Another note from the General Council secretariat to COSI includes an interesting report on the cooperation between JHA agencies in 2010. The agencies prepared a report focusing on ‘future cooperation and improvements’ in 2010, and used a scorecard to implement the provisions of this report.

The scorecard includes some interesting potential points of further cooperation, especially from the point of sharing of classified information between agencies.

1. Exploring the possible use of the secure communication link between Eurojust and Europol for the exchange of information between Eurojust national desks and Europol Liaison Bureaux. Eurojust is now exploring the possibility of exchanging information directly via a SIENA account. Europol offered Eurojust the possibility to install mailboxes for 27 Liaison Bureaux for Eurojust’s direct information exchange via SIENA.

2. Undertaking the necessary steps for a possible exchange of classified information above the level of ‘restricted’. In this context progress has been made between Europol and Eurojust to agree on a table
of equivalence to exchange classified information above the level of ‘EU
restricted’.

3. Frontex is implementing a Secure Area Network for up to the level of EU RESTRICTED, which is foreseen to implement the handling of classified information as of beginning of 2011. Once the network is stable and all the relevant applications are installed, the next step is to interconnect the network with Member States and third parties, such as Europol, which is foreseen to be fully available by May 2011. Europol has suggested Frontex consider the possibility of becoming part of, or that they make use of, the existing accredited Europol network, which provides a secure communication channel with Member States.

Frontex was subject to an EC/Council security inspection in September 2010: The exchange of information at level RESTRICTED can be permitted between SGC and Frontex or EC and Frontex. The fact that Frontex has implemented all the security measures to properly process RESTRICTED information was recognised by Europol even at an earlier stage. The cooperation agreement between Europol and Frontex, signed on 29 March 2008, approves the exchange of classified information at a RESTRICTED level.

Exchange of CONFIDENTIAL or above should only be envisaged after the recommendations are implemented. Recommendations were accepted by Frontex and are in the implementation phase. Frontex expects to be ready for the second EC/Council security inspection at the beginning of 2011. The outcome of the inspection may be used for concluding an agreement with Europol for exchanging classified information at level CONFIDENTIEL UE or higher.

Former CIA and NSA heads on the ‘the need to know’, Wikileaks and increased information sharing

Michael Hayden and Samuel Visner have an open-ed in the Baltimore sun in which they defend wider information sharing, if aided by sound security practices and advanced technology to protect information

Vital information sharing need not be a victim of WikiLeaks.

The principle of “need to know” requires segmenting information according to sensitivity and topic. Sharing must strike a balance between protecting security and fostering collaboration across all levels of government and, often, the private sector.

Striking multiple balances is necessary to protect and share sensitive information. Tactical military field units have little need for diplomatic communications, but they do require real-time access to searchable data from multiple government agencies, such as to tell if someone at a road checkpoint is a person of interest. Sensitive information has long been shared among agencies based on “need to know” but without being dumped into vast, poorly monitored databases. Government data on American citizens merits strong privacy protection, but under proper authorities, information sharing with law enforcement makes sense — if this helps uncover foreign espionage or terrorist plans.

Balance is also required in security measures. Disabling thumb and DVD drives on computers averts some kinds of information theft, but on the battlefield it could harm operational effectiveness. Imposing administrative security requirements common to intelligence headquarters or national agencies, such as polygraph exams, on all personnel in military field units would prove unacceptably burdensome.

In striking better balances, we cannot forget the post-Sept. 11 reasons why sharing became a higher priority. Uncovering and foiling terrorist threats requires that many entities work together and share information — often our best weapon.

Thus, policy on information sharing and security should improve along three paths:

•Personnel security. If Army Private Bradley Manning — suspected of leaking the WikiLeaks documents — had psychological problems, as alleged, should he have had access to sensitive information? When indications merit, personnel should undergo psychological testing to assess vulnerabilities that might raise security risks. Personnel clearances ought to be based on the type of information to which a person has access, not — as now — according to which agency employs someone.

•Security procedures. Although some “insider threats” arise from malicious intent, nearly all are abetted by sloppy execution of routine security procedures or perceptions that they are bothersome or unimportant. National security organizations should elevate security as a management priority, enforce rules more consistently and offer better training.

•Cyber tools. Cybersecurity techniques can detect much anomalous behavior, such as downloading, copying or printing numerous documents, seeking to access information in unusual ways or information not normally accessed, and transferring sensitive information to others. That such tools were not employed on the battlefield in Afghanistan is understandable but in retrospect imprudent.

More advanced cyber tools are being developed, such as to sift through huge volumes of seemingly disparate data and correlate findings. This need is a key lesson from the 2009 Christmas Day bombing attempt. New tools must address potential threats from mobile devices and social media and better detect and resolve suspicious exfiltrations. Improving analytic tools to better understand global information environments and characterize the behavior of systems remains a pressing challenge.

Reacting to the WikiLeaks disclosures by clamping down on information-sharing would risk failing to detect hard-to-predict or increasingly diverse threats. More prudent is to employ sound security practices and advanced technology while leveraging the advantages of information sharing and collaboration. National security and technology professionals have worked hard to gain these advantages, and they ought not to be hastily discarded.

Will Lord Goldsmith become the UK equivalent of John Yoo?

Afua Hirsch seems to suggest so in her comment is free article in The Guardian:

As the Guardian revealed yesterday, the UK authorities relied on Bangladeshi intelligence despite well-documented accounts of their use of torture. The then home secretary Jacqui Smith flew to Dhaka for face-to-face meetings with the Bangladeshi authorities. Not only did the likelihood that suspects were being tortured not deter those meetings, it was apparently never even mentioned.

Complicity in torture is of course one of many violations of international law associated with the invasion of Iraq and the interrogation of detainees that followed. So again, it is right to focus not only on the politicians who ordered the invasion, but also the government lawyers who pronounced on its legality. In these terms, the most obvious culprit for having approved the legality of the war itself is Lord Goldsmith, Tony Blair’s attorney-general, whose advice notoriously changed in the run-up to invasion. This issue is far from resolved and is bound to arise again this Friday when Blair is recalled to the Chilcot inquiry. Even those familiar with the details of the Blair-Goldsmith relationship confess to being in a state of confusion about Goldsmith’s latest statement this week.

New JSOC centre must oversee growing use of special anti-terrorism operations

AP reports that the Obama administration has ramped up its secret war on terror groups with a new military targeting center to oversee the growing use of special operations strikes against suspected militants in hot spots around the world.

Run by the U.S. Joint Special Operations Command, the new center would be a significant step in streamlining targeting operations previously scattered among U.S. and battlefields abroad and giving elite military officials closer access to Washington decision-makers and counterterror experts, the officials said.

The center aims to speed the sharing of information and shorten the time between targeting and military action, said two current and two former U.S. officials briefed on the project. Those officials and others insisted on condition of anonymity to discuss the classified matters.

The new center is similar in concept to the civilian National Counterterrorism Center, which was developed in 2004 as a wide-scope defensive bulwark in the wake of the Sept. 11, 2001 attacks to share intelligence and track terrorist threats.

But the new military center focuses instead on the offensive end of counterterrorism, tracking and targeting terrorist threats that have surfaced in recent years from Pakistan to Yemen and Somalia and other hot zones. Its targeting advice will largely direct elite special operations forces in both commando raids and missile strikes overseas.

The data also could be used at times to advise domestic law enforcement in dealing with suspected terrorists inside the U.S., the officials said. But the civilian authorities would have no role in “kill or capture” operations targeting militant suspects abroad.

The center is similar to several other so-called military intelligence “fusion” centers already operating in Iraq and Afghanistan. Those installations were designed to put special operations officials in the same room with intelligence professionals and analysts, allowing U.S. forces to shave the time between finding and tracking a target, and deciding how to respond.

At the heart of the new center’s analysis is a cloud-computing network tied into all elements of U.S. national security, from the eavesdropping capabilities of the National Security Agency to Homeland Security’s border-monitoring databases. The computer is designed to sift through masses of information to track militant suspects across the globe, said two U.S. officials familiar with the system.

Several military officials said the center is the brainchild of JSOC’s current commander, Vice Adm. Bill McRaven, who patterned it on the success of a military system called “counter-network,” which uses drone, satellite and human intelligence to drive operations on the ground in Iraq and Afghanistan.

While directly run by JSOC, the center’s staff is overseen by the Pentagon, while congressional committees have been briefed on its operations, officials said.

Over the past year, the numbers of special operations forces and commando raids against militants have surged in Afghanistan. Two strike forces have grown to 12, according to an intelligence official who spoke on condition of anonymity to discuss classified matters.

“We’ve gone from 30-35 targeted operations a month in June 2009 now to about 1,000 a month,” said NATO spokeswoman Maj. Sunset Belinsky. “More than 80 percent result in capture, and more than 80 percent of the time we capture a targeted individual or someone with a direct connection.”

How does it work?

McChrystal’s intelligence chief, Brig. Gen. Michael Flynn, recognized early innovations by special operations forces in the field and then refined the intelligence sharing process among the military into the “counter-network” system.

Under that system, U.S. special operations forces have acted as police crime scene investigators, quickly combing for evidence after capturing or killing their targets. They bring their data back to a team of defense intelligence analysts who work with interrogators questioning captured suspects. Their teamwork, officials said, speeds up the targeting of new terror suspects.

Similarly, the military’s new targeting center near Washington will rely on a steady flow of information and evidence from the field, which will then by analyzed by special operations experts and their civilian counterparts.

A tip from Africa that suspected militants are planning a strike in the United States, for example, would lead to the names of those suspects being fed into the cloud-computing network. The computer would compare the information with U.S. and international border and flight information, mined from the database of watch lists from the Counterterrorism Center, DHS and the FBI.

If the targets surface overseas, for example, in a country such as Somalia, where special operations forces have already staged snatch-and-grab raids against militants, the military forces would likely be chosen to pursue the targets.

But if the suspected militants turned up inside the U.S., the FBI and other domestic law enforcement would take the lead, officials said.

U.S. Intel Hub to Counter Islamism In Spain: Cable

The U.S. Embassy in Madrid proposed setting up an intelligence hub in the northeastern region of Catalonia to counter a “major center of radical Islamist activity,” according to a U.S. cable obtained by WikiLeaks and published Saturday by the newspaper El Pais.

The cable, dated October 2, 2007, said U.S. and Spanish authorities had identified Catalonia as having a “large Muslim Population Susceptible to Jihadist Recruitment” following increased surveillance after the 2004 Madrid train bombings, which killed 191 people.

“Specifically, we propose that our Consulate General in Barcelona become the platform for a multi-agency, jointly-coordinated counterterrorism, anti-crime, and intelligence center,” said the cable, classified secret and apparently authored by then-Ambassador Eduardo Aguirre.

US views on Tunisia and its counter-terrorism policies

Several released cables offer a detailed view on how the US embassy saw Tunisia. The embassy calls Tunisia a ‘police state’ with little freedom of expression or association, and serious human rights problems.
Cable 09TUNIS492 gives the following description of the relationship between Tunisia and the U.S.

Tunisia is not an ally today, but we still share important history and values. It is fair to consider Tunisia a friend, albeit cautious, closed and distant.”

Many Tunisians are frustrated by the lack of political freedom and angered by First Family corruption, high unemployment and regional inequities.

Compounding the problems, the GOT brooks no advice or criticism, whether domestic or international. Instead, it seeks to impose ever greater control, often using the police.

This cable bluntly calls Tunisia a ‘police state’ with little freedom of expression or association, and serious human rights problems.

The problem is clear: Tunisia has been ruled by the same president for 22 years. He has no successor. And, while President Ben Ali deserves credit for continuing many of the progressive policies of President Bourguiba, he and his regime have lost touch with the Tunisian people. They tolerate no advice or criticism, whether domestic or international. Increasingly, they rely on the police for control and focus on preserving power. And, corruption in the inner circle is growing. Even average Tunisians are now keenly aware of it, and the chorus of complaints is rising.

Beyond the stifling bureaucratic controls, the GOT makes it difficult for the Mission to maintain contact with a  wide swath of Tunisian society. GOT-controlled newspapers often attack Tunisian civil society activists who participate in Embassy activities, portraying them as traitors. Plain-clothes police sometimes lurk outside events hosted by EmbOffs, intimidating participants. In one example of the GOT’s tactics, we awarded a local grant through MEPI to a Tunisian woman, but her boss at the Commerce Ministry told her not to pursue it. She persisted for a time, but backed out when she began receiving anonymous death threats.

GOT officials say the United States tends to focus on issues where we do not see eye-to-eye. They bristle at our calls for greater democratic reform and respect for human rights, and protest they are making progress. For years, the Embassy’s top goal has been to promote progress in these areas. We need to keep the focus, especially with 2009 an election year in Tunisia. Ben Ali is certain to be reelected by a wide margin in a process that will be neither free nor fair. In this context, we should continue to underscore the importance of these issues, and to maintain contacts with the few opposition parties and civil society groups critical of the regime.

However, there’s too much at stake to lose Tunisia:

We have too much at stake. We have an interest in preventing al-Qaeda in the Islamic Maghreb and other extremist groups from establishing a foothold here. We have an interest in keeping the Tunisian military professional and neutral. We also have an interest in fostering greater political openness and respect for human rights. It is in our interest, too, to build prosperity and Tunisia’s middle class, the underpinning for the country’s long-term stability. Moreover, we need to increase mutual understanding to help repair the image of the United States and secure greater cooperation on our many regional challenges. The United States needs help in this region to promote our values and policies. Tunisia is one place where, in time, we might find it.

Cable 09TUNIS129  assures the US government that  the Government of Tunisia (GOT) prohibits demonstrations that are not pre-approved and is capable of controlling and dispersing one in the unlikely event one could be mustered without their knowledge. The cable also confirms that the Tunisian government is very protective of the area surrounding the US Embassy and maintains a large uniformed and plainclothes police presence around the compound. Further, the cable acknowledges that “the GOT strictly controls information and the private media practices self-censorship when reporting on matters sensitive to the GOT that could reflect negatively upon it.”

The cable further comments upon the terrorist threat of the Soliman cell in Tunisia:

The GOT is very proactive in terms of its internal security and utilizes a broad definition of the term terrorist in the application of its interests. GOT security forces disrupted a terror cell in December 2006 and January 2007. Gun battles included two major skirmishes in Hammam Lif and Soliman in the greater Tunis area. The GOT has conveyed to Embassy officers they consider the cell responsible for these actions destroyed. The problems posed by the porous Algerian border were evidenced by the fact that six individuals had crossed into Tunisia undetected with the purported intent of conducting terrorist attacks.

The GOT claims that the group they disrupted in January 2007 had plans to attack the U.S. and U.K. embassies and select personnel. However, the GOT has not shared any tangible evidence of this to date, nor was any such evidence presented in their trial in late 2007, although one defendant admitted that the group intended to target “crusader” sites. The GOT considers this cell destroyed.

The group that targeted the Embassy is believed to be the linked to Al Qa’ida in the Land of the Islamic Maghreb (AQIM). Based on publicized arrests and capture of Tunisian Islamic extremists involved in support and execution of extremist activities in Spain, Belgium, Italy, Bosnia, Denmark, Iraq and the trial of thirty terrorists allegedly planning domestic attacks, one must conclude there are further anti-American elements in Tunisia who support violence against the U.S. presence in Tunisia and Iraq.  The support of Islamic extremism appears to be linked to the global jihad movement. One alarming fact associated with the December 2006/January 2007 incidents indicates that the group of six who illegally entered Tunisia via the Algerian border in April 2006 was able to recruit over thirty more individuals for their cause in only six weeks.  In the past, Tunisian terrorist groups who were known to be active outside of Tunisia and who have espoused anti-American views, such as the Tunisian Combatant Group (TCG aka Tunisian Islamic Fighting Group) and the Tunisian Islamic Front (TIF), may still have supporters in Tunisia although it is unlikely. The GOT contends that these groups are totally shut down. They are illegal and the GOT has arrested and imprisoned members.  Although the GOT does not publicly acknowledge their existence, it can be safely assumed that terrorists and terrorist sympathizers are present in Tunisia. It should also be noted that the GOT banned the Islamist party an-Nahdha (Renaissance), which it considers to be a terrorist organization. Several an-Nahdha leaders were sentenced to lengthy jail terms in the 1980s. Rachid Ghannouchi, the leader of an-Nahdha, lives in exile in London.

The cable elaborates further on Tunisia’s intelligence agencies:

The GOT maintains an active internal and modest external intelligence network focused on preserving civil peace and order within Tunisia’s borders. Through extensive use of informants and surveillance, the GOT produces intelligence-related information and aggressively addresses any perceived threat to national security and regime stability.  In order to further combat domestic terrorism, the Ministry of Interior and Local Development (MOI) has centralized terrorism investigations in its Tunis office. The police and paramilitary National Guard divisions of the MOI have each established an antiterrorism director to coordinate terrorism investigations and share information more easily.

A separate cable (08TUNIS975, of 2 September 2008) gives more information about two separate terrorism-trials which took place in August 2008. In the first case, thirteen Tunisians were sentenced on August 23 to belonging to a terrorist organization in Tunisia and planning to carry out terrorist attacks in the country. Some members of this group were also charged with trying to dispatch “jihadists” to Lebanon. On August 18 the same court convicted six defendants of attempting to establish a terrorist camp to train fighters to go to Iraq. One of the six was said to have been caught returning to Tunisia from Algeria.

As a general background the embassy says:

Tunisia has seen a steady stream of anti-terror cases since the passage of its 2003 anti-terrorism legislation. According to defense attorneys, there has been a surge in such cases in recent months. This is because the large numbers of arrests in the aftermath of the December 2006-January 2007 GOT takedown of the “Soliman” terror cell are now coming to fruition (see Refs C-E). (Note: It usually takes between nine months and two years for a terrorism case to be heard in court.) One highly sought after defense lawyer said that he has on average one such case per day.

The defence lawyer said that some of those accused in these two most recent cases did indeed have the intention of carrying out the acts for which they were convicted, but that most of the 19 defendants has not been directly involved. “Rather, he said, many had been unwitting associates.”

To illustrate his point, he noted that when police arrest one suspect, they then review all incoming and outgoing calls to his cell phone and sweep up everyone with whom the suspect had been in contact. Family members, he continued, are often considered guilty by association. He said in the second case, there was just one individual who in 2004 conceived the plan to recruit jihadists to fight in Iraq and establish a training camp to prepare them. The rest of those convicted had rejected these recruitment efforts. In the interim, they had gone on to live productive lives, with some getting married. They were found guilty of failing to notify the authorities that they had been targeted for recruitment.

The lawyer highlighted many irregularities in the handling of these two cases:

First, the defendants had had access to lawyers, he said, but the lawyers had not been given enough time to properly prepare for trial. In addition, the defendants in the first case were not even interrogated during their trial. In neither trial, he said, did the prosecutors present any material evidence against the accused. He noted that none of the three judges who hear terror-related cases in the Tunis Court of First Instance enforce the protection of the defendants’ legal guarantees. He has filed appeals in both cases and expects that they will be heard in two to four months.

The lawyer said that he has seen a shift in his clients’ attitudes and motives over the past several years. n 2003-2004, he said, there was a lot more talk about volunteering to fight in Iraq, Palestine, or Afghanistan. In the past couple of years, however, there has been a greater tendency to sign up for “jihad” in Tunisia. He attributed this shift to several factors: young men feel marginalized in Tunisia; if they have grievances, there is no one for them to bring them to. They also complain of injustice. He said the security services’ harassment of observant Muslims had been a key motivating factor for several clients. In particular, he said, they objected to the GOT’s campaign against women wearing the Islamic veil. He also noted that the defendant who had been caught returning to Tunisia from Algeria explained that he had gone to live there after marrying a second wife, since polygamy is illegal in Tunisia.

EU Council conclusions on information sharing on changes in the national threat level

The Council on 2-3 December 2010 approved the Council conclusions on information sharing on changes in the national threat level, as set out in annex. The Council requests Member states to

(1) inform each other of any change in their national threat level, as reflected where appropriate by the national alert level, as soon as possible and at the latest in parallel to the official announcement,
(2) to that end, inform the EU Joint Situation Centre (SITCEN) of the change through the relevant channel; the State might also decide to provide additional information through this channel, to be distributed to the other 26 Member States, explaining the reasons for the change,
(3) provide SITCEN with an already existing contact point operating on a 24/7 basis (a) to receive such information and (b) to respond in due time to possible further inquiries.

REQUESTS SITCEN TO
(1) immediately inform the respective contact points in all the other Member States after receiving information about a change in a Member State’s national threat level and in parallel,
(2) pass this information to the President of the European Council, to the President of the Commission, to the High Representative of the Union for Foreign Affairs and Security Policy, to the Commissioner for Home Affairs, to the Heads of delegation of the Standing Committee on operational cooperation on internal security (COSI), to the EU Counter-Terrorism Coordinator and to Europol.

Al-Qaida terrorist’s appeal argues that Britain was complicit in his torture

The Guardian reports that a man convicted of serious terrorism offences is to launch an appeal against his conviction today on the grounds that the British government was complicit in the torture he suffered before being put on trial. Rangzieb Ahmed, 35, from Rochdale, Greater Manchester, was convicted two years ago of directing a terrorist organisation and membership of al-Qaida. He was sentenced to life imprisonment.

He was convicted largely on the basis of evidence that was collected while he was under surveillance in Dubai and the UK in 2005. He was not arrested at that time, however; instead, he was permitted to travel to Pakistan where he was detained by an intelligence agency, the Inter Services Intelligence, notorious for its use of torture.

The courts have heard that Manchester police and MI5 officers then drew up a list of questions to be put to Ahmed by the Pakistani agents. By the time he was deported to the UK, three fingernails were missing from his left hand. Ahmed also alleges he was beaten, whipped and deprived of sleep.