Report: 3rd sitting (Hansard): House of Lords
Wednesday 19th October 2016

(7 years, 6 months ago)

Lords Chamber
Read Hansard Text Read Debate Ministerial Extracts Amendment Paper: HL Bill 62-III Third marshalled list for Report (PDF, 153KB) - (17 Oct 2016)
Report (3rd Day)
15:50
Clause 137: Modification of warrants
Amendment 180
Moved by
180: Clause 137, page 110, line 4, leave out subsection (6)
Lord Keen of Elie Portrait The Advocate-General for Scotland (Lord Keen of Elie) (Con)
- Hansard - - - Excerpts

My Lords, Amendments 180, 181, 197, 198, 205, 206, 231 and 232 relate to judicial commissioner approval of major modifications to warrants issued under Parts 6 and 7 of the Bill. They seek to provide additional clarity regarding the matters the commissioner must review when deciding whether to approve such a modification.

The Bill already provides for major modifications to such warrants. In the context of bulk interception, bulk acquisition and bulk personal dataset warrants, a major modification may be used to add or vary one of the operational purposes for which data may be examined under the warrant. As regards bulk equipment interference warrants, a major modification can additionally add to or vary any description of conduct in the warrant.

The Bill requires full double-lock authorisation from a Secretary of State and a judicial commissioner for any major modification to a bulk warrant. These amendments will not change that. Instead, they provide greater clarity about the matters that a commissioner must consider when determining whether to approve a modification to a bulk warrant.

The amendments specify that, for major modifications to add or vary an “operational purpose”, a judicial commissioner must review the Secretary of State’s conclusions as to whether the modification is necessary, applying the same principles as would be applied by a court on an application for judicial review and ensuring that the commissioner complies with the duties in relation to privacy set out in Clause 2, the so-called privacy clause.

In the context of bulk equipment interference, if a major modification proposes to add or vary a description of conduct, the judicial commissioner must also review the Secretary of State’s conclusions as to whether the conduct authorised by the modification is proportionate to what is sought to be achieved by it. The amendments are intended to ensure clarity and consistency across the Bill, and as such are to be welcomed.

The sharing of data and intelligence with our overseas partners is critical to the work of our security and intelligence agencies. Without working together with our allies, those agencies could not do their vital work of keeping us safe. Amendments 184, 185, 201, 202, 209 and 210 simply clarify the consideration that must be given by the Secretary of State before authorising the disclosure to overseas authorities of data acquired under the bulk powers in the Bill.

The Bill already places a duty on the Secretary of State to consider whether corresponding safeguards will be applied to the data that are to be shared with the overseas authority in relation to their retention and disclosure. These amendments make explicit that the Secretary of State must be satisfied that the overseas authority has in place safeguards, to the extent appropriate, that correspond to those in the Bill not only in respect of the retention and disclosure of the data shared in bulk but in relation to their selection for examination. This group of amendments therefore makes absolutely clear that proper consideration will be given to the examination safeguards that are applied whenever bulk data are shared with another country. I beg to move.

Baroness Hayter of Kentish Town Portrait Baroness Hayter of Kentish Town (Lab)
- Hansard - - - Excerpts

My Lords, I thank the Minister for moving these amendments, all of which we are happy to support and some of which respond to concerns we raised in Committee.

It may assist the House if I outline at this stage the purpose of Amendment 185A, in the names of my noble friend Lord Rosser and myself, which is about safeguards for disclosing overseas-related material for our foreign allies and agencies. That is material, possibly including information sent overseas by UK residents, obtained by our security and intelligence services under bulk interception warrants. It is an amendment which we hope the Government will feel able to accept.

In Clause 142, before any information obtained under a bulk interception warrant is disclosed overseas, the Secretary of State must ensure that arrangements and safeguards are in place regarding the retention and disclosure of such material, as the Minister has outlined. These requirements correspond to Clause 141 safeguards for domestic arrangements: that is, requiring that the number of people to whom the bulk-intercepted material is disclosed, the extent of disclosure and the number of copies made is limited to the minimum necessary. These safeguards also require the destruction of such material where there are no longer grounds for retaining it.

However, unlike Clause 141 for domestic arrangements, Clause 142 for overseas disclosure provides a wide discretion for the Secretary of State, whereby she or he must ensure equivalent safeguards only,

“to such extent (if any) as the Secretary of State considers appropriate”.

It could, therefore, be possible for the Secretary of State to decide that no safeguards are required in a particular case.

We recognise absolutely that the UK will need to share intelligence with overseas agencies and our amendment does not undermine the ability of UK agencies to do that. We also accept that overseas disclosure may be of a different nature, with particular political, diplomatic or security implications, all of which the Secretary of State must consider. However, the present wording is surely too wide and, if I have understood it correctly, would not be subject to subsequent review. Amendment 185A removes this very broad discretion and requires that it must appear to the Secretary of State that safeguards corresponding to the requirements under Clause 141(2) and (5) will apply in relation to disclosure overseas.

The Minister will not be surprised if I make reference to the Szabó v Hungary finding that minimum standards should be set out in law to avoid abuses of power and that,

“it would be contrary to the rule of law … for a discretion granted to the executive in the sphere of national security to be expressed in terms of unfettered power”.

The judgment notes that,

“the law must indicate the scope of any such discretion … with sufficient clarity … to give … adequate protection against arbitrary interference”.

I hope that the Government will feel able to accept the amendment as, if anything, extra safeguards may, indeed, be required where sensitive information is being disclosed abroad. We look forward to the Minister’s response on this.

Baroness Hamwee Portrait Baroness Hamwee (LD)
- Hansard - - - Excerpts

My Lords, we, too, are happy with the government amendments in this group and we support Amendment 185A. The issue is about the discretion in the application of Clauses 141(2) and 141(5)—and, shortly, Clause 143—not their relevance. The term “appropriate” suggests to me a degree of discretion which may not be related to relevance. The term “mutatis mutandis” is not one commonly used in legislation, I think, but it is that provision that one wants to see—only changing what is necessary to be changed. I do not know the proper way of dealing with that, but “appropriate” seems to be inappropriate in the context.

16:00
Lord Keen of Elie Portrait Lord Keen of Elie
- Hansard - - - Excerpts

My Lords, as the noble Baroness, Lady Hayter, has observed, Amendment 185A would remove the Secretary of State’s discretion to consider the extent to which the application of corresponding safeguards is appropriate in relation to the sharing with an overseas authority. The Government consider that this is a vital provision and its removal from the Bill would pose a real risk to the national security of this country and other countries around the world. The threat we face from terrorism and serious and organised crime is global. It is inevitable that there will be circumstances where our security and intelligence agencies uncover threats to other countries through intelligence derived from a bulk interception warrant.

In some circumstances, such threats will be against countries with which the United Kingdom has well-established intelligence-sharing relationships, and in such circumstances there are likely to be corresponding safeguards applying to the handling of intercepted material. However, there will be occasions when such intelligence indicates a serious threat to a country overseas, potentially in urgent circumstances, whose authorities simply do not apply the same level of safeguards as those included in the Bill. In such circumstances, it is crucial that the Bill places a duty on the Secretary of State to consider the arrangements that should be in place to regulate the disclosure. This decision will need to balance the risk that the material will not be subject to the same level of safeguards that it would be in this country against the risks to the security of the country in question if material is not shared.

For example, in some circumstances a failure to share intercepted material containing vital intelligence could result in a terrorist atrocity. Even in such a scenario, the amendment would place an absolute prohibition on the relevant intercepted material being shared because the overseas authority does not apply safeguards corresponding to those in the Bill. This would not be a responsible position and I believe it is only right that the Secretary of State must be responsible for deciding the appropriate arrangements for sharing intercepted material with an overseas authority, considering the particular circumstances of each case. In addition to this consideration by the Secretary of State, the safeguards that apply to the use of bulk interception will be subject to rigorous, independent oversight and scrutiny by the Investigatory Powers Commissioner. This will, of course, include the arrangements for the disclosure of intercepted material overseas.

For the reasons I have outlined, it is absolutely crucial that the Bill provides for the Secretary of State to consider the extent to which corresponding safeguards should apply where intercepted material is being shared overseas. The amendment would fetter that consideration and is both unnecessary and potentially dangerous. Accordingly, I invite the noble Baroness not to move it.

Amendment 180 agreed.
Amendment 181
Moved by
181: After Clause 137, insert the following new Clause—
“Approval of major modifications by Judicial Commissioners
(1) In deciding whether to approve a decision to make a major modification of a bulk interception warrant, a Judicial Commissioner must review the Secretary of State’s conclusions as to whether the modification is necessary on any of the grounds on which the Secretary of State considers the warrant to be necessary.(2) In doing so, the Judicial Commissioner must—(a) apply the same principles as would be applied by a court on an application for judicial review, and(b) consider the matter referred to in subsection (1) with a sufficient degree of care as to ensure that the Judicial Commissioner complies with the duties imposed by section 2 (general duties in relation to privacy).(3) Where a Judicial Commissioner refuses to approve a decision to make a major modification under section 137, the Judicial Commissioner must give the Secretary of State written reasons for the refusal.(4) Where a Judicial Commissioner, other than the Investigatory Powers Commissioner, refuses to approve a decision to make a major modification under section 137, the Secretary of State may ask the Investigatory Powers Commissioner to decide whether to approve the decision to make the modification.”
Amendment 181 agreed.
Clause 138: Approval of major modifications made in urgent cases
Amendments 182 and 183
Moved by
182: Clause 138, page 111, line 6, leave out “fifth” and insert “third”
183: Clause 138, page 111, line 15, at end insert—
“and section (Approval of major modifications by Judicial Commissioners)(4) does not apply in relation to the refusal to approve the decision.”
Amendments 182 and 183 agreed.
Clause 141: Safeguards relating to retention and disclosure of material
Amendment 184
Moved by
184: Clause 141, page 113, line 41, after “(5)” insert “and section 143”
Amendment 184 agreed.
Clause 142: Safeguards relating to disclosure of material overseas
Amendment 185
Moved by
185: Clause 142, page 114, line 21, after “(5)” insert “and section 143”
Amendment 185 agreed.
Amendment 185A not moved.
Clause 144: Additional safeguards for items subject to legal privilege
Amendment 186
Moved by
186: Clause 144, page 116, line 26, at end insert—
“( ) In deciding whether to give an approval under subsection (2) in a case where subsection (1)(b)(i) applies, a senior official must have regard to the public interest in the confidentiality of items subject to legal privilege.”
Amendment 186 agreed.
Amendment 187
Moved by
187: Clause 144, page 116, line 34, at end insert—
“( ) For the purposes of subsection (3)(b), there cannot be exceptional and compelling circumstances that make it necessary to authorise the use of the relevant criteria unless—(a) the public interest in obtaining the information that would be obtained by the selection of the intercepted content for examination outweighs the public interest in the confidentiality of items subject to legal privilege,(b) there are no other means by which the information may reasonably be obtained, and(c) obtaining the information is necessary in the interests of national security or for the purpose of preventing death or significant injury.”
Amendment 188 (to Amendment 187) not moved.
Amendment 187 agreed.
Amendments 189 and 190
Moved by
189: Clause 144, page 116, line 34, at end insert—
“(3A) Subsection (3B) applies if, in a case where intercepted content obtained under a bulk interception warrant is to be selected for examination—(a) the selection of the intercepted content for examination meets any of the selection conditions in section 143(3)(a) to (c),(b) the purpose, or one of the purposes, of using the criteria to be used for the selection of the intercepted content for examination (“the relevant criteria”) is to identify communications that, if they were not made with the intention of furthering a criminal purpose, would be items subject to legal privilege, and(c) the person to whom the warrant is addressed considers that the communications (“the targeted communications”) are likely to be communications made with the intention of furthering a criminal purpose.(3B) The intercepted content may be selected for examination using the relevant criteria only if a senior official acting on behalf of the Secretary of State has approved the use of those criteria.(3C) A senior official may give an approval under subsection (3B) only if the official considers that the targeted communications are likely to be communications made with the intention of furthering a criminal purpose.”
190: Clause 144, page 116, line 36, after “examination,” insert “for purposes other than the destruction of the item,”
Amendments 189 and 190 agreed.
Amendment 191
Moved by
191: Clause 144, page 116, line 40, at end insert—
“(4A) The Investigatory Powers Commissioner may—(a) direct that the item is destroyed, or(b) impose conditions as to the disclosure or otherwise making available of that item.(4B) The Investigatory Powers Commissioner—(a) may require an affected party to make representations about how the Commissioner should exercise any function under subsection (4A), and(b) must have regard to any such representations made by an affected party (whether or not as a result of a requirement imposed under paragraph (a)).(4C) Each of the following is an “affected party” for the purposes of subsection (4B)—(a) the Secretary of State;(b) the person to whom the warrant is or was addressed.”
Amendments 192 and 193 (to Amendment 191) not moved.
Amendment 191 agreed.
Amendment 194
Moved by
194: After Clause 144, insert the following new Clause—
“Additional safeguard for confidential journalistic material
Where—(a) a communication which has been intercepted in accordance with a bulk interception warrant is retained, following its examination, for purposes other than the destruction of the communication, and(b) it is a communication containing confidential journalistic material,the person to whom the warrant is addressed must inform the Investigatory Powers Commissioner as soon as is reasonably practicable.(For provision about the grounds for retaining material obtained under a warrant, see section 141.)”
Amendment 194 agreed.
Amendment 195
Moved by
195: After Clause 144, insert the following new Clause—
“Offence of breaching safeguards relating to examination of material under bulk interception warrants
(1) A person commits an offence if—(a) the person selects for examination any intercepted content or secondary data obtained under a bulk interception warrant,(b) the person knows or believes that the selection of that intercepted content or secondary data for examination does not comply with a requirement imposed by section 143 or 144, and(c) the person deliberately selects that intercepted content or secondary data for examination in breach of that requirement. (2) A person guilty of an offence under this section is liable—(a) on summary conviction in England and Wales—(i) to imprisonment for a term not exceeding 12 months (or 6 months, if the offence was committed before the commencement of section 154(1) of the Criminal Justice Act 2003), or(ii) to a fine,or to both;(b) on summary conviction in Scotland—(i) to imprisonment for a term not exceeding 12 months, or(ii) to a fine not exceeding the statutory maximum,or to both;(c) on summary conviction in Northern Ireland—(i) to imprisonment for a term not exceeding 6 months, or(ii) to a fine not exceeding the statutory maximum,or to both;(d) on conviction on indictment, to imprisonment for a term not exceeding 2 years or to a fine, or to both.(3) No proceedings for any offence which is an offence by virtue of this section may be instituted—(a) in England and Wales, except by or with the consent of the Director of Public Prosecutions;(b) in Northern Ireland, except by or with the consent of the Director of Public Prosecutions for Northern Ireland.”
Amendment 195 agreed.
Clause 146: Chapter 1: interpretation
Amendment 196
Moved by
196: Clause 146, page 117, line 21, at end insert—
“section (General definitions: “journalistic material” etc.) (general definitions: “journalistic material” etc.),”
Amendment 196 agreed.
Clause 147: Power to issue bulk acquisition warrants
Amendment 196A
Moved by
196A: Clause 147, page 118, line 48, at end insert—
“( ) A bulk acquisition warrant may not require data which relates to or includes internet connection records.”
Lord Paddick Portrait Lord Paddick (LD)
- Hansard - - - Excerpts

My Lords, Amendment 196A is in my name and that of my noble friend Lady Hamwee. It seeks to remove internet connection records from the type of communications data that can be acquired in bulk. Noble Lords will be very well aware of my views, and the agreed view of the Liberal Democrats, on internet connection records. We believe that they are unnecessary and disproportionate, for the reasons that I have articulated in detail throughout the passage of the Bill.

I shall just remind your Lordships what internet connection records mean. Internet service providers are being forced to keep a record of every website that everyone in the UK has visited in the last 12 months, whether the subscriber is suspected of crime or not. Even though only the first page of each website visited is shown, visiting www.relate.org.uk could, for example, immediately indicate that your marriage was in trouble. However there are some safeguards, including some concessions extracted by the Labour Opposition, to ensure that only the internet connection records of those suspected of crimes that could result on conviction in a sentence of 12 months’ imprisonment or more can be examined by law enforcement agencies.

We are also grateful to the Labour Opposition for securing the review of bulk powers carried out by David Anderson QC, the Independent Reviewer of Terrorism Legislation. We are particularly grateful to David Anderson for highlighting in paragraph 2.41(b), on page 33 of his report on bulk powers, that,

“it is not currently envisaged that the bulk acquisition power in the Bill will be used to obtain internet connection records”.

However, in a footnote at the bottom of that page, Mr Anderson states that he has been told,

“that this is no more than a statement of present practice and intention: neither the Bill nor the draft Code of Practice rules out the future use of the bulk acquisition power in relation to ICRs”.

In Committee, the noble and learned Lord, Lord Keen, said:

“I can confirm to the Committee that the agencies do not currently acquire internet connection records in bulk and have no current intention to do so. It is however important to ensure that we do not legislate against the possibility of internet connection records being acquired in bulk, should agencies make a case which demonstrates that this might be necessary and proportionate in the interests of national security in future”.—[Official Report, 7/9/16; cols. 1087-88.]

Surely we should be legislating for a proven need, not not legislating against a possible but unlikely proven one.

Noble Lords will remember that the security services—GCHQ, MI5 and MI6—have all said that they do not need internet connection records in order to do their work. The power to acquire communications data in bulk, including the power to acquire ICRs in bulk, is available only to those agencies. The power to acquire internet connection records in bulk is therefore not needed. They are not collected in bulk at the moment, and there is no current intention to do so. If this were an opposition amendment to include ICRs in bulk data acquisition, the Government would quite rightly say it was unnecessary. The power to acquire ICRs in bulk also strips away all the safeguards that are in place when law enforcement agencies apply for individual internet connection records.

This is the online equivalent of Section 44 of the Terrorism Act, which allowed the police to stop and search people without any reasonable suspicion. The former Home Secretary, now the Prime Minister, Theresa May took that power away from the police because she considered it disproportionate.

Lord Harris of Haringey Portrait Lord Harris of Haringey (Lab)
- Hansard - - - Excerpts

Surely Section 44 was for target hardening and deterrence rather than for any other purpose.

Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

I am very grateful to the noble Lord, Lord Harris, but that is not what I understood Parliament’s intention was when the legislation was enacted. We can argue the point. If the analogy with stop and search sounds familiar to noble Lords next to me, including the noble Lord, Lord Harris of Haringey, it is because it is an analogy that was used by the shadow Home Secretary Diane Abbott in describing the powers under the Bill, which she describes as draconian.

The pieces of this legislative jigsaw are beginning to fall into place. Telephone operators already keep a record of the details of every phone call made and every text message sent. Internet service providers are being forced by this Bill to keep a record of every website, you, I and everyone else in this country have visited over the previous 12 months, which is a provision this House agreed to on Monday in a Division when it rejected the Liberal Democrat amendment to prevent it. A request filter, operated by or on behalf of the Government will be constructed. It will have direct feeds into the databases of communications providers, including access to the sensitive personal information of every subscriber to telephone and internet services in the UK, every call they make and every website they visit. The House agreed to that provision in a Division on Monday when it rejected the Liberal Democrat amendment to prevent it. The power is then given by this part of the Bill to allow all that sensitive personal information—details of every phone call made and every website visited—to be downloaded at will by the security agencies with no further authorisation. I hope that at least some noble Lords are feeling uncomfortable at that prospect. Our amendment removes internet connection records from the data that can be acquired under a bulk acquisition warrant. I beg to move.

16:15
Lord Carlile of Berriew Portrait Lord Carlile of Berriew (LD)
- Hansard - - - Excerpts

My Lords, it will not surprise my noble friend to learn that I oppose the amendment that he has just moved. We made reference during our previous day on Report to papers that were presented by the Government at the time of First Reading. Those papers included, as was mentioned on Monday of this week, a paper in which GCHQ explained why the bulk acquisition of communications data material might be crucial to interdicting a major terrorism event which it thought was likely to occur, or might possibly occur, in the near future.

The issue was then referred to David Anderson—and I am surprised that my noble friend does not accept what Mr Anderson, the independent reviewer, said on the matter. He reminded us that three of the powers under review—bulk interception, bulk acquisition of communications data and bulk personal datasets—were already in use across the range of MI5, MI6 and GCHQ activity, from cyberdefence, counterterrorism and counterespionage to combating child sexual abuse and organised crime. He said:

“They play an important part in identifying, understanding and averting threats in Great Britain, Northern Ireland and further afield”.

The GCHQ paper to which I referred dealt with “further afield”.

Mr Anderson continued:

“After close examination of numerous case studies, the review concluded that other techniques could sometimes, though not always, be used to achieve these objectives: but that they would often be less effective, more dangerous, more resource-intensive, more intrusive or slower”.

Mr Anderson concluded that there was a proven operational case for three of the powers already in use, and he agreed that there was a distinct though as yet unproven operational case for the fourth power: bulk equipment interference. He also recognised the “breath-taking”—that was his word—pace of change in this area, and that we needed to make sure that the authorities had the proportionate powers that were required to protect this country, and other countries, from terrorism.

Therefore, the Bill provides the powers with a very elaborate set of protections. We also have—it is available in the Public Bill Office—the Bulk Acquisition DRAFT Code of Practice, dated autumn 2016: it is very recent. In paragraphs 3.10 and 3.11 of the code—and, indeed, elsewhere in the code—the most elaborate protections are described. For example, paragraph 3.10 contains operational guidance and advice for those who are dealing with these matters and states in terms:

“No interference with privacy should be considered proportionate if the information which is sought could reasonably be obtained by other less intrusive means”.

Paragraph 3.11 of the code sets out in four very carefully drafted bullet points the elements of proportionality that should be considered before the powers are used. It includes assessing whether other methods have been considered and whether those other methods could have provided a reasonable outcome without the necessity of the invasion of privacy which undoubtedly the provisions describe.

I therefore ask my noble friend to state, when he comes to reply to this short debate, what his view is of the code of practice—and, in particular, of the part to which I referred.

Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

The amendment relates specifically to internet connection records being acquired, and I have yet to hear my noble friend address any of his remarks to the issue of those records.

Lord Carlile of Berriew Portrait Lord Carlile of Berriew
- Hansard - - - Excerpts

If my noble friend wants me to be specific, I will, but I was trying not to take up too much time. Let us take the example of a piece of information, given to a security service, that people in possession of a bulk delivery of a certain type of telecommunications equipment, say a phone brand, are involved in the planning of a terrorist event. In order to find out quickly who these people are, the authorities would need to attack the bulk, so as to exclude all people who are not involved in the planned event. This is an absolutely routine technique that is used. I see one or two of my noble friends turning round in surprise. If they are surprised, they have not even read modern spy novels, let alone about the reality of what is being done by intelligence agencies all around the world.

The answer to my noble friend is as simple as that. I will just repeat my question, because I would like him to reply to it in due course. I take it that he has read the code of practice. What is missing from the code of practice that is required in order to provide the protection he wishes for? It is all in the code of practice; it is all in the statute. I apologise for repeating something I said on Monday, but these provisions, as drafted, are a careful and responsible response by a Government who wish to do no more than the state absolutely has to, safely, to protect their citizens.

Lord Rooker Portrait Lord Rooker (Lab)
- Hansard - - - Excerpts

I will answer that point. The Bill of course is not draconian in any way whatever. It is a modest response to the technology that exists today, and an attempt to look at the technology of tomorrow that we do not know about. That is part of the problem. I regret that I was a bit late and missed the first 20 seconds of the noble Lord’s introduction, so I may have this wrong, but he gave the impression that David Anderson supported his amendment. One only has to go to the report published in August, from which I want to put two sentences on the record. Paragraph 6.16 says:

“There is a clear value in the use of bulk powers to eliminate lines of enquiry, so that resources can be concentrated elsewhere and disruption to the public minimised”.

I do not think we should fetter the security services by this amendment. The other sentence from the report that I want to put on the record is in paragraph 6.47, at point (d):

“Even where alternatives might be available, they are frequently more intrusive than the use of bulk acquisition”.

Most of the bulk acquisition will never, ever be read. The vast majority—99.999%—will never be read or studied by anybody, and it gives a false impression when the noble Lord says that all our telephone calls, internet searches, and web browsing will be read by someone. That is simply not true. What is more, he has been briefed and knows that that is the case. I do not see why the opponents of the Bill, in this House or the other House, should try to give a false impression of what it is trying to do. I hope the noble Lord tests the opinion of the House, because I would like it clearly on the record that he probably has little or no support for his amendment.

Lord Campbell of Pittenweem Portrait Lord Campbell of Pittenweem (LD)
- Hansard - - - Excerpts

I can be brief. I must begin of course by expressing my regret that I do not agree with my noble friend on the Front Bench. There is nothing more insulting than the expression, “If you could only see what passes across my desk, you would take a different view”. I do not use that expression, but I have to admit that I cannot expunge from my memory my experience as a member of the Intelligence and Security Committee and my contact during that period with the security services. Essentially, we are talking about a question of judgment. My judgment is legitimately assisted by the conclusions of the report from Mr David Anderson, who was, a bit like Moses, dispatched up the mountain and told to come back with tablets of stone. In particular he came back with case studies, and I defy anyone to read them and not be persuaded beyond all doubt of the necessity for the powers that we are discussing today. As my noble friend Lord Carlile has pointed out, Mr Anderson reached the proven conclusion of the operational purpose of three powers and made a further case in respect of the fourth.

Sometimes in the course of these deliberations we confine ourselves to the question of terrorism. As has been mentioned, I think in passing, we should always remember that these are powers that are apt to deal with the question of organised crime and, more particularly, in the rather febrile atmosphere that surrounds the matter, the question of child sexual abuse.

Mr Anderson made the observation, which I doubt anyone would wish to challenge, that the pace of technological change is frightening. We all carry a mobile phone in our pockets; if we think of the first one we ever got some 20 years ago and compare it with the capacity of the one that we now have, that is as powerful an illustration of technological change as one could imagine.

I suppose the question may arise as to whether what we are discussing is necessary and proportionate. I respectfully suggest that the nature of the threat—I noticed as soon as I came into the building that the threat level is still severe—and the experience across the Channel, plus the experience of the security services in dealing with plots, argues beyond peradventure that what is proposed here is both necessary and proportionate. For these reasons, I regret I will not be able to follow my noble friend Lord Paddick when he tests the opinion of the House.

Lord Oates Portrait Lord Oates (LD)
- Hansard - - - Excerpts

My Lords, I support my noble friend Lord Paddick and the amendment that he has moved. I should say at the outset that I do not doubt for one moment the very severe threats that we face, nor the essential and dedicated work done by our security services and the police. In the coalition Government we had to tackle many of these issues, and the then Deputy Prime Minister was always as impatient with those who were careless about our security as he was with those who were careless about our liberty.

So I understand the reality of the threats that we face. However, I am afraid I cannot agree with my two noble friends who have just spoken. We have to be very clear what we are talking about in the amendment, which is specifically about ICRs. I think that in some of this debate we might have missed that point.

My noble friend Lord Carlile referred to the fact that powers were already in use, but the bulk powers in relation to ICRs obviously cannot be in place because the powers of the Bill granting the requirement to collect ICRs have not come into effect, so they are not collected in that way. I am surprised that my noble friend takes the view that he does, because during the whole course of the debate on the Bill he has made much of the point that he has been consistent. I am not clear why his position has changed so significantly on the collection of ICRs. As I have noted in our previous debates on the subject, on 25 May 2013, writing in the Daily Mail, my noble friend wrote the following:

“I, Lord Reid, Lord West and others of like mind have never favoured the recording of every website visited by every … user, though we have been accused of that”.

Lord Carlile of Berriew Portrait Lord Carlile of Berriew
- Hansard - - - Excerpts

My noble friend is playing with language. I have never favoured the recording of every website use we make, and I do not support the recording of them now. It is the availability of the metadata that is important. I ask my noble friend to deal with the example I gave in answer to my noble friend Lord Paddick and tell us whether he thinks it is reasonable.

16:30
Lord Oates Portrait Lord Oates
- Hansard - - - Excerpts

I am dealing with the fact that we are granting a power under the Bill, as this House voted only a couple of days ago, for all the websites visited by every user in this country, whether suspected of anything or innocent, to be recorded. That is a matter of fact, not a matter of debate.

We also need to deal with the canard that we have heard from people such as the noble Lord who spoke from the Labour Benches earlier, which is that to question the powers granted under the Bill is somehow to question the integrity of the police or the security and intelligence agencies, to cast aspersions on them. That is nonsense. I have nothing but respect for the difficult, often dangerous and always demanding jobs carried out on our behalf by the police and security services. There is no doubt that the vast majority of them do so with absolute dedication and integrity, but it is absurd to suggest that such powers are not on occasion abused. We know they are. That is a matter of fact; it is recorded in our history. Of course, it is inevitable that that is the case: all such agencies are made up of human beings and we are all subject to frailty. That is why, over the years, those who believe in constitutional democracy have insisted on limiting the powers granted to the state and its agents.

That is why we have such concern about the power granted after our debate the other day to record—I repeat—every website visited by every person in this country. The Government will now have the power to demand that that be recorded. That is why we are concerned about that and about the bulk power in relation to it. That is why I will be supporting my noble friend Lord Paddick and my colleagues on the Front Bench: I think that is rightly a matter of grave concern for liberties in this country.

Lord King of Bridgwater Portrait Lord King of Bridgwater (Con)
- Hansard - - - Excerpts

My Lords, I think the noble Lord accepts one thing: the use of these powers, which are very substantial, could in certain circumstances be essential to obstruct or prevent an otherwise very serious terrorist incident. I am not sure whether he challenges that. The noble Lord, Lord Carlile, referred to the supporting evidence from David Anderson to that effect. So the noble Lord, Lord Oates, is taking the courageous position—as is the noble Lord, Lord Paddick—of being prepared to accept that risk. In the current situation, nobody in this House has any right to be ignorant that the threat at present is severe—and “severe” may be slightly underplaying the scale of the situation at the moment. We know the situation; there is no point drawing attention to it. We know what is happening in Mosul at present, where the instruction among ISIS is, “Don’t hang around here. Get into some of the capitals of the West and see what you can do”. The message is going out to try to cause a terrorist incident right on our doorstep.

Lord Oates Portrait Lord Oates
- Hansard - - - Excerpts

The noble Lord asks me specifically what I believe. It is very simple. I do not believe that we should record the websites visited by every person in this country. I do not think that is merited; it is not a power used by any other “Five Eyes” country or any constitutional democracy that I know of.

Lord King of Bridgwater Portrait Lord King of Bridgwater
- Hansard - - - Excerpts

So the noble Lord does not agree with David Anderson or with those who said that this could be an essential asset and ingredient in possibly preventing a serious terrorist attack. He is saying that he does not believe that that is true, if I understand him; if he believes that it is true, he is being extremely courageous, in the words of “Yes Minister”, in taking that position. He is taking responsibility for what might happen to people in this country, which is a very brave thing to do.

I do not want to interfere with the slight divisions of view that are appearing among the Liberal Democrats in this House, but I have listened to the noble Lord, Lord Paddick, in a number of these debates. He is very conscientious and he looks as though he has worked very hard in preparing his brief and making speeches in support of the amendments, but he only ever gives us about half the story. He suggested in earlier debates that we were looking for powers that the agencies have not asked for and did not want, and said that he did not know why they were in the Bill. He knows the police—it is the police who are keen to get those powers. He did not put that in his speech; he did not tell the House the background, or that this was not some quirk of the noble Earl, Lord Howe, who wanted to shove stuff into the Bill for his own amusement. That is where that came from. I was disappointed by the noble Lord’s presentation of the amendment, as was exposed by the noble Lord, Lord Carlile. I do not think I heard a single mention of David Anderson or his report in the presentation of this amendment, although I may be wrong.

What stands out in this whole debate is that the Government know that these are very substantial powers, which nobody would wish to see if we could avoid it—and they are there because of the serious threat we face. The Government have recognised that if you are to have those powers, they must be surrounded by the most substantial safeguards there can be. I am known to be a critic of how much time the Government took before the Bill came forward. A number of us thought that there was an urgency about the matter and tried to get it earlier. But the Government have gone to great lengths, setting out the Anderson report and now, as the noble Lord, Lord Carlile, said, producing the code of practice. There was not a single mention from the noble Lord, Lord Paddick, of the code of practice, and I do not know whether he has considered it. I should like him to answer the question of the noble Lord, Lord Carlile. What does he think of the code of practice? It is a further safeguard that the Government have included in these proposals.

We have to protect our citizens. A number of us live with the threat of terrorism in our lives, in one way or another, and we know the tragedies it can cause in so many different fields. Sometimes we have to take tough and regrettable steps to make sure that innocent people—that everybody—is protected as far as possible. If that happens, I am determined to see that we do it in a situation and structure in which every possible protection is included against abuse and every possible system of accountability for their exercise is kept up to date and regularly inspected. The very elaborate provision that the Government have made in this Bill generally commands respect, except in one or two quarters, where people are still fighting an old battle about what old rights should be and how there should be no interference. In the modern situation in which we live, we must have proper provision to protect our nation and, at the same time, ensure that there is every possible safeguard against abuse.

Lord Bishop of Chester Portrait The Lord Bishop of Chester
- Hansard - - - Excerpts

My Lords, I am sure we do not want to prolong this debate. As I said on Monday, I was a member of the pre-legislative scrutiny group. You might wonder why a Bishop was invited to be part of that exercise, but I think it was because of this point—the ethics of interference with privacy. I am sorry that the discussion so far has almost become too polarised, because the noble Lord, Lord Paddick, is making a serious point, which I demonstrate by quoting David Anderson in his evidence to the Joint Committee on Human Rights. He said:

“I think there is a human rights issue in relation to this Bill that dwarfs all the others, and it is the question of the compatibility of bulk collection and retention of data with Article 8 of the European convention”.

The noble Lords, Lord Paddick and Lord Oates, make a serious point and we should acknowledge it, even if we come down on the side of the noble Lord, Lord King—as I do—that these powers are necessary and proportionate. The argument is about the safeguards—namely, that the warrant has to be personally signed by the Secretary of State, lapses after six months if it is not renewed, and is subject to the judicial commissioners. The real argument is about that. I do not think internet connection records are in principle different from other things that might be intercepted. However, I acknowledge the serious ethical point that the noble Lords, Lord Paddick and Lord Oates, raised, even if I come down on the side of the Government and the noble Lord, Lord King, in opposing the amendment.

Baroness Harding of Winscombe Portrait Baroness Harding of Winscombe (Con)
- Hansard - - - Excerpts

My Lords, I fear that we are repeating the debate we had the day before yesterday. If noble Lords look at this amendment, they will see three reasons why they could support it. One is if they feel that bulk data powers are unacceptable in any circumstances. A second is if they feel that the elaborate controls referred to by my noble friend Lord King and the noble Lord, Lord Carlile, are not good enough. The third is if they object in principle to the collection of internet connection records. From what I have heard this afternoon, the argument of the noble Lord, Lord Paddick, is entirely the third point. I respect his view on internet connection records but we debated this on Monday and the view of the House was very clear. I fear that we are simply repeating that discussion. We should move on.

Lord Rosser Portrait Lord Rosser (Lab)
- Hansard - - - Excerpts

As the noble Lord, Lord Paddick, said, David Anderson QC commented in his report that neither the Bill nor the draft code of practice rules out the future use of the bulk acquisition power for internet connection records. Internet connection records are not currently acquired in bulk but existing legislation already permits the agencies to acquire such records in bulk, albeit there appears to be no present intention to do so.

The effect of this amendment would be to remove an existing legislative provision which could be needed in the future for bulk acquisition—bulk acquisition which David Anderson QC found had contributed significantly to the disruption of terrorist operations and, through that disruption, almost certainly to the saving of lives, and which had also been demonstrated to be crucial in a variety of fields. In addition, any such application in the future to obtain such data by the security and intelligence agencies would be covered by the relevant safeguards in the Bill, including in relation to necessity and proportionality in the interests of national security and the approval process.

This Bill is, among other things, about the appropriate balance between security and privacy. We clearly have a different view from that of some other noble Lords on where that appropriate balance lies. Our view is that, for the reasons I have sought to set out, we are unable to support this amendment and, if it is put to a vote, we shall oppose it.

Lord Keen of Elie Portrait Lord Keen of Elie
- Hansard - - - Excerpts

My Lords, this amendment would remove the ability for the intelligence agencies to acquire internet connection records in bulk, an issue we have already discussed in Committee and revisited on a number of occasions, as observed by my noble friend Lady Harding. At the time we debated this in Committee, I highlighted the point now made by the noble Lord, Lord Rosser, that this is not a new power introduced by the Bill. This is an existing power. It exists in legislation, albeit, while it is provided for, it is not at present utilised.

As I explained in Committee, it is vital in the current climate, when methods of electronic communication are changing and developing at an exponential rate, that we provide technology-neutral legislation—a point made by the noble Lord, Lord Rooker. We remain of the view that we would not wish to legislate against the possibility of internet connection records being acquired in bulk, should the agencies make a case—and they must make a case—which demonstrates that this might be necessary and proportionate in the interests of national security.

We strongly believe that it is right that the intelligence agencies have the power to acquire communications data in bulk, and David Anderson supported this in his bulk powers review. The noble Lords, Lord Carlile and Lord Campbell of Pittenweem, alluded to the observations made by David Anderson. I will refer to only one further quotation: he said that,

“bulk acquisition has contributed significantly to the disruption of terrorist operations and, though that disruption, almost certainly the saving of lives”.

The noble Lord, Lord Carlile, alluded to some of the examples that were given by David Anderson and worked through in his report.

16:45
Any application to obtain communications data in bulk—including, should it be necessary, internet connection records—will be subject to the strong safeguards the Bill introduces, which have been discussed at length during the Bill’s scrutiny. A warrant to acquire communications data in bulk must be both necessary on one of the grounds set out in the Bill, one of which must be national security, and proportionate to what is sought to be achieved. It must specify the operational purposes for which the data can be selected for examination, and of course will be subject to the double lock of Secretary of State and judicial commissioner approval. In addition, as the noble Lord, Lord Carlile, pointed out, there are the further provisions and ring-fencing provided for in the bulk acquisition code of practice.
In the context of these very strong safeguards we consider it right that, as currently, the bulk acquisition power should remain technologically neutral, with the safeguards applying equally to all types of communications data defined by the Bill. The most fundamental safeguard is that any request to acquire internet connection records in bulk would need to be judged necessary and proportionate by both the Secretary of State and a judicial commissioner. That is a powerful safeguard, and on that basis I invite the noble Lord to withdraw the amendment.
Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

I am grateful to the Minister and to other noble Lords who have contributed to this debate. As regards the comments of my noble friend Lord Carlile of Berriew, despite my request that he specifically address the issue of internet connection records, I did not hear him do so. We are not against the bulk acquisition of communications data in general or per se. We oppose only the bulk acquisition of internet connection records as part of those data.

On the question my noble friend Lord Carlile raised about the codes of practice, of course they are comprehensive. However, through this amendment we are trying to prevent internet connection records being acquired in bulk, which is allowed for in the codes of practice.

The noble Lord, Lord Rooker, was of a different opinion from the one that I quoted—that the Bill was draconian. I am grateful to him for giving me the opportunity to emphasise to the House that it was the current Labour shadow Home Secretary, Diane Abbott, who described the Bill as draconian.

Lord Rooker Portrait Lord Rooker
- Hansard - - - Excerpts

For the avoidance of doubt, I understood that—that was the point I made.

Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

I did not suggest in any way that David Anderson agreed with this amendment, or that the lists of everybody’s websites would be read, as the noble Lord, Lord Rooker, suggested.

As regards the comments made by my noble friend Lord Campbell of Pittenweem, he referred to case studies in the David Anderson report on bulk data. I cannot emphasise this enough to noble Lords: internet connection records do not currently exist. The telecommunications companies will have to create them. Therefore any case studies in David Anderson’s report do not relate to the bulk collection of internet connection records. Internet connection records do not exist, so they cannot be collected in bulk at the moment.

I acknowledge the great experience of the noble Lord, Lord King of Bridgwater, and his passion about these issues. He emphasised that everything needs to be done to prevent a terrorist attack, and I agree with him 100%. The point that I made in my opening speech when I quoted David Anderson directly, saying that it was a direct quote from him, was that GCHQ, MI5 and MI6—the agencies responsible for keeping us safe from terrorism—say that they do not need internet connection records. Even the Minister said that at present there is no anticipated need to collect internet connection records to prevent a terrorist attack.

I am very grateful to the right reverend Prelate the Bishop of Chester for saying that we are making a fundamental point here. The difference between today’s debate and Monday’s debate is that requiring individuals’ internet connection records has to be based on reasonable suspicion. Thanks to the intervention of the Labour Front Bench, the level of the seriousness of the crime that needs to be suspected before those records can be handed over is higher than the Government first suggested. However, this power would allow everybody’s internet connection records to be acquired in bulk by the security agencies with no reasonable suspicion at all.

Lord King of Bridgwater Portrait Lord King of Bridgwater
- Hansard - - - Excerpts

Will the noble Lord—

Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

I am sorry but this is Report and I do not have to give way, unless the noble Lord wishes to clarify what I have just said.

Lord King of Bridgwater Portrait Lord King of Bridgwater
- Hansard - - - Excerpts

I wish to make an intervention. The noble Lord said again that nobody wants this power. Can he explain why it is in the Bill?

Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

It is not for me to explain why the Government want in the Bill a power that currently does not exist, because internet connection records do not exist, and which the security services say they do not want but which the noble and learned Lord says might be needed in the future. It is not for me to justify this power; I am saying to the House why I do not believe it is justified. The noble and learned Lord and the noble Lord, Lord Rosser, made the point that this is an existing power, but how can you have an existing power to acquire something that will not exist until the Bill is enacted?

I have tried to explain very clearly—although unfortunately some people have not heard what I have said—why we cannot accept this provision, and that is why I want to test the opinion of the House.

16:52

Division 1

Ayes: 82


Liberal Democrat: 74
Crossbench: 3
Labour: 2
Independent: 2
Plaid Cymru: 1

Noes: 321


Conservative: 172
Labour: 96
Crossbench: 43
Liberal Democrat: 3
Independent: 2
Ulster Unionist Party: 2
Democratic Unionist Party: 1
Bishops: 1

17:07
Clause 153: Modification of warrants
Amendments 197 and 198
Moved by
197: Clause 153, page 122, line 17, leave out subsection (6)
198: After Clause 153, insert the following new Clause—
“Approval of major modifications by Judicial Commissioners
(1) In deciding whether to approve a decision to make a major modification of a bulk acquisition warrant, a Judicial Commissioner must review the Secretary of State’s conclusions as to whether the modification is necessary on any of the grounds on which the Secretary of State considers the warrant to be necessary.(2) In doing so, the Judicial Commissioner must—(a) apply the same principles as would be applied by a court on an application for judicial review, and(b) consider the matter referred to in subsection (1) with a sufficient degree of care as to ensure that the Judicial Commissioner complies with the duties imposed by section 2 (general duties in relation to privacy).(3) Where a Judicial Commissioner refuses to approve a decision to make a major modification under section 153, the Judicial Commissioner must give the Secretary of State written reasons for the refusal. (4) Where a Judicial Commissioner, other than the Investigatory Powers Commissioner, refuses to approve a decision to make a major modification under section 153, the Secretary of State may ask the Investigatory Powers Commissioner to decide whether to approve the decision to make the modification.”
Amendments 197 and 198 agreed.
Clause 154: Approval of major modifications made in urgent cases
Amendments 199 and 200
Moved by
199: Clause 154, page 123, line 15, leave out “fifth” and insert “third”
200: Clause 154, page 123, line 24, at end insert—
“and section (Approval of major modifications by Judicial Commissioners)(4) does not apply in relation to the refusal to approve the decision.”
Amendments 199 and 200 agreed.
Clause 159: Safeguards relating to the retention and disclosure of data
Amendments 201 and 202
Moved by
201: Clause 159, page 127, line 10, after “(5)” insert “and section 160”
202: Clause 159, page 127, line 18, after “(5)” insert “and section 160”
Amendments 201 and 202 agreed.
Amendment 203
Moved by
203: After Clause 160, insert the following new Clause—
“Offence of breaching safeguards relating to examination of data
(1) A person commits an offence if—(a) the person selects for examination any communications data obtained under a bulk acquisition warrant,(b) the person knows or believes that the selection of that data for examination does not comply with a requirement imposed by section 160, and(c) the person deliberately selects that data for examination in breach of that requirement.(2) A person guilty of an offence under this section is liable—(a) on summary conviction in England and Wales—(i) to imprisonment for a term not exceeding 12 months (or 6 months, if the offence was committed before the commencement of section 154(1) of the Criminal Justice Act 2003), or(ii) to a fine,or to both;(b) on summary conviction in Scotland—(i) to imprisonment for a term not exceeding 12 months, or(ii) to a fine not exceeding the statutory maximum,or to both;(c) on summary conviction in Northern Ireland—(i) to imprisonment for a term not exceeding 6 months, or (ii) to a fine not exceeding the statutory maximum,or to both;(d) on conviction on indictment, to imprisonment for a term not exceeding 2 years or to a fine, or to both.(3) No proceedings for any offence which is an offence by virtue of this section may be instituted—(a) in England and Wales, except by or with the consent of the Director of Public Prosecutions;(b) in Northern Ireland, except by or with the consent of the Director of Public Prosecutions for Northern Ireland.”
Amendment 203 agreed.
Clause 163: Bulk equipment interference warrants: general
Amendment 203A
Moved by
203A: Clause 163, leave out Clause 163
Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

My Lords, the amendment is in my name and that of my noble friend Lady Hamwee. I shall speak also to all the other amendments in this group, Amendments 203B to 203D, 204A to 204F, 205A, 208A to 208C, 209A, 210A and 210B, 215A, 217A and 218A. The sole effect of all the amendments would be to remove from the Bill the power to engage in bulk equipment interference.

This is a new power for the security and intelligence agencies to carry out equipment interference in bulk overseas. It is not a power they currently have and, according to David Anderson QC, it is not something that they currently do. As a result, David Anderson said in his review of bulk powers that the operational case for bulk equipment interference was “not yet proven”. The noble Lord, Lord Murphy, has said:

“The case for bulk equipment interference was less strong, but nevertheless still there”.—[Official Report, 7/9/2016; col. 1049.]

As the noble Lord, Lord Rosser, said in Committee, there is a difference between an operational case, let alone an unproven one, and proportionality or desirability. Quoting Mr Anderson, he pointed out that Mr Anderson assessed only the operational cases in his review, saying that the issues of proportionality and necessity were a matter for Parliament—which is why we are debating these amendments today.

We heard in earlier debates about the potentially broad scope of targeted equipment interference warrants. They can specify all equipment used by anyone in a particular organisation or more than one organisation involved in a single investigation or operation; all equipment used by members of a group with a common purpose or engaged in a particular activity; equipment in a particular location or more than one location for the purpose of a single investigation or operation; and equipment being used or that may be used for a particular activity or activities. That is all contained in Clause 108.

Although I realise that the primary focus of this House should be to protect the citizens of this country, I ask noble Lords to consider how they would feel if overseas Governments took our lead and enacted similar legislation that could be deployed against the UK and its citizens. UK citizens’ communications could be acquired through the use of bulk equipment interference warrants if they communicated with others based overseas.

In paragraph 7.37 of his report into bulk powers, David Anderson QC warns that considerable caution is required for a series of reasons. He concludes in paragraph 7.38:

“All this means that bulk EI will require, to an even greater extent than the other powers subject to review, the most rigorous scrutiny not only by the Secretary of State but by the Judicial Commissioners who must approve its use and by the IPC which will have oversight of its consequences”.

It is the nearest David Anderson comes to expressing an opinion on necessity and proportionality and, reading between the lines, it is clear that he is not keen.

For those reasons—and as the Intelligence and Security Committee initially recommended, although it was subsequently persuaded—we believe that bulk equipment interference warrants should be removed from the Bill. I beg to move.

Earl Howe Portrait The Minister of State, Ministry of Defence (Earl Howe) (Con)
- Hansard - - - Excerpts

My Lords, these amendments would remove the bulk equipment interference provisions from the Bill. Before I address the amendments specifically, it is worth pausing to reflect briefly on the importance of bulk powers in the round and the very significant steps that the Government have taken to ensure both that a robust operational case has been made for their necessity and that the most rigorous safeguards will apply to their use.

Extremely detailed and extensive scrutiny has been applied to bulk powers during the passage of the Bill, both in Parliament and, of course, by David Anderson QC as part of his bulk powers review. The conclusion of that review was that bulk powers,

“have a clear operational purpose”;

that they,

“play an important part in identifying, understanding and averting threats in Great Britain, Northern Ireland and further afield”;

and that where alternatives exist to their use,

“they were likely to produce less comprehensive intelligence and were often more dangerous (for example to agents and their handlers), more resource-intensive, more intrusive or—crucially—slower”.

The Government have now tabled amendments giving full effect to the sole recommendation of that review, establishing in statute a Technology Advisory Panel to the Investigatory Powers Commissioner. We have also accepted an amendment tabled by the Intelligence and Security Committee which introduces a specific offence in the Bill to address deliberate misuse of the bulk powers. We have addressed wider concerns of that committee by adding very significant detail to the Bill on the safeguards that will regulate the use of these powers. I am grateful for the intensive scrutiny that has been applied to the bulk provisions in the Bill and believe that those provisions are all the stronger for it. There should now be no question that these powers are necessary and they are subject to world-leading safeguards.

17:15
I now turn to the specific amendments tabled by the Liberal Democrats. Bulk equipment interference is, as the noble Lord, Lord Paddick, said, a foreign-based power. It comprises a set of techniques to obtain information from devices in order to identify threats to the UK’s national security in circumstances where the vital intelligence is not available through the use of other methods. Material acquired under a bulk equipment interference warrant will be subject to enhanced access controls once it has been collected, ensuring that only relevant material is selected for examination and providing strong privacy protections. Equipment interference is not new. The security and intelligence agencies already use this power to keep us safe. Bulk equipment interference could be authorised under existing legislation—the Intelligence Services Act 1994—but without the strong statutory safeguards that we are providing in the Bill.
Targeted equipment interference powers are already used at scale to identify threats overseas, alongside other powers such as bulk interception, but terrorists, criminals and hostile states continue to embrace new technology to evade detection. As a result, the security and intelligence agencies face an increasingly partial and fragmented intelligence picture, even when investigating known threats. If the security and intelligence agencies are to maintain their ability to identify and disrupt threats, they will need to use other, complementary techniques. Bulk equipment interference is one such technique and in some cases may be the only way that vital intelligence can be collected. The Bill puts that power on a new statutory footing, increasing transparency and strengthening safeguards.
Bulk equipment interference has been the subject of thorough scrutiny throughout the passage of the Bill. To inform that scrutiny, the Government have published an unprecedented amount of information on the power. This has included factsheets, a draft code of practice, an operational case for all the bulk powers and the findings of the review of bulk powers undertaken by David Anderson QC. The Intelligence and Security Committee of Parliament, which has studied this power in great detail, has been clear that the bulk equipment interference regime is entirely necessary. As the chair of the committee, my right honourable and learned friend Dominic Grieve MP said at Second Reading in the other place:
“Following publication of our report, we received additional evidence from the agencies as to why they need bulk equipment interference warrants to remain in the Bill and they actually made a persuasive case. More importantly, the Committee was reassured that information obtained by such means will be treated in exactly the same way, with exactly the same controls, as data acquired under a bulk interception warrant. The Committee is therefore broadly content that there is a valid case for the power to remain in the Bill”.—[Official Report, Commons, 15/3/16; col. 838]
Nevertheless, in order to provide further information to Parliament the Government agreed to a review of the operational case for bulk powers by David Anderson QC, the Independent Reviewer of Terrorism Legislation. His findings make clear why bulk equipment interference is so crucial. The noble Lord, Lord Paddick, has not quoted him, I suggest, in a balanced way. In his report David Anderson found that,
“an operational case for bulk EI has been made out in principle”,
and went on to state that,
“there are likely to be real-world instances in which no effective alternative is available”.
The security and intelligence agencies have been unequivocal that bulk equipment interference will be absolutely essential to protect the nation from those who mean to do us harm. Removing the power from the Bill would impede this. Clearly, that is not something that David Anderson’s report condones or recommends; nor is it a recommendation of the Intelligence and Security Committee or of the other place, both of which have also given thorough consideration to this power. That is why the Government are legislating for this power, which will become only more vital as terrorists and criminals continue to take advantage of the internet and associated technology.
However, the noble Lord, Lord Paddick, was correct in one statement that he made: David Anderson’s report did go on to recommend that “rigorous scrutiny” is applied to the use of bulk equipment interference by the Secretary of State, judicial commissioners and the Investigatory Powers Commissioner. The Bill and its associated draft code of practice require rigorous consideration of the benefits and risks of any operation and robust oversight of the use of the power more generally. To complement those provisions, a new Technology Advisory Panel will be established, which will ensure that the Investigatory Powers Commissioner will always be aware of the changes in technology that impact on the use of the bulk powers.
I believe that bulk equipment interference is truly a vital power, and the Bill serves only to ensure that its use is subject to strict and transparent safeguards. There is no reason or recommendation to prohibit the security and intelligence agencies from using this power. I therefore invite the noble Lord to withdraw his amendment.
Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

I am grateful to the Minister for his comments. He kept saying that this power to conduct bulk equipment interference was absolutely essential to keeping us safe. What I do not understand is, first, why the very broad powers provided and the very broad range of targets that could be specified using targeted equipment interference could not be used in almost every case, rather than this power. Secondly, if bulk equipment interference is absolutely essential, if it could be authorised under existing legislation, why has it never been used by the security services? That is what David Anderson says.

As the Minister took the opportunity to talk about bulk powers in the round, perhaps I might get two things on the record. First, I cannot stress strongly enough that we are not opposed to the bulk acquisition of communications data generally. We are not opposed to bulk powers generally. We have specific issues with specific powers. Secondly, it has been suggested to me that I am standing here saying these things because it is my party policy. My party policy was decided by a working group that I chaired. I wrote the conclusions to that policy paper. I not only agree with the conclusions of that policy paper, I believe that they are absolutely the right conclusions. However, we have made the points that we wanted to make. They are on the record. I beg leave to withdraw the amendment.

Amendment 203A withdrawn.
Clause 164: Meaning of “equipment data”
Amendment 203B not moved.
Clause 165: Power to issue bulk equipment interference warrants
Amendment 203C not moved.
Clause 166: Approval of warrants by Judicial Commissioners
Amendment 203D not moved.
Clause 167: Approval of warrants issued in urgent cases
Amendment 204
Moved by
204: Clause 167, page 132, line 37, leave out “(unless already cancelled) ceases to have effect” and insert “—
(a) ceases to have effect (unless already cancelled), and(b) may not be renewed;and section 166(4) does not apply in relation to the refusal to approve the decision.”
Amendment 204 agreed.
Amendment 204A not moved.
Clause 168: Failure to approve warrant issued in urgent case
Amendment 204B not moved.
Clause 169: Decisions to issue warrants to be taken personally by Secretary of State
Amendment 204C not moved.
Clause 170: Requirements that must be met by warrants
Amendment 204D not moved.
Clause 171: Duration of warrants
Amendment 204E not moved.
Clause 172: Renewal of warrants
Amendment 204F not moved.
Clause 173: Modification of warrants
Amendment 205
Moved by
205: Clause 173, page 137, line 10, leave out subsection (7)
Amendment 205 agreed.
Amendment 205A not moved.
Amendment 206
Moved by
206: After Clause 173, insert the following new Clause—
“Approval of major modifications by Judicial Commissioners
(1) In deciding whether to approve a decision to make a major modification of a bulk equipment interference warrant, a Judicial Commissioner must review the Secretary of State’s conclusions as to the following matters— (a) whether the modification is necessary on any of the grounds on which the Secretary of State considers the warrant to be necessary, and(b) in the case of a major modification adding or varying any description of conduct authorised by the warrant, whether the conduct authorised by the modification is proportionate to what is sought to be achieved by that conduct.(2) In doing so, the Judicial Commissioner must—(a) apply the same principles as would be applied by a court on an application for judicial review, and(b) consider the matters referred to in subsection (1) with a sufficient degree of care as to ensure that the Judicial Commissioner complies with the duties imposed by section 2 (general duties in relation to privacy).(3) Where a Judicial Commissioner refuses to approve a decision to make a major modification under section 173, the Judicial Commissioner must give the Secretary of State written reasons for the refusal.(4) Where a Judicial Commissioner, other than the Investigatory Powers Commissioner, refuses to approve a decision to make a major modification under section 173, the Secretary of State may ask the Investigatory Powers Commissioner to decide whether to approve the decision to make the modification.”
Amendment 206 agreed.
Clause 174: Approval of major modifications made in urgent cases
Amendments 207 and 208
Moved by
207: Clause 174, page 138, line 13, leave out “fifth” and insert “third”
208: Clause 174, page 138, line 22, at end insert—
“and section (Approval of major modifications by Judicial Commissioners)(4) does not apply in relation to the refusal to approve the decision.”
Amendments 207 and 208 agreed.
Amendment 208A not moved.
Clause 175: Cancellation of warrants
Amendment 208B not moved.
Clause 176: Implementation of warrants
Amendment 208C not moved.
Clause 177: Safeguards relating to retention and disclosure of material
Amendment 209
Moved by
209: Clause 177, page 141, line 4, after “(5)” insert “and section 179”
Amendment 209 agreed.
Amendment 209A not moved.
Clause 178: Safeguards relating to disclosure of material overseas
Amendment 210
Moved by
210: Clause 178, page 141, line 28, after “(5)” insert “and section 179”
Amendment 210 agreed.
Amendment 210A not moved.
Clause 179: Safeguards relating to examination of material etc.
Amendment 210B not moved.
Clause 180: Additional safeguards for items subject to legal privilege
Amendments 211 to 215
Moved by
211: Clause 180, page 143, line 29, at end insert—
“( ) In deciding whether to give an approval under subsection (2) in a case where subsection (1)(b)(i) applies, a senior official must have regard to the public interest in the confidentiality of items subject to legal privilege.”
212: Clause 180, page 143, line 37, at end insert—
“( ) For the purposes of subsection (3)(b), there cannot be exceptional and compelling circumstances that make it necessary to authorise the use of the relevant criteria unless—(a) the public interest in obtaining the information that would be obtained by the selection of the material for examination outweighs the public interest in the confidentiality of items subject to legal privilege,(b) there are no other means by which the information may reasonably be obtained, and(c) obtaining the information is necessary in the interests of national security or for the purpose of preventing death or significant injury.”
213: Clause 180, page 143, line 37, at end insert—
“(3A) Subsection (3B) applies if, in a case where protected material obtained under a bulk equipment interference warrant is to be selected for examination—(a) the selection of the material for examination meets any of the selection conditions in section 179(3)(a) to (c),(b) the purpose, or one of the purposes, of using the criteria to be used for the selection of the material for examination (“the relevant criteria”) is to identify communications or other items of information that, if they were not communications made or (as the case may be) other items of information created or held with the intention of furthering a criminal purpose, would be items subject to legal privilege, and(c) the person to whom the warrant is addressed considers that the communications or other items of information (“the targeted communications or other items of information”) are likely to be communications made or (as the case may be) other items of information created or held with the intention of furthering a criminal purpose. (3B) The material may be selected for examination using the relevant criteria only if a senior official acting on behalf of the Secretary of State has approved the use of those criteria.(3C) A senior official may give an approval under subsection (3B) only if the official considers that the targeted communications or other items of information are likely to be communications made or (as the case may be) other items of information created or held with the intention of furthering a criminal purpose.”
214: Clause 180, page 143, line 38, after “retained” insert “, for purposes other than the destruction of the item,”
215: Clause 180, page 143, line 43, at end insert—
“(4A) The Investigatory Powers Commissioner may—(a) direct that the item is destroyed, or(b) impose conditions as to the disclosure or otherwise making available of that item.(4B) The Investigatory Powers Commissioner—(a) may require an affected party to make representations about how the Commissioner should exercise any function under subsection (4A), and(b) must have regard to any such representations made by an affected party (whether or not as a result of a requirement imposed under paragraph (a)).(4C) Each of the following is an “affected party” for the purposes of subsection (4B)—(a) the Secretary of State;(b) the person to whom the warrant is or was addressed.”
Amendments 211 to 215 agreed.
Amendment 215A not moved.
Amendment 216
Moved by
216: After Clause 180, insert the following new Clause—
“Additional safeguard for confidential journalistic material
Where—(a) material obtained under a bulk equipment interference warrant is retained, following its examination, for purposes other than the destruction of the material, and(b) it is material containing confidential journalistic material,the person to whom the warrant is addressed must inform the Investigatory Powers Commissioner as soon as is reasonably practicable.(For provision about the grounds for retaining material obtained under a bulk equipment interference warrant, see section 177.)”
Amendment 216 agreed.
Amendment 217
Moved by
217: After Clause 180, insert the following new Clause—
“Offence of breaching safeguards relating to examination of material
(1) A person commits an offence if—(a) the person selects for examination any material obtained under a bulk equipment interference warrant, (b) the person knows or believes that the selection of that material does not comply with a requirement imposed by section 179 or 180, and(c) the person deliberately selects that material in breach of that requirement.(2) A person guilty of an offence under this section is liable—(a) on summary conviction in England and Wales—(i) to imprisonment for a term not exceeding 12 months (or 6 months, if the offence was committed before the commencement of section 154(1) of the Criminal Justice Act 2003), or(ii) to a fine,or to both;(b) on summary conviction in Scotland—(i) to imprisonment for a term not exceeding 12 months, or(ii) to a fine not exceeding the statutory maximum,or to both;(c) on summary conviction in Northern Ireland—(i) to imprisonment for a term not exceeding 6 months, or(ii) to a fine not exceeding the statutory maximum,or to both;(d) on conviction on indictment, to imprisonment for a term not exceeding 2 years or to a fine, or to both.(3) No proceedings for any offence which is an offence by virtue of this section may be instituted—(a) in England and Wales, except by or with the consent of the Director of Public Prosecutions;(b) in Northern Ireland, except by or with the consent of the Director of Public Prosecutions for Northern Ireland.”
Amendment 217 agreed.
Clause 181: Application of other restrictions in relation to warrants
Amendment 217A not moved.
Clause 182: Chapter 3: interpretation
Amendment 218
Moved by
218: Clause 182, page 144, line 28, at end insert—
“section (General definitions: “journalistic material” etc.) (general definitions: “journalistic material” etc.),”
Amendment 218 agreed.
Amendment 218A not moved.
Clause 186: Restriction on use of class BPD warrants
Amendment 219
Moved by
219: Clause 186, page 145, line 36, at end insert—
“(A1) An intelligence service may not retain, or retain and examine, a bulk personal dataset in reliance on a class BPD warrant if the head of the intelligence service considers that the bulk personal dataset consists of, or includes, protected data.For the meaning of “protected data”, see section (Meaning of “protected data”).”
Lord Keen of Elie Portrait Lord Keen of Elie
- Hansard - - - Excerpts

My Lords, this group contains a number of amendments specific to Part 7 of the Bill, which covers bulk personal datasets. I first turn to government Amendments 219, 220, 224, 226, 227, 229, 230, 237, 238, 239, 240 and 265, 266 and 267.

In David Anderson QC’s review of bulk powers he stated:

“It has come to my attention that some”,

bulk personal datasets,

“may contain material that is comparable to the content of communications, and in rare cases even material subject to”,

legal professional privilege. He continued:

“In the light of these facts I have already recommended to the Home Office that consideration be given to the introduction of additional safeguards to the Bill and Code of Practice”.

We welcome David Anderson’s review and the attention he has given to these matters. I stress that it is unlikely to be the case that many bulk personal datasets will contain this sort of material, but in those instances where they do, it is right that it is protected appropriately. These amendments ensure that the Bill provides such protection.

Amendment 219 explains that an intelligence agency may not use a class BPD warrant to,

“retain, or retain and examine, a bulk personal dataset”,

that consists of or includes “protected data”. Amendment 220 would insert a new clause which defines what protected data are in this context. In essence, protected data are the same class of data as “content” in the telecommunications context or “protected material” in the equipment interference context. Protected data in a bulk personal dataset may include, for example, the contents of letters, emails or other documents. They do not include identifying data—for example, data that may help to identify persons, systems, services, locations or events—nor do they include systems data, which are data that enable or facilitate the functioning of any system or service.

17:30
If the data cannot be classified as either identifying data or systems data, then they will fall within the definition of protected data so long as they are private information. Non-private information that would fall outside the definition may include publicly available information, such as books, newspapers, TV and radio broadcasts and data that are freely available online and are not subject to any privacy settings or access controls.
Amendment 227 is a new clause which gives the Secretary of State the power to impose conditions which must be satisfied before protected data may be selected for examination where an individual is known to be in the British Islands at the time of selection. The bulk personal datasets code of practice will provide further detail on what those conditions will be. The draft code of practice published by the Government before Report includes an annex of indicative text that the Government propose including in the body of the code if Parliament passes these amendments.
I now turn to government Amendments 239 and 240. These two new clauses outline additional safeguards for items subject to legal professional privilege in bulk personal datasets. As David Anderson noted, material subject to legal professional privilege would only rarely be contained in a bulk personal data set, but again the Government agree that in those instances where datasets contain this sort of material, it is right that it is protected appropriately.
Amendment 239 is a new clause which outlines additional safeguards which apply when protected data subject to legal professional privilege are selected for examination. These safeguards will apply where the purpose of selecting protected data for examination is to identify any items subject to legal privilege or if it is likely to identify such items. Amendment 240 provides additional safeguards for the retention of items subject to legal professional privilege following examination. These amendments give effect to David Anderson’s recommendations and ensure that legally privileged protected data retained in reliance on a specific bulk personal dataset warrant are subject to the same stringent safeguards that apply when data are examined under Part 6.
Amendments 224, 226, 229, 230, 237, 238, 265, 266 and 267 are consequential amendments to the amendments I have outlined.
Government Amendments 221, 222, 223 and 225 specify the information that must be included about operational purposes in class and specific BPD warrant applications. These are technical drafting amendments that bring the drafting of Part 7 into line with the drafting of Part 6.
Amendments 235 and 242 are technical amendments to make clear the test that a judicial commissioner should apply when reviewing two particular decisions made under Part 7. That test is the same one that is applied throughout the Bill. Although this is clear in many places in the Bill, there is currently no explicit language on this point in Clauses 200 and 203. These are essentially tidying-up amendments to rectify this point.
Finally in this group I turn to government Amendment 236. This is a minor and technical amendment to ensure consistency of drafting with equivalent provisions in Part 6. In short, it ensures that particular requirements on the Secretary of State relating to the safeguards for the examination of material by the agencies are the same for Part 7 as they are for Part 6.
Taken together the amendments in this group add further safeguards to and otherwise fine-tune the provisions in Part 7. I beg to move.
Amendment 219 agreed.
Amendment 220
Moved by
220: After Clause 186, insert the following new Clause—
“Meaning of “protected data”
(1) In this Part, “protected data” means any data contained in a bulk personal dataset other than data which is one or more of the following—(a) systems data;(b) data which falls within subsection (2);(c) data which is not private information. (2) The data falling within this subsection is identifying data which—(a) is contained in the bulk personal dataset,(b) is capable of being logically separated from the bulk personal dataset, and(c) if it were so separated, would not reveal anything of what might reasonably be considered to be the meaning (if any) of any of the data which would remain in the bulk personal dataset or of the bulk personal dataset itself, disregarding any meaning arising from the existence of that data or (as the case may be) the existence of the bulk personal dataset or from any data relating to that fact.(3) For the meaning of “systems data” see section 239(4).(4) In this section, “private information” includes information relating to a person’s private or family life.”
Amendment 220 agreed.
Clause 187: Class BPD warrants
Amendment 221
Moved by
221: Clause 187, page 146, line 21, leave out from “service” to end of line 23 and insert “is seeking authorisation for the examination of bulk personal datasets of that class, the operational purposes which it is proposing should be specified in the warrant (see section 194)”
Amendment 221 agreed.
Clause 188: Specific BPD warrants
Amendments 222 to 226
Moved by
222: Clause 188, page 147, line 13, leave out “wishes” and insert “is seeking authorisation”
223: Clause 188, page 147, line 18, leave out “wishes” and insert “is seeking authorisation”
224: Clause 188, page 147, line 22, leave out “186(1)” and insert “186(A1), (1)”
225: Clause 188, page 147, line 30, leave out from “service” to end of line 32 and insert “is seeking authorisation for the examination of the bulk personal dataset, the operational purposes which it is proposing should be specified in the warrant (see section 194)”
226: Clause 188, page 147, line 34, leave out “186(1)” and insert “186(A1), (1)”
Amendments 222 to 226 agreed.
Amendment 227
Moved by
227: After Clause 189, insert the following new Clause—
“Protected data: power to impose conditions
Where the Secretary of State decides to issue a specific BPD warrant, the Secretary of State may impose conditions which must be satisfied before protected data retained in reliance on the warrant may be selected for examination on the basis of criteria which are referable to an individual known to be in the British Islands at the time of the selection.”
Amendment 227 agreed.
Clause 191: Approval of specific BPD warrants issued in urgent cases
Amendment 228
Moved by
228: Clause 191, page 150, line 19, at end insert—
“and section 190(4) does not apply in relation to the refusal to approve the decision.”
Amendment 228 agreed.
Clause 194: Requirements that must be met by warrants
Amendment 229
Moved by
229: Clause 194, page 152, line 9, at end insert “, and
(d) where the Secretary of State has imposed conditions under section (Protected data: power to impose conditions), specify those conditions.”
Amendment 229 agreed.
Clause 196: Renewal of warrants
Amendment 230
Moved by
230: Clause 196, page 154, line 3, at end insert—
“( ) Section (Protected data: power to impose conditions) applies in relation to the renewal of a specific BPD warrant as it applies in relation to the issue of such a warrant (whether or not any conditions have previously been imposed in relation to the warrant under that section).”
Amendment 230 agreed.
Clause 197: Modification of warrants
Amendment 231
Moved by
231: Clause 197, page 154, line 37, leave out subsection (6)
Amendment 231 agreed.
Amendment 232
Moved by
232: After Clause 197, insert the following new Clause—
“Approval of major modifications by Judicial Commissioners
(1) In deciding whether to approve a decision to make a major modification of a class BPD warrant or a specific BPD warrant, a Judicial Commissioner must review the Secretary of State’s conclusions as to whether the modification is necessary on any of the grounds on which the Secretary of State considers the warrant to be necessary.(2) In doing so, the Judicial Commissioner must—(a) apply the same principles as would be applied by a court on an application for judicial review, and(b) consider the matter referred to in subsection (1) with a sufficient degree of care as to ensure that the Judicial Commissioner complies with the duties imposed by section 2 (general duties in relation to privacy). (3) Where a Judicial Commissioner refuses to approve a decision to make a major modification under section 197, the Judicial Commissioner must give the Secretary of State written reasons for the refusal.(4) Where a Judicial Commissioner, other than the Investigatory Powers Commissioner, refuses to approve a decision to make a major modification under section 197, the Secretary of State may ask the Investigatory Powers Commissioner to decide whether to approve the decision to make the modification.”
Amendment 232 agreed.
Clause 198: Approval of major modifications made in urgent cases
Amendments 233 and 234
Moved by
233: Clause 198, page 155, line 33, leave out “fifth” and insert “third”
234: Clause 198, page 155, line 42, at end insert—
“and section (Approval of major modifications by Judicial Commissioners)(4) does not apply in relation to the refusal to approve the decision.”
Amendments 233 and 234 agreed.
Clause 200: Non-renewal or cancellation of BPD warrants
Amendment 235
Moved by
235: Clause 200, page 157, line 7, at end insert—
“( ) In deciding whether to give approval for the purposes of subsection (3)(b), the Judicial Commissioner must—(a) apply the same principles as would be applied by a court on an application for judicial review, and(b) consider the matter with a sufficient degree of care as to ensure that the Judicial Commissioner complies with the duties imposed by section 2 (general duties in relation to privacy).”
Amendment 235 agreed.
Clause 202: Safeguards relating to examination of bulk personal datasets
Amendments 236 to 238
Moved by
236: Clause 202, page 159, line 9, after “that” insert “arrangements are in force for securing that”
237: Clause 202, page 159, line 18, at end insert—
“( ) The Secretary of State must also ensure, in relation to every specific BPD warrant which specifies conditions imposed under section (Protected data: power to impose conditions), that arrangements are in force for securing that any selection for examination of protected data on the basis of criteria which are referable to an individual known to be in the British Islands at the time of the selection is in accordance with the conditions specified in the warrant.”
238: Clause 202, page 159, line 19, leave out “subsection (2)” and insert “this section”
Amendments 236 to 238 agreed.
Amendments 239 and 240
Moved by
239: After Clause 202, insert the following new Clause—
“Additional safeguards for items subject to legal privilege: examination
(1) Subsections (2) and (3) apply if, in a case where protected data retained in reliance on a specific BPD warrant is to be selected for examination—(a) the purpose, or one of the purposes, of using the criteria to be used for the selection of the data for examination (“the relevant criteria”) is to identify any items subject to legal privilege, or(b) the use of the relevant criteria is likely to identify such items.(2) If the relevant criteria are referable to an individual known to be in the British Islands at the time of the selection, the data may be selected for examination using the relevant criteria only if the Secretary of State has approved the use of those criteria.(3) In any other case, the data may be selected for examination using the relevant criteria only if a senior official acting on behalf of the Secretary of State has approved the use of those criteria.(4) The Secretary of State may give approval for the purposes of subsection (2) only with the approval of a Judicial Commissioner.(5) Approval may be given under subsection (2) or (3) only if—(a) the Secretary of State or (as the case may be) the senior official considers that the arrangements mentioned in section 188(6)(d) include specific arrangements in respect of items subject to legal privilege, and(b) where subsection (1)(a) applies, the Secretary of State or (as the case may be) the senior official considers that there are exceptional and compelling circumstances that make it necessary to authorise the use of the relevant criteria.(6) In deciding whether to give an approval under subsection (2) or (3) in a case where subsection (1)(a) applies, the Secretary of State or (as the case may be) the senior official must have regard to the public interest in the confidentiality of items subject to legal privilege.(7) For the purposes of subsection (5)(b), there cannot be exceptional and compelling circumstances that make it necessary to authorise the use of the relevant criteria unless—(a) the public interest in obtaining the information that would be obtained by the selection of the data for examination outweighs the public interest in the confidentiality of items subject to legal privilege,(b) there are no other means by which the information may reasonably be obtained, and(c) obtaining the information is necessary in the interests of national security or for the purpose of preventing death or significant injury.(8) In deciding whether to give approval for the purposes of subsection (4), the Judicial Commissioner must—(a) apply the same principles as would be applied by a court on an application for judicial review, and(b) consider the matter with a sufficient degree of care as to ensure that the Judicial Commissioner complies with the duties imposed by section 2 (general duties in relation to privacy).(9) Subsections (10) and (11) apply if, in a case where protected data retained in reliance on a specific BPD warrant is to be selected for examination— (a) the purpose, or one of the purposes, of using the criteria to be used for the selection of the data for examination (“the relevant criteria”) is to identify data that, if the data or any underlying material were not created or held with the intention of furthering a criminal purpose, would be an item subject to legal privilege, and(b) the person to whom the warrant is addressed considers that the data (“the targeted data”) or any underlying material is likely to be data or underlying material created or held with the intention of furthering a criminal purpose.(10) If the relevant criteria are referable to an individual known to be in the British Islands at the time of the selection, the data may be selected for examination using the relevant criteria only if the Secretary of State has approved the use of those criteria.(11) In any other case, the data may be selected for examination using the relevant criteria only if a senior official acting on behalf of the Secretary of State has approved the use of those criteria.(12) Approval may be given under subsection (10) or (11) only if the Secretary of State or (as the case may be) the senior official considers that the targeted data or the underlying material is likely to be data or underlying material created or held with the intention of furthering a criminal purpose.(13) In this section, “underlying material”, in relation to data retained in reliance on a specific BPD warrant, means any communications or other items of information from which the data was produced.”
240: After Clause 202, insert the following new Clause—
“Additional safeguards for items subject to legal privilege: retention following examination
(1) Where an item subject to legal privilege is retained following its examination in reliance on a specific BPD warrant, for purposes other than the destruction of the item, the person to whom the warrant is addressed must inform the Investigatory Powers Commissioner as soon as is reasonably practicable.(2) The Investigatory Powers Commissioner may—(a) direct that the item is destroyed, or(b) impose conditions as to the disclosure or otherwise making available of that item.(3) The Investigatory Powers Commissioner—(a) may require an affected party to make representations about how the Commissioner should exercise any function under subsection (2), and(b) must have regard to any such representations made by an affected party (whether or not as a result of a requirement imposed under paragraph (a)).(4) Each of the following is an “affected party” for the purposes of subsection (3)—(a) the Secretary of State;(b) the person to whom the warrant is or was addressed.”
Amendments 239 and 240 agreed.
Amendment 241
Moved by
241: After Clause 202, insert the following new Clause—
“Offence of breaching safeguards relating to examination of material
(1) A person commits an offence if—(a) the person selects for examination any data contained in a bulk personal dataset retained in reliance on a class BPD warrant or a specific BPD warrant, (b) the person knows or believes that the selection of that data is in breach of a requirement specified in subsection (2), and(c) the person deliberately selects that data in breach of that requirement.(2) The requirements specified in this subsection are that any selection for examination of the data—(a) is carried out only for the specified purposes (see subsection (3)),(b) is necessary and proportionate, and(c) if the data is protected data, satisfies any conditions imposed under section (Protected data: power to impose conditions).(3) The selection for examination of the data is carried out only for the specified purposes if the data is selected for examination only so far as is necessary for the operational purposes specified in the warrant in accordance with section 194.In this subsection, “specified in the warrant” means specified in the warrant at the time of the selection of the data for examination.(4) A person guilty of an offence under this section is liable—(a) on summary conviction in England and Wales—(i) to imprisonment for a term not exceeding 12 months (or 6 months, if the offence was committed before the commencement of section 154(1) of the Criminal Justice Act 2003), or(ii) to a fine,or to both;(b) on summary conviction in Scotland—(i) to imprisonment for a term not exceeding 12 months, or(ii) to a fine not exceeding the statutory maximum,or to both;(c) on summary conviction in Northern Ireland—(i) to imprisonment for a term not exceeding 6 months, or(ii) to a fine not exceeding the statutory maximum,or to both;(d) on conviction on indictment, to imprisonment for a term not exceeding 2 years or to a fine, or to both.(5) No proceedings for any offence which is an offence by virtue of this section may be instituted—(a) in England and Wales, except by or with the consent of the Director of Public Prosecutions;(b) in Northern Ireland, except by or with the consent of the Director of Public Prosecutions for Northern Ireland.”
Amendment 241 agreed.
Clause 203: Application of Part to bulk personal datasets obtained under this Act
Amendment 242
Moved by
242: Clause 203, page 160, line 11, at end insert—
“( ) In deciding whether to give approval for the purposes of subsection (7), the Judicial Commissioner must apply the same principles as would be applied by a court on an application for judicial review.”
Amendment 242 agreed.
Schedule 8: Combination of warrants and authorisations
Amendment 243
Moved by
243: Schedule 8, page 242, line 7, at end insert—
“( ) In sub-paragraph (1) “enactment” does not include any primary legislation passed or made after the end of the Session in which this Act is passed.”
Lord Keen of Elie Portrait Lord Keen of Elie
- Hansard - - - Excerpts

My Lords, I will now address government amendments relating to definitions and extent, and consequential provisions. They aim to ensure consistency within the Bill and with other statutes. Clause 246 contains the usual power to make amendments to other legislation consequential on the provisions of the Bill. Schedule 8 contains a similar power to make amendments consequential on the provisions in that schedule. As currently drafted, the powers would permit the amendment of legislation passed at any time in future.

The power to make consequential amendments to future enactments is necessary because other Bills before Parliament at the same time as this Bill touch upon the powers and public authorities covered by the Bill—such as, for example, the Policing and Crime Bill. Since it is impossible to predict how those Bills, or the Investigatory Powers Bill, may be amended during their parliamentary passage, and which Bill may achieve Royal Assent first, it is necessary to allow for the possibility of consequential amendment of future enactments.

In its recent report on the powers in the Bill, the Delegated Powers and Regulatory Reform Committee recommended that the powers should be restricted to the amending of future enactments passed or made during the current Session. The Government indicated in Committee in this House that they intended to accept this recommendation. Amendments 243 and 281 give effect to the committee’s recommendation, and I commend them to the House.

Amendments 260 and 271 are technical amendments that remove the definition of “person” from the Bill. The Bill’s definition of “person” in Clause 239 was carried over from the Regulation of Investigatory Powers Act 2000. It does not apply in relation to Parts 2 or 5 of the Bill, and we have concluded that it is not needed in respect of the other parts. The Interpretation Act definition will apply throughout the Bill. The definition of “person” in Clause 239 is therefore not required and Amendments 260 and 271 simply remove it.

Amendment 268 provides definitions of “journalistic material” and “confidential journalistic material”. It makes it clear where the additional protections provided for in Parts 2 and 5 of the Bill, which we debated here on the first day of Report, will apply. It is of course the case that the Government are seeking to protect legitimate journalism while ensuring that those who wish to do us harm cannot hide behind spurious claims of journalism. For this reason, Amendment 268 makes it clear that material acquired or created to further a criminal purpose is not considered journalistic material in the context of the Bill. This seeks to prevent persons such as those in the media wing of Daesh attracting a safeguard intended for legitimate journalists.

Amendments 280 and 286 clarify the drafting in relation to the definition of a postal operator, and to consequential amendments being made to RIPA. These drafting amendments make no changes to the effect of the provisions. Amendments 282, 283, 284 and 292 make minor amendments to the Security Service Act 1989, Intelligence Services Act 1994, Police Act 1997 and Anti-terrorism, Crime and Security Act 2001 in consequence of the updated targeted-interception provisions in Part 2 of this Bill.

Amendment 289 relates to the IPC’s duties to report to Scottish Ministers. Where the Police Act 1997 requires the IPC to report certain matters to Scottish Ministers, this amendment provides that the IPC can do so at any time, as opposed to only in its annual report. Amendment 285 is a minor and consequential amendment. As we have discussed previously, the Bill provides for an interception warrant to be obtained that has the main purpose of obtaining secondary data from communications, rather than intercepting communications content. This amendment simply amends RIPA to make it clear that a notice served under Part 3 of that Act can relate to an interception warrant that has the main purpose only of obtaining secondary data.

Amendment 287 ensures that the provisions of RIPA will make proper reference to powers provided for in this Bill, alongside existing legislative references. It will make two key changes to RIPA. First, it inserts a reference in Section 48 of RIPA to the equipment interference powers provided for in the Bill, which will sit alongside existing references to property interference powers contained in the Intelligence Services Act 1994 and the Police Act 1997. This amendment makes it clear that references to surveillance in Part 2 of RIPA do not include equipment interference activity which will be authorised under the Bill when it becomes the Investigatory Powers Act. This minor amendment will simply ensure consistency with the existing drafting of RIPA.

Secondly, and similarly, the amendment inserts a reference to equipment interference warrants into Schedule 2 to RIPA, which will sit alongside an existing reference to property interference authorisations under Part 3 of the Police Act 1997. Schedule 2 to RIPA relates to the issuing of a Section 49 notice under Part 3 of RIPA. A Section 49 notice allows relevant authorities to require a person to put protected electronic information into an “intelligible form”. In the future, acquisitions of these types of data will be done using equipment interference powers provided for in the Bill, so it is essential that law enforcement agencies continue to be able to use Section 49 notices with the new statutory framework. This amendment ensures that, in future, a law enforcement chief or an appropriate delegate will retain the same powers they currently hold in relation to protected electronic information obtained under existing legislation.

Amendment 288 is a minor, technical amendment that corrects a drafting error in Schedule 10. Paragraph 62 of Schedule 10 amends the Regulation of Investigatory Powers (Scotland) Act 2000 to ensure that Scottish Ministers can issue a code of practice in relation to equipment interference. This amendment clarifies that any such code of practice will be limited to targeted equipment interference so far as it relates to the police service or the Police Investigations and Review Commissioner, and will not relate to bulk equipment interference, a power which is not authorised by Scottish Ministers.

Finally, Amendments 296 to 300 are technical amendments which simply clarify the extent of the provisions of the Bill in relation to the Crown dependencies. They make two key changes. The first is being made following a request from the Isle of Man Government and will enable the extension of any of the provisions of the Bill, with or without modification, to the Isle of Man. This could assist the Isle of Man in ensuring that its legislative framework for law enforcement can be fully up to date and future-proof, enabling greater consistency with UK law.

The second of these changes will provide a more limited extension of provision for the Channel Islands, simply ensuring that any amendments made by the Bill to the provisions of another Act, such as the consequential amendments detailed at Schedule 10, may be extended to the Channel Islands by Order in Council, if that Act contains such a power. Any extension by Order in Council would of course only take place in consultation with the Governments of Jersey and Guernsey, and with their consent, and they would retain the option to make those amendments in domestic legislation instead. These technical amendments will help to clarify the extent of the provisions of the Bill. I beg to move.

17:45
Lord Low of Dalston Portrait Lord Low of Dalston (CB)
- Hansard - - - Excerpts

My Lords, I shall speak to Amendments 294 and 295, tabled by the noble Baronesses, Lady Hollins and Lady O’Neill, and the noble and learned Lords, Lord Falconer and Lord Wallace. The noble Baronesses very much regret that they cannot be present in the House today, and they have asked me to speak to their amendments. I will be brief, as I understand that, without prejudice to the Government’s ultimate position, the Minister is not seeking to divide the House, and we are all most grateful to him for that.

The amendments would have no impact on the security measures in the Bill, nor would they affect the other measures in the Bill in any way. Their sole purpose is to bring into force automatically after Royal Assent Clause 8 and the new clause that was added to the Bill by this House last week by a large majority.

The amendments would deliver cost protections in hacking cases, which Section 40 of the Crime and Courts Act 2013 was enacted to provide for all publication torts. Section 40 is a key part of the Leveson recommendations that the Government promised to implement but has not been commenced. Non-commencement frustrates the will of Parliament and is a breach of the 2013 cross-party agreement. The commencement of these clauses automatically after Royal Assent is necessary to ensure that the device of non-commencement is not employed again on the amendments that the House passed last week. For these reasons, I commend Amendments 294 and 295 to the House.

Lord Keen of Elie Portrait Lord Keen of Elie
- Hansard - - - Excerpts

My Lords, we discussed the substantive points on this issue on day one of Report. We consider these amendments consequential to the ones we discussed then. Although the Government’s position on the substantive issue remains as we set out last week, we are not opposing these amendments.

Amendment 243 agreed.
Clause 225: Payments towards certain compliance costs
Amendment 244
Moved by
244: Clause 225, page 178, line 12, leave out from “receive” to end of line 14 and insert “their relevant costs”
Baroness Hamwee Portrait Baroness Hamwee
- Hansard - - - Excerpts

My Lords, I shall also speak to Amendments 245 and 246. These amendments take us back to the question of the reimbursement of the operators’ costs. We have heard frequent assurances about the operators’ compliance costs and that they are to be met, but the words of the Bill do not quite live up to some of the narrative.

Our three amendments cover two alternatives; they would not all be possible. Amendments 244 and 245 would provide that arrangements were in force to secure for the operators the full amount of all relevant costs—“relevant costs” are defined later in the clause—not an appropriate contribution. As Clause 225(1) is framed, the Secretary of State must ensure,

“an appropriate contribution in respect of such of their relevant costs as the Secretary of State considers appropriate”.

With these two amendments, we seek to take out that element of discretion.

Amendment 246 would provide that if the contribution was not an equal amount, there should be regulations regarding the basis of how the contribution is calculated. Our amendments provide that the Secretary of State should lay regulations to that effect. It will be obvious to noble Lords that our reasons are transparency, equality between operators and the opportunity to consider the criteria—the factors, if you like—applied in calculating the contribution. In other words, our intention is scrutiny, using the opportunity that regulations give for debate of their content.

We have debated this matter on a number of occasions, and the Minister will be well aware of our concern. This is an attempt, at this almost last stage, to pin down just how the contribution will be made. I beg to move.

Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

My Lords, Amendments 244 and 245 are intended to ensure that communications service providers are fully reimbursed for their costs in connection with complying with obligations under the Bill. As the noble Baroness knows, this matter has been considered at length both in this House and in the Commons. It is important to recognise that service providers must not be unduly disadvantaged financially for complying with obligations placed on them aimed at protecting national security or combating crime. Indeed, the Government have a long history of working with service providers on these matters and we have been absolutely clear that we are committed to cost recovery.

I once again take the opportunity to reaffirm to the House a point that both my right honourable friend the former Security Minister and my right honourable friend the Prime Minister made very clear in the other place and that I made in Committee: this Government will reimburse 100% of reasonable costs incurred by communications service providers in relation to the acquisition and retention of communications data. This includes both capital and operational costs, including the costs associated with the retention of internet connection records.

The question that the House needs to consider, I submit, is whether it is appropriate for the Parliament of today to tie the hands of future Governments on this issue. That does not mean that we take our commitment lightly, or that future Governments will necessarily or lightly change course. Indeed, it is unlikely that any change in policy will ever take place. For example, the current policy has not changed since the passage of the Regulation of Investigatory Powers Act 2000, and so has survived Governments of three different colours, or combinations of colours.

The Bill adds further safeguards, requiring a data retention notice to set out the level of contribution that applies. This ensures that the provider must be consulted on any changes to the cost model and means that the provider could seek a review of any variation to the notice which affected the level of contribution.

Another question that I hope the House will consider is whether a communications service provider should be able to derive commercial benefit as a result of the obligations imposed on them in relation to the other powers under the Bill. Sometimes, it may be necessary for a communications service provider to upgrade part of its infrastructure to comply with an obligation imposed on it under a technical capability notice. As the communications service providers may be able to derive some business benefit from that upgrade, it is right that the legislation allows for the contribution to the costs to be appropriate to the circumstances.

Some noble Lords have expressed concern about the term “reasonable costs” and asked what it means. I hope I can provide some reassurance on that point. Significant public funding is made available to companies to ensure that they can provide assistance to public authorities in tackling terrorism, crime and other threats. As costs are reimbursed from public funds, the codes of practice make very clear that companies should take value for money into account when procuring, operating and maintaining the infrastructure required to comply with a notice. Were a company to select a solution that did not deliver best value for public funds, I am sure noble Lords would agree that it is absolutely right that the Government would need to consider carefully whether those costs were reasonable and therefore whether it was appropriate to reimburse the company in full.

The noble Baroness’s Amendment 246 acknowledges that there may be circumstances where it is appropriate for a communications service provider to be reimbursed less than its full costs. However, we do not think her proposed regulations provide the required flexibility. As I just explained, communications service providers may receive some business benefit from the changes made to their systems and it is appropriate that the Government are able to discuss these matters with them on a case-by-case basis, rather than be bound by general regulations. Indeed, while communications service providers would welcome an amendment to require 100% cost recovery in all cases, I suggest that they are unlikely to welcome regulations which enshrine in law circumstances where they would not receive full reimbursement.

I hope I have allayed any concerns about the Government’s position on costs and accordingly invite the noble Baroness to withdraw her amendment.

Baroness Hamwee Portrait Baroness Hamwee
- Hansard - - - Excerpts

My Lords, until the last two or three sentences, I thought the noble Earl had made a much better case for regulations than I did. I am a little worried about his argument that regulations cannot provide for flexibility. Flexibility is not necessarily bad, but how it is exercised should be transparent, and that is what my amendment is driving at.

The noble Earl started his remarks by saying that the operators should not be “unduly disadvantaged”, and it is those words which caveat the commitment that has troubled us throughout our debates. We have tried, particularly with the third amendment, to meet the points made by the Government. I will obviously not pursue this any further; we have reached the end of the road. I have no doubt that someone will draw to our attention any problem in practice in future. I beg leave to withdraw the amendment.

Amendment 244 withdrawn.
Amendments 245 and 246 not moved.
Clause 228: National security notices
Amendment 247
Moved by
247: Clause 228, page 180, line 18, at end insert—
“( ) In a case where—(a) a national security notice would require the taking of any steps, and(b) in the absence of such a notice requiring the taking of those steps, the taking of those steps would be lawful only if a warrant or authorisation under a relevant enactment had been obtained,the notice may require the taking of those steps only if such a warrant or authorisation has been obtained.”
Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

My Lords, I shall speak also to the other government amendments. Government Amendments 247 to 250 clarify the activity that can be authorised by a national security notice to provide greater reassurance to telecommunications operators to whom such a notice may be given. These amendments also respond to concerns raised in the Commons that the detail set out in the draft code of practice was clearer than the provisions in the Bill.

Clause 228 states that the Secretary of State may give such a notice to a telecommunications operator in the UK, requiring the taking of such specified steps as are considered necessary in the interests of national security. The type of support that may be required includes the provision of services or facilities which would help the intelligence agencies to safeguard the security of their personnel and operations, or provide assistance with an emergency as defined in Section 1 of the Civil Contingencies Act 2004.

Amendment 248 makes it clear that a national security notice cannot be used for the primary purpose of acquiring communications or data. The proposed amendments further clarify that, in any circumstance where the taking of a step set out in the notice would involve the acquisition of private data, any interference with privacy must be authorised by an appropriate warrant or other authorisation under the Bill, or another relevant statute, where it is available. Therefore, a notice, of itself, cannot authorise as its primary purpose an intrusion into an individual’s privacy.

I should like to emphasise here that this power can be exercised only if the Secretary of State and a judicial commissioner are satisfied that the conduct required by a notice is necessary and proportionate to what is sought to be achieved.

In addition, Amendment 250 makes it clear that any conduct required under a notice is lawful for all purposes, providing reassurance for telecommunications operators that, when conduct is carried out in accordance with the requirements of a notice, the operator will not risk being found to be in breach of any other legal requirement.

I hope that these amendments reassure noble Lords that a national security notice cannot be used to circumvent the need to obtain a warrant or authorisation, but neither could it prohibit the acquisition of private data when such conduct has been appropriately authorised.

18:00
Amendments 255 to 258 propose the inclusion of additional safeguards to the notice-giving regime in Part 9. The Government amended the Bill in the Commons to provide an explicit necessity and proportionality test before the Secretary of State may give a technical capability notice or national security notice, and made it clear that a notice cannot be given until a judicial commissioner approves the decision. I propose extending these important safeguards to Clause 232, which makes provision for the Secretary of State to vary or revoke a notice. Taken together, these amendments would ensure that the Secretary of State must consider the necessity and proportionality of any new obligations imposed on an operator when a notice is varied. Furthermore, Amendment 256 would provide for judicial commissioner authorisation when a variation adds obligations or steps to the notice, and when the notice is varied so that it imposes obligations in relation to additional services provided by the operator to its customers.
Amendment 257 makes it clear that the judicial commissioner’s specific role in the approval process when a notice is varied is the same as that detailed in Clause 230 in relation to the giving of notices. In mirroring the process for giving notices, Amendment 258 also ensures that the operator may refer the notice as varied to the Secretary of State for review. The Secretary of State can confirm, vary or revoke the notice following a review, but any confirmation or variation would require the approval of the Investigatory Powers Commissioner. I hope that noble Lords will agree that these proposed changes would further strengthen the safeguards in Part 9 and, accordingly, I invite the House to support them. I beg to move.
Amendment 247 agreed.
Amendments 248 to 250
Moved by
248: Clause 228, page 180, line 19, leave out from “But” to “to” in line 20 and insert “the Secretary of State may not give any telecommunications operator a national security notice the main purpose of which is to require the operator”
249: Clause 228, page 180, line 20, leave out “is required under any of the following enactments” and insert “under a relevant enactment is required.
( ) In this section “relevant enactment” means”
250: Clause 228, page 180, line 29, at end insert—
“( ) Conduct required by a national security notice is to be treated as lawful for all purposes (to the extent that it would not otherwise be so treated).”
Amendments 248 to 250 agreed.
Clause 229: Technical capability notices
Amendment 250A
Moved by
250A: Clause 229, page 180, line 46, at end insert—
“(c) specifying the distinct service or product to which the notice applies”
Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

My Lords, Amendments 250A and 251A, in my name and that of my noble friend Lady Hamwee, relate to technical capability notices through which the Secretary of State can require an operator to have a capacity to provide any assistance necessary that might be required to give effect to the powers under the Bill. We have received representations on behalf of operators asking that those notices should be specific about the distinct service or product to which the notice applies, rather than a blanket, “You must have the capability to do anything we may require you to do under the powers contained in legislation”. Amendment 250A is intended to have that effect, while Amendment 251A tries to limit the scope of technical capability notices. The power to issue a technical capability notice applies to any provider capable of being considered a telecommunications provider under the very broad definitions in the Bill. It would not be proportionate or necessary for this power to be so broad. The amendment aims to narrow the definition to exclude services that are not primarily communications services, even when there may be a communications element. Whether the wording of our amendment achieves that is a matter for debate, but that is what is intended. I beg to move.

Lord Rooker Portrait Lord Rooker
- Hansard - - - Excerpts

Could the noble Lord list the operators to which he referred?

Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

I can certainly tell the noble Lord that Yahoo! was one of the operators, but I do not have a list to hand.

Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

My Lords, Amendment 250A would define a technical capability notice as,

“specifying the distinct service or product to which the notice applies”.

I do not believe this amendment is necessary. The safeguards that apply to the giving of a notice under the Bill already ensure that a technical capability notice cannot be of a generic nature. I will not go into detail here about the lengthy process that must be undertaken before a notice can be given; we have discussed them at length previously and we will undoubtedly review them again shortly during our discussions on encryption. But it might be helpful for me to summarise.

Before giving a notice, the Secretary of State must consult the company concerned. This process will ensure that the company is fully aware of which services the notice applies to. The decision to issue a notice must be approved by the Secretary of State and a judicial commissioner. The obligations set out in the notice must be clear so that the Secretary of State and judicial commissioner can take a view as to the necessity and proportionality of the conduct required. As I have already mentioned, we propose a similar role for the judicial commissioner when a notice is varied. The operator may raise any concerns about the requirements to be set out in the notice, including any lack of clarity regarding their scope, during the consultation process. The operator may also seek a formal review of their obligations, as provided for in Clause 233. The safeguards which apply to the giving of a notice have been strengthened during the Bill’s passage through Parliament, and will ensure that the regime provided for under the Bill will be more targeted than that under existing legislation. It is for these reasons that I consider the amendment unnecessary.

Amendment 251A seeks to narrow the category of operators to whom a technical capability notice could be given. This change would exclude operators that provide services that have a communications element but are not primarily a communication service. This amendment, which has already been discussed in the Commons, is also unnecessary and, in my view, risks dangerously limiting the capabilities of law enforcement and the security and intelligence agencies. We are aware that the manner in which criminals and terrorists communicate is diversifying, as they attempt to find new ways to evade detection. We cannot be in a situation where terrorists, paedophiles and other criminals can use technology to escape justice. As David Anderson said,

“no-go areas for law enforcement should be minimised as far as possible, whether in the physical or the digital world”.

It is important that the Government can continue to impose obligations relating to technical capabilities on a range of operators to ensure that law enforcement and the security and intelligence agencies can access, in a timely manner, communications of criminals and terrorists using less conventional services, such as those offered by gaming service providers and online marketplaces. It may be appropriate to exclude certain categories of operators from obligations under this clause, such as small businesses, but it is our intention to use secondary legislation to do so. It would not be appropriate to impose blanket exemptions on services that have a communications element but are primarily not a communication service, since to do so would make it clear to terrorists and criminals that communications over such systems could not be monitored.

For all the reasons I have set out, I hope that the noble Lord, Lord Paddick, will feel able to withdraw his amendment.

Lord Beith Portrait Lord Beith (LD)
- Hansard - - - Excerpts

Before the noble Earl sits down, I refer to a point which at least needs to be borne in mind in drafting regulations. In most circumstances, if the Government impose upon a business an obligation of some kind, and behave totally unreasonably in doing so—or the business thinks that the Government are behaving unreasonably—the matter will end up in public discussion and the company has the weapon of saying to the public at large, “The Government are asking us to do something unreasonable”. That must not happen in these circumstances because clearly secrecy must be maintained. Therefore, the company is in a weaker position than it would be in the normal exchange between government and business. I hope that Ministers will recognise that fact.

Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

With the leave of the House, I am grateful to the noble Lord for raising that point, which I think will come up in the next group of amendments when we discuss encryption because it is centre stage in that issue. He is absolutely right and I hope that I can assuage his concerns in the next debate.

Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

I am very grateful to the Minister, particularly for his explanation around Amendment 251A. I completely accept that the whole range of ways in which people can communicate potentially needs to be covered. I am encouraged by the fact that there may be some exceptions in secondary legislation. It is unfortunate that we do not have sight of that before I withdraw this amendment but life is like that.

Bearing in mind the fact that the Minister did not articulate any downside to Amendment 250A, I wonder why the Government will not accept it, given that it appears not to limit the Government’s action in any way. However, at this stage, I beg leave to withdraw the amendment.

Amendment 250A withdrawn.
Amendment 251
Moved by
251: Clause 229, page 181, line 32, at end insert—
“( ) For the purposes of this section, “electronic protection” does not include electronic protection applied directly by the communications device or operating system of the end user which has the effect of encrypting the communications data in transit such that the relevant telecommunications operator does not have a means to access the associated communications data or content.”
Lord Harris of Haringey Portrait Lord Harris of Haringey
- Hansard - - - Excerpts

My Lords, noble Lords who have followed my limited contributions to the Bill will know that I take a fairly robust approach in support of what the Government seek to do in it. Indeed, they may even be slightly perplexed that I have tabled this amendment, which is supported by the Liberal Democrat Front Bench, given the slightly testy exchanges that have occurred once or twice during the passage of the Bill. However, my philosophy throughout has always been clear—namely, that by and large this Bill is needed to update current legislation and to protect the public. However, all the measures have to be tested in terms of the balance that they strike between protecting the public and their potential invasion of privacy. We have debated that issue but in this case the disbenefits I am concerned about are the extent to which what the Government may be trying to do—the Minister will no doubt explain what that is in more detail in a few minutes—under the Bill as drafted will weaken the security that people would otherwise have.

The Bill provides the Home Secretary with the power to require a communications provider to install some sort of technical capability to provide data on request, including where those data would otherwise be encrypted and are therefore not so easily available. The Bill includes an impressive array of safeguards. The Home Secretary is required to apply a series of tests before they make a decision to serve an order on a communications provider, and a process of consultation and discussion has to go forward. Those measures are all designed to ensure that not only is the Home Secretary properly informed in making that judgment but using the power is practical and reasonable. Indeed, the Bill emphasises the importance of the test of something being reasonably practical and technically feasible. I have asked for an explanation of the precise distinction between reasonably practical and technically feasible. I accept that there may be a distinction.

A whole series of tests applies under those circumstances but we do not know how those tests might be applied in future or what the Home Secretary might decide. Therefore, we cannot know how a future Home Secretary, or the present Home Secretary, would interpret what is and is not practicable and reasonable. In particular, we face an ambiguity—at least I think there is an ambiguity here—over what it will mean for end-to-end encrypted services. End-to-end encrypted services allow an end-user to send a message via a particular service which can be opened and read only by the person to whom it is sent. That is an important reassurance which we would all like to have in terms of our private communications. The company that conveys that message to the other person—the company in the middle—has no ability to see that message. The communications provider has provided that as a service because it is believed that that is what customers want.

Not all communications providers do that. Some provide a service where it is clear—it says so on the tin—that they will have the option to be aware of what is in the message because they use that to sell advertising. However, not all communications providers operate on that basis. The purpose of that encryption arrangement is to ensure that the data are protected by means of encryption against outsiders looking at them. The encryption key is held only by the person who sends the message and the person who receives it. Nobody else in between has that capacity. The potential implication of that is that the communications provider cannot find a way to discover the content of such a message, even if it wanted to and even if required to do so by the Government.

18:15
Let us suppose that for some bizarre reason I wanted to send an iMessage to the noble Lord, Lord Paddick. If I did that in the normal way, it would be an encrypted message that Apple would not be able to read. As I am cautious about losing stuff, I might copy such an iMessage to iCloud. If I copy it to iCloud, the encryption key will be sent not just to the noble Lord, Lord Paddick, but also to Apple. It could be any of the other providers, I have just used that example because I have an iPhone. I do not know what phone the noble Lord, Lord Paddick, has and I do not particularly wish to. However, the point is that Apple could access that message in that particular example only when I had elected to copy it to iCloud, whereas if I sent it just to the individual, that would not be possible.
The question then arises of what the clauses we are discussing are intended to achieve in terms of technical capability notices. Is it the Government’s intention to require a communications service provider, who provides an end-to-end encrypted service which otherwise the Government could not access, to create a capacity to enable the latter to read that message if the provider has received a technical capability notice? I assume that the Government do not want this to happen because they have said very clearly on a number of occasions that they believe encryption is important to people’s confidence in conducting e-commerce and in maintaining their privacy. Therefore, the Government believe that it is a good thing. Ministers have repeatedly said that encryption is important. Therefore, is the intention of these clauses to enable the Government to say, “Ah, yes, but—we would like to be able, under very limited circumstances which have passed all the tests, to require a communications service provider to build something, which it would not otherwise have, to break into those communications and to unencrypt them?” I assume that this would be done only under the most extreme circumstances and with very good reasons.
It is extremely important that this point is clarified. The purpose of the amendment is to make it explicit that the Government are not requiring a communications service provider to build something new which enables the former to get at the encryption keys—perhaps when they produce the next version of that particular communications method—or to build something which enables them to get into that. That is an extremely important issue to clarify but at the moment the Bill is ambiguous on it.
If that ambiguity continues, that is bad for innovation and it is certainly bad for consumer confidence. There is a danger that it creates a general weakening of encryption. Once you create that mechanism, even if for the best reasons and within the heart of a communication service provider, you have weakened the nature of that end-to-end encryption. That means that that will become of interest, not just to the people for whom the communication is intended and the person sending it, or indeed to the communication service provider, but to all sorts of other people. It could be a hostile Government or cybercriminals, who will say, “We know that some mechanism is maintained by the communication service provider that can get at that encryption process”, and they will target it. The mere fact of having created a door which can be opened will mean that other people rather than just those who think they have the right to do so will try to open it. Therefore there is a general potential weakening of encryption, with potential unintended consequences, and cybercriminals or hostile Governments could target that weakness.
If we say, “This is all right for us, because we have a benign Government with a legislative framework which provides robust safeguards, so this power will not be abused”, the implication is that in other countries, which perhaps do not have such a robust framework, the precedent is difficult to set. They will say to the communication service providers, “You provide it to the United Kingdom Government, and we know you’ve got it, because you’ve built it into your systems worldwide. We want it for our nation state, and we’ll let you know the circumstances in which you should make that available as regards our legislative provision”. We are setting a dangerous international precedent.
It has been put to me that all that will happen is that those who want to use it for nefarious purposes will simply switch to another service. That is true of everything we have talked about in these circumstances. However, we need to take seriously the danger that the most used services in particular will weaken the encryption process. We have to be clear that that is the Government’s intent, why it is their intent, and whether they have considered the potential downside of doing so. We have to be clear that if there is a reduction in the public confidence in the security of their communications, that will not be good for the economy, e-commerce, trade and everything else. It also plays right into the hands of those who believe that the Bill is simply some dreadful plot by the noble Lords opposite or the Government they represent to pry into the private details of every single one of us. I do not believe that that is the case—it is possible that one or two other people do—but it seems that the Government are playing right into their hands by looking at this.
The purpose of this amendment is simply to put in the Bill the provision that you are not asking the communication service providers to build something which at the moment they cannot do, and you are also not requiring them, next time they produce a messaging system or whatever else it might be, to put in a back door which can be opened in this way. I beg to move.
Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

My Lords, I will speak to our Amendments 252 to 254 and the other amendments in this group. To save the noble Lord, Lord Rooker, having to get to his feet, this one is from Apple.

As the noble Lord, Lord Harris of Haringey, just outlined, it is essential that end-to-end encryption is not compromised by technical capability notices. I anticipate that the Minister might say that Clause 231(3)(c) covers this in that it would not be technically feasible for the operator to remove electronic protection of this nature, but we support this amendment and believe that it needs to be explicit in the Bill. However, we do not believe that this amendment covers other forms of encryption. Our Amendment 252 is intended to protect UK operators from the real or perceived disadvantage they would be placed under if technical capability notices required them to make modifications that would make their product or service less secure than overseas operators, who may not be subject to or may refuse to comply with a similar technical capability notice.

Similarly, Amendment 253 is intended to prevent a technical capability notice stopping UK operators from innovating to improve the levels of security or encryption provided by their products and services in a way that would disadvantage them against overseas operators, which may not be subject to or refuse to comply with a similar technical capability notice.

Amendment 254 is intended to deal with the criticism of our amendment in Committee by the Minister, who said that he believed that it,

“would remove the Government’s ability to give a technical capability notice to telecommunications operators requiring them to remove encryption from the communications of criminals, terrorists and foreign spies”.—[Official Report, 13/7/16; cols. 272-73.]

This new amendment makes it clear that technical assistance can be given to enable interpretation and deciphering provided that it does not open the door to unauthorised access to encrypted materials by criminals, terrorists and foreign spies—essentially, what the noble Lord, Lord Harris, just said.

Amendment 252A, in the name of my noble friend Lord Strasburger, is an attempt to combine all the other amendments in this group into a much better-worded amendment. I look forward to hearing from him why this might be the case.

Lord Strasburger Portrait Lord Strasburger (LD)
- Hansard - - - Excerpts

My Lords, I shall rise to that opportunity. Amendment 251, in the name of the noble Lord, Lord Harris, and my noble friends Lord Paddick and Lady Hamwee, addresses one particular kind of encryption—namely end-to-end encryption—and it is very good as far as it goes, which is end-to-end encryption. My own Amendment 252A is also in this group and is complementary to Amendment 251. It is, in my humble opinion, a neater way of dealing with encryption that is not end-to-end encrypted than the combination of the other amendments in this group: Amendments 252, 253 and 254. It is an alternative to them.

We have been around the block many times on the subject of encryption in the context of Clauses 229 to 231. It has come up several times in our debates on the Bill, as well as in questions in this House and in the Joint Committee on the Bill. Yet we are no closer to a clear and unambiguous understanding of the Government’s position on this vital issue, as the noble Lord, Lord Harris, has so eloquently said.

It might help if we start from common ground. I doubt that any noble Lord, myself included, would deny the authorities the option of requiring an operator to decrypt a communication where: the operator already possesses the capability to do so; the sender or receiver of the communication is genuinely suspected of committing or planning a serious crime; and the appropriate process has been followed and the action has been judged necessary and proportionate by a judicial commissioner. I do not think that anybody would argue about that.

I believe there is more common ground. Ministers have repeatedly confirmed that the Government fully accept that many uses of the internet that are now an essential part of everyday life, both for individuals and for large organisations, cannot possibly continue to happen without the security provided by unbreakable encryption.

If we take those two points as read, we are left with two questions about what happens if the operator is not able to decrypt the communication. The first is: should the Secretary of State be able to force an operator to redesign its product so that in future its encryption has a weakness that permits the operator, or perhaps GCHQ, to read a suspect’s messages? The other question is: should the Secretary of State have the power to prevent an operator introducing new or modified encryption services which neither the authorities nor the operator can break? The answer to both those questions is an unequivocal, “No, the Secretary of State should not have those powers”, and noble Lords will be hard pressed to find a single cryptography specialist who has a different view. If the Government concur, as I hope they do, they should have no problem accepting Amendments 251 and 252A, which would remove the ambiguity in the current drafting.

18:30
We need clarity because encryption is either secure or it is not. Any weakness or back door in an encryption system, whether mandated by government or due to an accidental error by the author, is available to be found or stolen and used for nefarious purposes. This could be done by large hacking teams working for a hostile state, a criminal gang in eastern Europe or a 13 year-old geek operating from his bedroom in Scunthorpe, and the damage could be immense. It is not possible for a weakness to be inserted in such a way that it is available to the good guys and, with any certainty, not to the bad ones. It is like hiding the front-door key under a rock and hoping that the burglar does not look under that particular stone. So the purpose of these amendments is to ensure that our country’s use of the internet, for all its purposes, cannot be endangered by gaps in its security.
There is another important unintended consequence that Amendment 252A would prevent, and that is the serious risk of damage to the business of the UK’s very successful and growing data encryption industry. For its clients, the strength of the security is paramount, and even just the possibility that the encryption product may have been degraded as a result of a secret government diktat under Clause 229 would be enough to drive the customers to competitors who operate in other countries where no such risk exists. The only way for British companies to mitigate that danger would be for them to move their business to a country where government-mandated degradation of security was not possible. Relocation is what many of these companies are already considering if Clauses 229 and 231 pass unamended.
I should mention in passing that the security and intelligence services are less vexed than one might think about the increasing use of encryption. It does not prevent them seeing the communications data—if you like, the envelope around the letter—which are not encrypted. These usually reveal what they want to know—namely, who is talking to whom and when and where—and communications data are much easier for their computers to process than the content. If GCHQ needs to see unencrypted content, it can usually do that without decrypting it itself by hacking into either the sender’s or the receiver’s phone or computer and looking at it there unencrypted.
In summary, I hope the Government will be able to confirm that they accept Amendments 251 and 252A. These would remove the uncertainty that exists in the current drafting of the Bill about whether operators can be forced to vandalise the security of their own products to the detriment of all internet users and the UK tech industry. I look forward to hearing the Minister’s response.
Lord Rooker Portrait Lord Rooker
- Hansard - - - Excerpts

My Lords, if I could be convinced that the same rules applied everywhere on the globe—because we are talking about a global function—in respect of the rule of law, freedom, transparency and privacy protection, then I might have a bit of sympathy with the business operators, as we will call them.

I had the privilege of being among those serving on the RUSI panel. We had a discussion with the providers, but they did not all want to come and sit round the table at the same time—I recall two or three sessions—because they are competitors. We put it to them—it was not original; it had come up elsewhere—that not one of these companies, whether Apple, Google, Facebook, Twitter, Yahoo or Microsoft, would ever have been able to start what is now their global business in countries such as Russia, Iran and China. Yet they have become global and make enormous profits, although I will not go into the issue of them paying their taxes.

These providers hide behind the fact that the countries where they are able to start and function have the rule of law and are democracies where you can challenge Governments in the courts and get redress, yet they then go and operate in countries where they cannot do that. If they all said, “When we operate in China, we’re going to produce all our phones fully encrypted, exactly as we do for everybody else. The Chinese Government are allowing us to close end to end. They don’t want to know what their citizens are saying”, then fine, but I do not believe that that is the case, and that is part of the problem.

My noble friend Lord Harris touched on the issue of other Governments, but we can legislate only for the UK. I fully understand that, yet half of an email sent from my office upstairs to a colleague here might be split and end up travelling through the rest of Europe or America or half-way round the world. That is how the system works. Just because you are emailing someone in this country from within this country, you cannot guarantee that the entire message will stay in this country while it is being whizzed round the world. The system does not work as I originally thought it did. So we can legislate only for this country and messages get split up around the world.

The fact is that the business plans and business operations of these companies depend on open, transparent and democratic countries with the rule of law, yet they are willing to work in countries where there is no rule of law and where there are corrupt regimes, such as in Russia, or undemocratic regimes, as in China. These are countries with huge populations and the companies can do business there according to a different business plan from the one that applies here. From the point of view of those who are there to protect us, that has to lead to a suspicion that at some point we might need a bit more information than we have and that we might need to ask for that to be provided.

I take second place to no one on the protection of privacy, but the fact is that you cannot discuss this issue just in the context of the UK or Europe; it is global, and the rules do not apply equally across the globe. If we take that on board, I think we ought to have a fair degree of sympathy with how the Government will operate these measures.

I have listened to other people and have read more about this matter since finishing our work on the RUSI panel, and the fact is that there is a great reluctance to have these powers. In a democracy there is an incredible reluctance for private information to be treated in this way, but at the end of the day there will be proportionality and our people will be tested on the need for these powers. One of the raisons d’être of the Bill is to put in second and third checks, so those with the powers will be watched and the watchers will be watched, and that is how we can give the public confidence. I do not think that we ought to write the Bill to suit the business operators’ original business plans, because they are not implementing them on an equal basis across the globe. Therefore, I hope that the Government will reject these amendments.

Lord Harris of Haringey Portrait Lord Harris of Haringey
- Hansard - - - Excerpts

Before my noble friend sits down, to be honest I think that he has slightly misunderstood the point that has been made. I am not putting this forward because of the business models of particular companies; I am proposing it because of the inherent weakness that could conceivably be created. His argument, if I understood what he just said, is that because Russia or China may require, or may force because the business there is so valuable, a communications service provider to put in one of these back doors, therefore we need to have the same facility. The point is that, because it is a global provision, if a back door is built in—because Russia or China or wherever else has demanded it—then a technical capability notice would operate because the operator would have that existing facility. That is precisely the circumstance in which a technical capability notice could be served. This amendment seeks to exclude a requirement from our Government that it should be created at our behest, which other people would then use.

Lord Rooker Portrait Lord Rooker
- Hansard - - - Excerpts

I take on board what my noble friend is saying. I fully accept the distinction he makes but, basically, although I am a customer of some of these companies, I do not trust them—they will tell us that this has been built in and is secure, but do deals with those other regimes.

Lord Evans of Weardale Portrait Lord Evans of Weardale (CB)
- Hansard - - - Excerpts

My Lords, there have not been very many points in the course of this legislation on which I have agreed with the noble Lord, Lord Strasburger, but on this point I do. Amendment 252A raises a very interesting and important point.

Although I am absolutely in favour, as you would imagine, of the Government having the opportunity to access the communications of anybody who is a threat to us—due to terrorism, criminal activities or anything of that sort—there is a competing national security issue here of this country having effective cybersecurity. We have seen the way in which hostile Governments have been seeking to intervene in the American elections, and we have seen all sorts of attempts by hostile states, criminal groups and others to use cyber weaknesses to take forward hostile agendas. Therefore, there is a genuine national security interest in ensuring that, as far as we can, our citizens can communicate securely and privately when they are not going about mischievous business.

The idea that we should take into consideration the requirement not to place non-targeted customers or others at additional security risk is an entirely legitimate one, and I am very interested to hear how the Minister would want to interpret this. We have competing national security issues here and it is a point well made.

Baroness Hayter of Kentish Town Portrait Baroness Hayter of Kentish Town
- Hansard - - - Excerpts

My Lords, we have had some rather good discussions with the tech companies. In Committee, we put in some of the amendments that they suggested to us, and some of the government amendments we have been dealing with over the past few days reflect that. I thank the tech companies for their very responsible attitude in continuing discussions with the Government over this period. Certainly with us they have been open, flexible and fairly straight as to what is possible and what the dangers are for them—for example, and as we have discussed, whether a weakness in end-to-end encryption could actually undermine the security that banks and others rely on in their systems—and for their clients, public confidence and national security. The companies recognise that they have a duty of care and loyalty to their customers, while fully respecting the law of the land in which they operate and the legal demands on their staff, wherever they are located.

In their discussions with us, companies have sought clarity that they will not be asked, effectively, to create a new system that would breach end-to-end encryption. They need this clarity for their shareholders and customers’ peace of mind because the reality is that they could never be forced to create a new computer program to hack their own security. I for one cannot imagine the noble Earl, Lord Howe, or anyone else standing over a hapless computer programmer shouting, “Break into it!”, if that company did not want to do it or the computer genius was on a go-slow that day. The idea that you could force somebody to create a program that the company and the employee did not want to is probably not possible.

Given that, the reality is that the things the Government want to ask will happen only when there is a good working understanding between the security services and the company. Therefore, if the tech companies want this clarity as set out in Amendment 251—as we know they do—our interest is to hear from the Minister just what the obstacles are to giving them the clarity that they seek.

18:45
Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

My Lords, I hope that the House will allow me to speak at somewhat greater length than usual in responding to these amendments. I recognise the concern that lies behind them and I also recognise that, although we debated the Bill’s provisions on encryption in Committee, there is a need to correct a number of misconceptions that have been expressed and to set out the reality of the Government’s position on encryption. I would also like to make clear what the provisions in the Bill do and, crucially, what they do not do, and to explain why these provisions are so important to our law enforcement and intelligence agencies. I hope that by, setting this out, I can reassure noble Lords that the amendments are not necessary.

As we have made clear before, the Government recognise the importance of encryption. It keeps people’s personal data and intellectual property secure and ensures safe online commerce. The Government work closely with industry and businesses to improve their cybersecurity. For example, GCHQ plays a vital information assurance role, providing advice and guidance to enable government, industry and the public to protect their IT systems and use the internet safely. Indeed, the director of GCHQ said in March that he is accountable to the Prime Minister just as much, if not more, for the state of cybersecurity in the UK as he is for intelligence collection.

In the past two years, the security and intelligence agencies have disclosed vulnerabilities in every major mobile and desktop platform, including the big names that underpin British business. You do not have to take the Government’s word for that. In September 2015, Apple publicly credited the information assurance arm of GCHQ with the detection of a vulnerability in its operating system for iPhones and iPads, which could otherwise have been exploited by criminals to disrupt devices and extract information from them. As a result, this vulnerability could be fixed.

The assertion that the Government are opposed to encryption or would legislate to undermine it is fanciful. However, the Government and Parliament also have a responsibility to ensure that our security and intelligence services and law enforcement agencies have the capabilities necessary to keep our citizens safe. Encryption is now almost ubiquitous and is the default setting for most IT products and online services. While this technology is primarily used by law-abiding citizens, it can also be used—easily and cheaply—by terrorists and other criminals. Therefore, it can only be right that we retain the ability, as currently exists in legislation, to require a telecommunications operator to remove encryption in limited circumstances, subject to strong controls and safeguards. If we do not provide for this ability, then we must simply accept that there can be areas online beyond the reach of the law where criminals can go about their business unimpeded and without the risk of detection. That would be both irresponsible and wrong.

That is our starting principle, and it is one that we share with David Anderson QC. I have quoted this before, but he stated in his investigatory powers review, A Question of Trust:

“My first principle is that no-go areas for law enforcement should be minimised as far as possible, whether in the physical or digital world”.

This principle was also shared by the Joint Committee on the draft Bill and the Science and Technology Committee, both of which recognised that, in tightly prescribed circumstances, it should remain possible for our law enforcement agencies and security and intelligence services to be able to access unencrypted communications or data. That is exactly what Clauses 229 to 234 of the Bill provide for: strong safeguards to ensure that obligations to remove encryption can be imposed only in limited circumstances and subject to rigorous controls.

Clause 229 enables the Secretary of State to give a technical capability notice to a telecommunications operator in relation to interception, communications data or equipment interference. As part of maintaining a technical capability, the Bill makes clear at Clause 229(5)(c) that the obligations that may be imposed on an operator by the Secretary of State can include the removal of encryption. Before a technical capability notice is given, the Secretary of State must specifically consider the technical feasibility and likely cost of complying with it. Clause 231(4) provides that this consideration must explicitly take account of any obligations to remove encryption.

The Secretary of State must also consult the relevant operator before a notice is given. The draft codes of practice, which were published on 4 October, make clear that should the telecommunications operator have concerns about the reasonableness, cost or technical feasibility of any requirements to be set out in the notice, which of course includes any obligations relating to the removal of encryption, it should raise these concerns during the consultation process.

We have also amended the Bill to make clear that the Secretary of State may give a technical capability notice only where he or she considers that it is necessary and proportionate to do so, and, under Clause 230, that decision must also now be approved by a judicial commissioner, placing the stringent safeguard of the double lock on to any giving of a notice to require the removal of encryption. Clause 2 of the Bill, the privacy clause, also makes explicit that, before the Secretary of State may decide to give a notice, he or she must have regard to the public interest in the integrity and security of telecommunications systems.

In addition, a telecommunications operator that is given a technical capability notice may refer any aspect of the notice, including obligations relating to the removal of encryption, back to the Secretary of State for a review. In undertaking such a review, the Secretary of State must consult the Technical Advisory Board in relation to the technical and financial requirements of the notice, as well as a judicial commissioner in relation to its proportionality. We have amended the review clauses in the Bill to strengthen these provisions further. Where the Secretary of State decides that the outcome of the review should be to vary or confirm the effect of the notice, rather than to revoke it, that decision must be approved by the Investigatory Powers Commissioner.

The Bill also makes absolutely clear that, in line with current practice, obligations imposed on telecommunications operators to remove encryption may relate only to encryption applied by or on behalf of the company on whom the obligation is being placed. That ensures that such an obligation cannot require a telecommunications operator to remove encryption applied by other companies to data transiting their network. As we have already outlined, we have also now tabled a government amendment that would further strengthen the Bill’s provisions on technical capability notices. This amendment makes clear that the Secretary of State may vary a notice only where they consider that it is necessary and proportionate to do so. The amendment also makes clear that, in circumstances where a notice is being varied in such a way that would impose new obligations on the operator, the variation must be approved by a judicial commissioner.

Furthermore, obligations imposed under a technical capability notice to remove encryption require the relevant operator to maintain the capability to remove encryption when it is subsequently served with a warrant, notice or authorisation, rather than requiring it to remove encryption per se. That means that companies will not be forced to hand over encryption keys to the Government. Such a warrant, notice or authorisation will be subject to the double lock of Secretary of State and judicial commissioner approval, and the company on whom the warrant is served will not be required to take any steps, such as the removal of encryption, if they are not reasonably practicable steps for that company to take. So a technical capability notice could not, in itself, authorise an interference with privacy. It would simply require a capability to be maintained that would allow a telecommunications operator to give effect to a warrant quickly and securely including, where applicable, the ability to remove encryption.

That is an enormously long list of safeguards. Indeed, it is difficult to think what more the Government could do. These safeguards ensure that an obligation to remove encryption under Clause 229 of the Bill will be subject to very strict controls and may be imposed only where it is necessary and proportionate, technically feasible and reasonably practicable for the relevant operator to comply. Let me be clear: the Bill’s provisions on encryption simply maintain and clarify the current legal position, and apply strengthened safeguards to those provisions. They will mean that our law enforcement and security and intelligence agencies maintain the ability to require telecommunications operators to remove encryption in very tightly defined circumstances.

I would also like to make absolutely clear what the Bill does not provide for on encryption.

Lord Beith Portrait Lord Beith
- Hansard - - - Excerpts

Could the Minister help those of us who are not deeply technical in these matters? We fear that circumstances by their nature cannot be technical and defined. In at least some cases, the consequences of serving a notice would be that the operator would have to create a significant weakness, which would apply far beyond the objective for which the notice was being served, and the operator would have to say in future to its customers, “This system is not as strong as we would like it to be”.

Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

We come back to the test of reasonable practicability here. I am about to come on to what the Bill does not provide for on encryption and I hope that this will help the noble Lord.

The Bill does not ban encryption or do anything to limit its use. The Bill will not be used to force providers to undermine their business models, to create so-called back doors or to compromise encryption keys. It will not be used to prevent new encrypted products or services from being launched and it will not undermine internet security.

Lord Harris of Haringey Portrait Lord Harris of Haringey
- Hansard - - - Excerpts

I am very grateful for the detailed exposition that has been given. The Minister says that the Bill will not be used to do those things. Can he confirm that it cannot be used to do those things?

Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

My Lords, some noble Lords have suggested the Bill’s provisions cause a weakening in encryption, which I think is the central point that the noble Lord is getting at. Many of the biggest companies in the world rely on strong encryption to provide safe and secure communications and e-commerce, but retain the ability to access the content of their users’ communications for their own business purposes, such as advertising, as we have heard. These companies’ reputations rest on their ability to protect their users’ data. This model of encryption can, and does, maintain users’ security. I do not think that anyone would dispute that.

Before I come on to the individual amendments, it would be helpful to address a number of specific points that were raised in relation to encryption. There was a suggestion that a company should never be asked to do something that it does not already do. Such an approach would of course, at a stroke, remove our ability to use any of the powers in the Bill, including carrying out any interception of terrorists’ and serious criminals’ communications, because companies do not do this in the normal course of their business.

There was a suggestion that equipment interference would do away with the need for these provisions. It will not. Equipment interference is no substitute for having a company’s assistance. Even if it were, there are only a very small number of very clever people who are able to carry out equipment interference. There will never be the capacity to deploy them on each and every operation.

Finally, there was a suggestion that encryption is not a problem for the security and intelligence agencies. The heads of those agencies have repeatedly made clear that ubiquitous encryption is one of the most difficult challenges they face.

I now turn to the individual amendments, because I hope that this will clarify the picture further. Amendment 251 seeks to preclude an obligation to remove encryption from being imposed under a technical capability notice in relation to end-to-end encrypted services. I hope that the points I have already made make clear why the proposed amendment is not necessary and indeed why it is not desirable. As I have set out, the Government recognise the vital importance of encryption. Nothing in the Bill does anything to limit its use, and that of course includes the use of end-to-end encryption. But I have also set out the dangers of creating a guaranteed safe space online for those who would seek to do the public harm such as terrorists and other serious criminals, and I am afraid that that is exactly what this amendment would do. The amendment seeks to make explicit provision in law for there to be certain online services that criminals can use to go about their business unimpeded with no fear of being caught. That is not a position that any responsible Government or, I hope, Parliament could support.

What we must ensure is that the Bill enables us to work collaboratively with individual telecommunications operators to establish what steps are reasonably practicable for them to take, considering a range of factors including technical feasibility and likely cost. Any decision will have regard to the particular circumstances of the case, recognising that there are many different models of encryption, including many different models of end-to-end encryption, and that what is reasonably practicable for one telecommunications operator may not be for another.

As I have already said, this is not about asking companies to undermine their existing business models; it is about working with them to find a solution to ensure both that their customers’ data remain secure and that their services cannot be exploited by individuals who pose a threat to the UK. So in answer to the question put by the noble Lord, Lord Harris, I can confirm that these provisions cannot be used to introduce back doors or undermine internet security.

19:00
Amendments 252, 252A, 253 and 254 seek to prohibit the Secretary of State from imposing an obligation to remove encryption in certain circumstances, namely: where that obligation would have the effect of making communications or data less secure; where it would threaten or harm the operator’s business operations; where it would prevent the introduction of new types or levels of encryption; or where it would make communications or data more vulnerable to unauthorised access. These amendments are simply not necessary.
As I have set out very clearly, the strict and robust safeguards in the Bill already ensure that obligations to remove encryption would not have the effect of reducing the security of the internet or of a particular telecommunications service. I will not set out those safeguards again except to reiterate that, before giving a technical capability notice, the Secretary of State and a judicial commissioner must specifically consider the public interest in the security and integrity of telecommunications systems. The Bill ensures that the Secretary of State must specifically consider the cost and technical feasibility of complying with an obligation to remove encryption as well as whether it is reasonably practicable. This ensures that such an obligation cannot threaten or undermine a company’s business model and, as I have already made clear, there is nothing in the Bill that would limit the use of encryption or prevent a telecommunications operator from launching new encrypted services or products.
So for all the reasons I have outlined, these amendments are unnecessary and in some cases dangerous. They would undermine the important principle that there should be no guaranteed safe spaces online for terrorists and criminals to communicate. I hope that the noble Lord opposite is sufficiently reassured by what I have said to withdraw his amendment.
Lord Strasburger Portrait Lord Strasburger
- Hansard - - - Excerpts

My Lords, if the noble Earl is so confident that none of the unintended consequences listed in Amendment 252A can occur, and that the Government do not want them to occur, what is his objection to putting them into the Bill?

Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

We already have a wide range of safeguards which I have listed. I do not see that it is necessary to go down the road the noble Lord is advocating because of the dangers that I have pointed out. These amendments would create safe spaces which I am sure that neither he nor any noble Lord would desire to occur.

Lord Harris of Haringey Portrait Lord Harris of Haringey
- Hansard - - - Excerpts

My Lords, I am enormously grateful to the noble Earl for his detailed response and for reiterating the welcome and voluminous safeguards that are set out in the Bill. They are important and valuable, and they give me confidence about the context of the whole Bill. However, the argument with which he concluded does not quite hold together and there is an elision between different issues. The noble Earl has given an absolute assurance, I think on the basis of a piece of paper that was handed to him, that it cannot be used to require a communications service provider to build a back door or to create one in a future area. But then he said that we must not put in the Bill something that creates a safe space. Either the Government’s position is that this cannot be used to require a company to produce a back door, in which case the safe space exists and presumably the Government are not happy with their own legislation, or it is the case that the Bill could require a communications service provider to build such a back door.

We have already heard from the noble Lord, Lord Evans of Weardale, that what we are trying to do here is balance two national security concerns: the national security concern to prevent terrorism and so on and the national security concern about making it slightly easier for cybercriminals. These are very important issues. If the Government are clear that, as a result of the Bill, a technical capability notice could not require an operator to build a back door that would otherwise not exist, it is important to set that out in the Bill. If we are in a position where techUK says—as it has in the briefing it circulated to me and, I am sure, to other noble Lords—that this is ambiguous, perhaps it is the responsibility of the Government to remove that ambiguity and make the position clear. I do not really want to have to divide the House on this matter, so between now and Third Reading, is the noble Earl prepared to turn the unequivocal assurance he has given that it cannot be used in this way into an amendment to the Bill that will remove that ambiguity?

Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

With the leave of the House, I hope I can help the noble Lord on this because I do not believe that the Bill is contradictory. First, the term “back door” has been used, but I do not think that is a helpful or accurate way of describing the Bill’s provisions. “Back door” is in everyone’s judgment a loosely defined term. It is used incorrectly to imply that the Bill would enable our law enforcement, security and intelligence agencies to gain unrestricted access to a telecommunications operator’s services or systems, thereby undermining the security of those services—to force that to happen. That is absolutely not the case. The Bill enables our agencies to require telecommunications operators to remove encryption themselves, only in tightly defined circumstances: where they have applied the encryption themselves; where it has been applied on their behalf; where it is reasonably practicable for them to remove it; and where doing so is required to comply with a relevant warrant, notice or authorisation.

I come back to the point I made earlier. This is about the Government being able to sit down with companies and reach agreement with them on the basis of what is reasonably practicable, affordable and so on. It would not be responsible for any Government to deny themselves the possibility of doing that and discussing what in all the circumstances is reasonably practicable for the company, and for the company to agree to do it.

Lord Harris of Haringey Portrait Lord Harris of Haringey
- Hansard - - - Excerpts

Again I am grateful to the noble Earl. I do not think anyone here has misunderstood the point that this is not about giving the Government uninterrupted access. It is about requiring companies to create a facility so that if they are asked, after all the suitable warrants have been gone through and all the safeguards have been fulfilled, to gain information and pass it back to the Government. I accept that that is the position and that is what is intended here. However, the Minister has still not been unequivocal on whether technical capability measures could require such a facility to be created, so that, in those circumstances and with all those safeguards in place, something could be done. It is a critical issue that we need to clarify. Otherwise, we do not know where we stand as far as the amendment is concerned. The Minister needs to provide the House and the IT industry with as much clarity as he can on this point, because the danger is that it will become the subject of continual argument.

Were the Bill to be amended by any of the amendments in this group, the Government would still have the option to say that they were minded to serve a technical capability notice on a particular company. That would then trigger a series of discussions, because it is what the Bill provides for, and a communications service provider might come back at that point and say, “Look, we literally cannot do it. We do not have the facility”. However, it is not clear whether the Government could none the less say, “Well, we understand that, but we are requiring you to do it”. The question then is: what is or what is not feasible? I happen to believe that some of the biggest communications service providers in the world have more computing expertise than any nation state. If they are told, “You are legally required to do this”, they could do it; they could find a way of making it happen. We have to be explicit as to what the Government’s expectation is. Are they saying, “No, that is not what we are requiring”, or are they saying, “Well, we might”? If they are saying, “We might”, that clarifies the position, if not helpfully. If they are saying, “No, we are not”, which is what the Minister said earlier, perhaps we could put that in the Bill—if not in the form of words proposed, then in some form of words that the Government could craft between now and next week. That would be a helpful way forward and provide absolute clarity as to the extent to which technical capability notices could be served. If I am not able to get that assurance from him—I appreciate that bits of paper have been flying backwards and forwards between him and the Box—we are in a very difficult position.

Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

I can state categorically to the noble Lord that it is absolutely not the case that the Bill would force a company to insert a back door, thereby undermining internet security. We might ask a company in certain circumstances to decrypt particular data if it was reasonably practicable and feasible for them to do so.

Lord Harris of Haringey Portrait Lord Harris of Haringey
- Hansard - - - Excerpts

My Lords, I understand that that is the case; that is, if they have the encryption key—we will not use “back door”; we will find another form of words—and the capability to do it, and it is not too complicated and all the relevant warrants are in place, yes, they will do that. As I understand it, most tech companies are perfectly understanding of that and willing to do it. The question is whether, if the Government were presented with a situation they were concerned about, they could say to one of the biggest communications service providers in the world, “We are asking you to build something which is not there at the moment, but we’ll provide that facility for those circumstances that might arise in the future when we’ve gone through all the relevant warrants and so on”. I am looking for an assurance from the Minister that that is not sought here, because of the dangers that we have already discussed. If he wishes, I can reiterate the question to give the Minister the opportunity to read the piece of paper that has just arrived.

19:15
Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

Of course, a technical capability notice can require a new capability to be built; that is what they are there for. If it was neither practicable nor feasible, they would not have to do it. The problem here is that it is very difficult to generalise, because any decision about these things would have to have regard to the particular circumstances of the case. As I said, there are many different models of encryption, including many different models of end-to-end encryption. Any decision has to recognise that what is reasonably practicable for one telecommunications operator may not be for another. That is why I have referred repeatedly to the need for the Government and industry to have that easy interchange which they do at the moment. It is important to emphasise that these powers already exist in law today. We should not do anything that undermines the basis for the constructive discussions that we are having.

Lord Harris of Haringey Portrait Lord Harris of Haringey
- Hansard - - - Excerpts

The Minister reminds us that the ideal arrangement is one of easy interchange and discussion—I understand that that carries on and works very well. He is right to say—this is why the wording of the current legislation is ambiguous and therefore a problem—that building a technical capability could mean simply putting in a piece of equipment, which means that, at the point at which the Government ask, having gone through all the voluntary processes, it is quite a straightforward matter to provide the information that the Government have legitimately and lawfully requested. That is one definition of technical capability.

What I want to know is whether “technical capability” could apply to a very secure end-to-end encryption process which no communications service provider could break but where, if they devoted thousands of person hours in California or wherever they operate from, they could develop something which might do that. If that is what the Bill is saying, we need to know.

Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

That would not be reasonably practicable in that particular example.

Lord Harris of Haringey Portrait Lord Harris of Haringey
- Hansard - - - Excerpts

I accept that it would not be reasonably practicable; it would also be very expensive—as I understand the Bill, the Government would have to pay for it and I am sure that technical experts in California or wherever might be very expensive. If that is the case, and if it is not possible to write it into the Bill—I would have thought it could be—it would be helpful for the Minister to write and make very clear what the Government’s intentions are in that regard and confirm that such circumstances are precluded by the Bill. If the Minister is prepared to do that, I am prepared not to press the amendment to a vote.

Earl Howe Portrait Earl Howe
- Hansard - - - Excerpts

I think I have made the Government’s position as clear as I possibly can and I am not sure what I can do to amplify the remarks I have already made. While I want to be as helpful as possible to the noble Lord, I am struggling to see how a letter from me would make the position clearer.

Lord Harris of Haringey Portrait Lord Harris of Haringey
- Hansard - - - Excerpts

I understand the Minister’s dilemma and I am sure that a letter from him to me would have far less force than the words appearing in Hansard. I appreciate that the courts can look at the debates in Hansard to try to interpret them. However, I ask that the Minister spends the next few days just thinking about some further modification to the Bill to make sure that this ambiguity, which I think genuinely exists—because techUK tells me so—is cleared up. On the basis that I am sure he will spend his waking hours between now and next Monday thinking about precisely these matters, I beg leave to withdraw the amendment.

Amendment 251 withdrawn.
Amendment 251A not moved.
Clause 231: Further provision about notices under section 228 or 229
Amendments 252 to 254 not moved.
Clause 232: Variation and revocation of notices
Amendments 255 to 257
Moved by
255: Clause 232, page 184, line 2, leave out “only if” and insert “given to a person only if—
(a) the Secretary of State considers that the variation is necessary in the interests of national security,(b) ”
256: Clause 232, page 184, line 4, at end insert “, and
(c) if the variation would impose further requirements on the person, the decision to vary the notice has been approved by a Judicial Commissioner (but see subsection (4B)).(4A) The Secretary of State may vary a technical capability notice given to a person only if—(a) the Secretary of State considers that the variation is necessary for securing that the person has the capability to provide any assistance which the person may be required to provide in relation to any relevant authorisation (within the meaning of section 229,(b) the Secretary of State considers that the conduct required by the notice as varied is proportionate to what is sought to be achieved by that conduct, and(c) if the variation would impose further requirements on the person, the decision to vary the notice has been approved by a Judicial Commissioner (but see subsection (4B)).(4B) The condition in subsection (4)(c) or (as the case may be) subsection (4A)(c) does not apply in the case of a variation to which section 233(10) applies.”
257: Clause 232, page 184, line 7, at end insert—
“( ) Section 230 (approval of notices by Judicial Commissioners) applies in relation to a decision to vary a relevant notice (other than a decision to which section 233(10) applies) as it applies in relation to a decision to give a relevant notice, but as if—(a) the reference in section 230(2)(a) to the notice were to the variation, and(b) the reference in section 230(2)(b) to the notice were to the notice as varied.”
Amendments 255 to 257 agreed.
Clause 233: Review of notices by the Secretary of State
Amendment 258
Moved by
258: Clause 233, page 185, line 13, after first “section” insert “or section 234”
Amendment 258 agreed.
Clause 236: Review of operation of Act
Amendment 258A
Moved by
258A: Clause 236, page 186, line 24, after “period,” insert “and thereafter at least once during each Parliament,”
Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

My Lords, I shall also speak to Amendment 258B. The powers in the Bill are significant, as are the checks and auditing measures, but the Government accept, in providing for a review of the operation of the Act and in anticipating that a Select Committee of one or both Houses of Parliament will also want to look at the operation of the Act, that a full, independent review is both necessary and desirable. The Bill sets the initial period at five years and six months and requires the Secretary of State to prepare a report within six months of the initial period. These amendments would ensure that before any Government are held to account by the electorate at a general election, the electorate know what that Government have used the powers in the Bill for.

Amendment 258A adds to the requirement to produce a report within six months of the initial period that the report must be produced at least once during each Parliament. Amendment 258B reduces the initial period from five years and six months to two years and six months, to ensure that the actions of the present Government are clear to the electorate at the next general election, subject, obviously, to the current Government remaining in office for the full term. I beg to move.

Lord Rosser Portrait Lord Rosser
- Hansard - - - Excerpts

There is obviously going to be a desire to know how the Act is operating and the Bill does provide for a report from the Secretary of State, but it is, let us just say, some time after the day on which the Bill becomes an Act. Assuming that the Government do not accept the amendment, I hope that in responding they will set out, or give some indication, of the bodies and committees which will look at how the Act is operating, including whether it is doing so in line with the terms of the Bill. In that, I include the codes of practice and, particularly in light of the last discussion we had, the statements on the record from the Government in the two Hansards during the passage of the Bill.

Lord Murphy of Torfaen Portrait Lord Murphy of Torfaen (Lab)
- Hansard - - - Excerpts

My Lords, I shall add some points to what my noble friend has just said. During our rather long deliberations this evening and afternoon, I went to the Library to look up the definition of “draconian”. It seems to me to be very harsh, very severe. Apparently, it goes back to ancient Greece, where Draco was the statesman who decided that every single crime would be dealt with by a death sentence. It is not a good description of the Bill and the shadow Home Secretary is unfair and, I think, mischievous in what she said, because the Bill is significant, extremely serious and very difficult. It tries to balance the importance of security in our country, which was discussed at some length today, and our liberties.

I have to say that in 30 years in Parliament I do not think I have seen a Bill which has been scrutinised quite as well as this—not just by the Joint Committee that we were on in November and December but by other committees as well and, indeed, what we have seen in this House and the House of Commons. Nevertheless, the Joint Committee, at the very end of its deliberations, knowing full well that there would be an enormous amount of scrutiny, looked at what could happen in terms of review of the Bill. The Information Commissioner, indeed, gave evidence to the Joint Committee indicating that he thought there should be a sunset clause. The then Home Secretary, who has gone on to greater things, indicated that this was not appropriate, but the committee believed that parliamentary review of the operation of what will then be an Act should take place within six months after five years. That has been incorporated into the Bill and it is the most important type of scrutiny that could happen, because that would be a Joint Committee of both Houses of Parliament, one hopes, which could look at how the Bill has operated. The reason the Joint Committee said that was because of the hugely grave and serious nature of the Bill—not just because of the way it touches on the liberties of the subject, but protecting the subject as well.

Lord Keen of Elie Portrait Lord Keen of Elie
- Hansard - - - Excerpts

My Lords, we remain sympathetic to the desire for ongoing scrutiny of the Bill, and this is already provided for. In these circumstances we suggest that these amendments are not necessary. The Bill requires that the operation of the Act will be reviewed after five years, which is an entirely appropriate period. It is also consistent with the recommendation, as indicated, of the Joint Committee that scrutinised the draft Bill. We must ensure that, before a review takes place, all the Bill’s provisions have been in effect for a sufficient period that a review is justified and can be meaningful. A review after three years, as provided for by Amendments 258A and 258B, runs the risk that this would not be the case.

We also fully expect the review after five years to be informed by a report of a Joint Committee of Parliament, in line with the recommendation made by the Joint Committee. In addition, concurrent with such a review the Intelligence and Security Committee of Parliament would have the opportunity to assess the more sensitive aspects of the operation of the Act. Let us remember that, in addition, the exercise of the powers provided for under the Bill will of course be subject to the ongoing oversight of the Investigatory Powers Commissioner, who will be obliged to make an annual report to the Prime Minister.

The Government have listened to the previous debates in Parliament and amended the Bill to ensure that the Investigatory Powers Commissioner must, in particular, keep under review and report on the operation of safeguards to protect privacy. Furthermore, the Investigatory Powers Commissioner’s reports must be published and laid before Parliament, providing Parliament with ongoing scrutiny of the operation of the Act. Accordingly, I invite the noble Lord to withdraw the amendment.

Lord Paddick Portrait Lord Paddick
- Hansard - - - Excerpts

My Lords, I am grateful to the noble and learned Lord for his explanation. We are still of the view that at least once every Parliament, before a general election is called, a Joint Committee of both Houses of Parliament, as suggested by the noble Lord, Lord Murphy, should look at what the Government have been up to during their time in office so that the electorate are fully aware of how the Government have used the Bill. However, at this stage I beg leave to withdraw the amendment.

Amendment 258A withdrawn.
Amendment 258B not moved.
Amendment 258C
Moved by
258C: Clause 236, page 186, line 28, after “particular” insert—
“(a) report on any review by the Investigatory Powers Commissioner on the compliance of—(i) officers of the Security Service, the Secret Intelligence Service and the Government Communications Headquarters, and(ii) members of the armed forces of the United Kingdom and officials of the Ministry of Defence so far as they engage in intelligence activities,with guidance from time to time issued on the detention and interviewing of detainees overseas and on the passing and receipt of intelligence relating to detainees; and(b) ”
Baroness Hamwee Portrait Baroness Hamwee
- Hansard - - - Excerpts

I apologise to the House both that this is a rather inelegantly presented amendment and that it comes at a rather odd point in the Bill, but it covers a matter that was brought to our attention only very recently. I put thanks on the record to the organisation Reprieve for spotting the point. It would more naturally have come with clauses we debated on Monday, but we did not want to table a manuscript amendment for that.

In 2013, the Intelligence Services Commissioner was given additional functions by the then new Section 59A of RIPA. The commissioner is required, so far as directed by the Prime Minister, to keep under review the carrying out of any aspect of the functions of the intelligence services, their heads and the Ministry of Defence and forces engaging in intelligence activities.

19:30
In 2014 the then Prime Minister confirmed in a Written Statement that he had given the direction to put on a statutory footing,
“the Commissioner’s role overseeing compliance with the Consolidated Guidance to Intelligence Officers and Service Personnel on the Detention and Interviewing of Detainees Overseas, and on the Passing and Receipt of Intelligence Relating to Detainees”.
He commented that the oversight had begun in 2010 and reminded Parliament that in 2013 he was asked by the commissioner to issue this direction. He said in the Statement that he would do so,
“following the publication of the Intelligence and Security Committee’s report into the murder of Fusilier Lee Rigby”.
The committee had been,
“critical of the Secret Intelligence Service for the handling of allegations of Michael Adebolajo’s mistreatment in Kenya, made during his interview by the police … on his return to the UK”.
The then Prime Minister went on to say:
“The Intelligence Services Commissioner plays a crucial role as part of the oversight regime for the work of the Security and Intelligence Agencies … This Government has been determined from the outset to have greater clarity about what is and what is not acceptable when dealing with detainees held overseas by other countries”.—[Official Report, Commons, 27/11/14; col. 49WS.]
That is why the guidance was published.
Clause 218 abolishes the offices of various commissioners, including the Intelligence Services Commissioner, and repeals Section 59A of RIPA. In his annual report last year, the commissioner expressed concern that:
“The IP Bill does not make provision for oversight of the Consolidated Guidance under the proposed Investigatory Powers Commissioner”.
Recommendation 96 of David Anderson’s report, A Question of Trust, was that the new commissioner,
“should inherit the intelligence oversight functions of the ISCommr, including … oversight of the Consolidated Guidance … and … keeping under review the activities of the security and intelligence agencies or others engaging in intelligence activity, as directed by the Prime Minister under RIPA s59A”.
The purpose of this amendment is to inquire on what basis that oversight is to be achieved. I beg to move.
Lord Keen of Elie Portrait Lord Keen of Elie
- Hansard - - - Excerpts

My Lords, this amendment is unnecessary. The Government have already made it clear that the new Investigatory Powers Commissioner will bring together the existing responsibilities of the Intelligence Services Commissioner, the Interception of Communications Commissioner and the Chief Surveillance Commissioner. That includes oversight of the consolidated guidance on the detention and interviewing of detainees. In addition, the Investigatory Powers Commissioner will have a bigger budget and a dedicated staff of commissioners and inspectors, as well as independent legal advisers, to ensure that the highest levels of independent scrutiny are maintained. In these circumstances, I invite the noble Baroness to withdraw her amendment.

Baroness Hamwee Portrait Baroness Hamwee
- Hansard - - - Excerpts

My Lords, I chose the last words of my remarks quite carefully because it is the statutory basis of the current arrangements that is so important, which is why we raised it at this—I acknowledge—late stage. Obviously, I am glad to have these assurances. They do not answer my question but that position is now on the record. I beg leave to withdraw the amendment.

Amendment 258C withdrawn.
Clause 238: Postal definitions
Amendment 259
Moved by
259: Clause 238, page 189, line 31, after “be” insert “or is capable of being”
Amendment 259 agreed.
Clause 239: General definitions
Amendments 260 to 267
Moved by
260: Clause 239, page 191, leave out lines 46 and 47
261: Clause 239, page 191, line 49, at end insert—
““premises” includes any land, movable structure, vehicle, vessel, aircraft or hovercraft (and “set of premises” is to be read accordingly),”
262: Clause 239, page 192, line 16, at end insert—
““source of journalistic information” means an individual who provides material intending the recipient to use it for the purposes of journalism or knowing that it is likely to be so used,”
263: Clause 239, page 192, line 19, at end insert—
““statutory”, in relation to any function, means conferred by virtue of this Act or any other enactment,”
264: Clause 239, page 192, line 28, at end insert—
““the Technology Advisory Panel” means the panel established in accordance with section (Technology Advisory Panel)(1),”
265: Clause 239, page 192, line 35, after “identify” insert “, or assist in identifying,”
266: Clause 239, page 192, line 36, after “identify” insert “, or assist in identifying,”
267: Clause 239, page 192, line 39, after “identify” insert “, or assist in identifying,”
Amendments 260 to 267 agreed.
Amendment 268
Moved by
268: After Clause 239, insert the following new Clause—
“General definitions: “journalistic material” etc.
(1) The definitions in this section have effect for the purposes of this Act.Journalistic material(2) “Journalistic material” means material created or acquired for the purposes of journalism.(3) For the purposes of this section, where—(a) a person (“R”) receives material from another person (“S”), and(b) S intends R to use the material for the purposes of journalism,R is to be taken to have acquired it for those purposes.Accordingly, a communication sent by S to R containing such material is to be regarded as a communication containing journalistic material.(4) For the purposes of determining whether a communication contains material acquired for the purposes of journalism, it does not matter whether the material has been acquired for those purposes by the sender or recipient of the communication or by some other person.(5) For the purposes of this section—(a) material is not to be regarded as created or acquired for the purposes of journalism if it is created or acquired with the intention of furthering a criminal purpose, and(b) material which a person intends to be used to further such a purpose is not to be regarded as intended to be used for the purposes of journalism.Confidential journalistic material(6) “Confidential journalistic material” means—(a) in the case of material contained in a communication, journalistic material which the sender of the communication—(i) holds in confidence, or(ii) intends the recipient, or intended recipient, of the communication to hold in confidence;(b) in any other case, journalistic material which a person holds in confidence.(7) A person holds material in confidence for the purposes of this section if—(a) the person holds it subject to an express or implied undertaking to hold it in confidence, or (b) the person holds it subject to a restriction on disclosure or an obligation of secrecy contained in an enactment.”
Amendment 268 agreed.
Clause 240: Index of defined expressions
Amendments 269 to 275
Moved by
269: Clause 240, page 193, line 27, at end insert—

“Confidential journalistic material

Section (General definitions: “journalistic material” etc.)(6) and (7)”

270: Clause 240, page 194, line 20, at end insert—

“Journalistic material

Section (General definitions: “journalistic material” etc.)(2) to (5)”

271: Clause 240, page 194, leave out line 27
272: Clause 240, page 194, line 33, at end insert—

“Premises

Section 239 (1)”

273: Clause 240, page 195, line 9, leave out “74(8)” and insert “239(1)”
274: Clause 240, page 195, line 11, at end insert—

“Statutory (in relation to any function)

Section 239(1)”

275: Clause 240, page 195, line 14, at end insert—

“Technology Advisory Panel

Section 239(1)”

Amendments 269 to 275 agreed.
Clause 242: Regulations
Amendment 276
Moved by
276: Clause 242, page 196, line 20, at end insert—
“( ) section 218(2A),”
Amendment 276 agreed.
Schedule 9: Transitional, transitory and saving provision
Amendments 277 to 280
Moved by
277: Schedule 9, page 242, line 26, leave out “section 86(1) to (11)” and insert “sections 84(1)(b), (3A) and (7)(e), (Approval of retention notices by Judicial Commissioners), 86(1) to (11), (Approval of retention notices following review under section 86), 89(4)(b), (5A), (8A) and (9A) and 91(2)(de)”
278: Schedule 9, page 243, line 3, at end insert—
“but this is without prejudice to the continued operation of section 90(2) to (5) in relation to the notice.”
279: Schedule 9, page 243, line 18, at end insert—
“_(1) Sub-paragraph (2) applies if any power to give, vary or confirm a retention notice under section 84 of this Act (excluding any power to vary a notice which has effect as such a notice by virtue of paragraph 3(1)) is brought into force without any requirement for approval by a Judicial Commissioner of the decision to give, vary or (as the case may be) confirm the notice._(2) The notice as given, varied or confirmed ceases to have effect (so far as not previously revoked) at the end of the period of three months beginning with the day on which the requirement for approval comes into force.”
280: Schedule 9, page 243, line 42, after “operator” insert “(within the meaning given by section 27(3) of the Postal Services Act 2011)”
Amendments 277 to 280 agreed.
Clause 246: Minor and consequential provision
Amendment 281
Moved by
281: Clause 246, page 199, line 2, at end insert—
“( ) In subsection (3) “enactment” does not include any primary legislation passed or made after the end of the Session in which this Act is passed.”
Amendment 281 agreed.
Schedule 10: Minor and consequential provision
Amendments 282 to 293
Moved by
282: Schedule 10, page 250, line 17, at end insert—
“Security Service Act 1989
In section 1(5) of the Security Service Act 1989 (meaning of “prevention” and “detection”) for the words from “the provisions” to the end substitute “that Act”.”
283: Schedule 10, page 250, line 28, at end insert—
“Intelligence Services Act 1994
In section 11(1A) of the Intelligence Services Act 1994 (meaning of “prevention” and “detection”) for the words from “apply” to the end substitute “apply for the purposes of this Act as it applies for the purposes of that Act, except that for the purposes of section 3 above it shall not include a reference to gathering evidence for use in any legal proceedings (within the meaning of that Act).”.”
284: Schedule 10, page 251, line 13, at end insert—
“Police Act 1997
In section 133A of the Police Act 1997 (meaning of “prevention” and “detection”) for the words from “the provisions” to the end substitute “that Act”.”
285: Schedule 10, page 251, line 34, at end insert—
“(1) Section 49 (investigation of electronic data protected by encryption etc: powers under which data obtained) is amended as follows.(2) In subsection (1)(b) after “communications” insert “or obtain secondary data from communications”.(3) After subsection (9) insert—“(9A) In subsection (1)(b) the reference to obtaining secondary data from communications is to be read in accordance with section 16 of the Investigatory Powers Act 2016.””
286: Schedule 10, page 252, line 37, leave out from “(1)” to end of line 38 and insert “—
(a) for “23A” substitute “72 of the Investigatory Powers Act 2016”, and(b) for “or 32A” substitute “or section 32A of this Act”.”
287: Schedule 10, page 253, line 34, at end insert—
“Regulation of Investigatory Powers Act 2000
59A_ The Regulation of Investigatory Powers Act 2000 is amended as follows.59B_ In section 48 (interpretation of Part 2), in subsection (3)(c)—(a) omit the “or” at the end of sub-paragraph (i);(b) after sub-paragraph (ii) insert “; or(iii) Part 5, or Chapter 3 of Part 6, of the Investigatory Powers Act 2016 (equipment interference).”59C(1) Paragraph 2 of Schedule 2 (persons having the appropriate permission where data obtained under warrant etc) is amended as follows._(2) In sub-paragraph (1)—(a) omit the “or” at the end of paragraph (a);(b) after paragraph (b) insert “; or(c) a targeted equipment interference warrant issued under section 101 of the Investigatory Powers Act 2016 (powers of law enforcement chiefs to issue warrants to law enforcement officers).”_(3) In sub-paragraph (5), at the end insert “or under a targeted equipment interference warrant issued under section 101 of the Investigatory Powers Act 2016.”_(4) In sub-paragraph (6)—(a) omit the “and” at the end of paragraph (b);(b) after paragraph (c) insert “; and(d) in relation to protected information obtained under a warrant issued under section 101 of the Investigatory Powers Act 2016, means the person who issued the warrant or, if that person was an appropriate delegate in relation to a law enforcement chief, either that person or the law enforcement chief.”_(5) After sub-paragraph (6) insert—“(6A) In sub-paragraph (6)(d), the references to a law enforcement chief and to an appropriate delegate in relation to a law enforcement chief are to be read in accordance with section 101(5) of the Investigatory Powers Act 2016.””
288: Schedule 10, page 254, line 8, leave out “, or Chapter 3 of Part 6,”
289: Schedule 10, page 255, line 8, leave out from “dismissed)” to end of line 9 and insert “omit “under section 107(2),””
290: Schedule 10, page 255, line 31, at end insert—
“_(1) Section 64 (delegation of Commissioners’ functions) is amended as follows.(2) In the heading for “Commissioners’ functions” substitute “functions of the Investigatory Powers Commissioner for Northern Ireland”.(3) In subsection (1)—(a) omit “or any provision of an Act of the Scottish Parliament”, and(b) for “a relevant Commissioner” substitute “the Investigatory Powers Commissioner for Northern Ireland”.(4) Omit subsection (2).”
291: Schedule 10, page 255, line 36, after “substitute “” insert—
“(bza) the Investigatory Powers Commissioner for Northern Ireland carrying out functions under this Act”
292: Schedule 10, page 258, line 17, at end insert—

“Anti-terrorism, Crime and Security Act 2001

Section 116(3).”

293: Schedule 10, page 260, line 14, leave out “and (3)”
Amendments 282 to 293 agreed.
Clause 247: Commencement, extent and short title
Amendments 294 and 295
Moved by
294: Clause 247, page 199, line 5, leave out “(2) and” and insert “(1A) to”
295: Clause 247, page 199, line 7, at end insert—
“(1A) Sections (civil liability for certain unlawful interceptions) and (interception without lawful authority: awards of costs) come into force on the day following that on which this Act is passed.”
Amendments 294 and 295 agreed.
Amendments 296 to 300
Moved by
296: Clause 247, page 199, line 12, leave out “and (6)” and insert “to (6A)”
297: Clause 247, page 199, line 14, after “revocation” insert “made by this Act”
298: Clause 247, page 199, line 14, after “extent” insert “within the United Kingdom”
299: Clause 247, page 199, line 17, after second “to” insert “the Isle of Man or”
300: Clause 247, page 199, line 18, at end insert—
“(6A) Any power under an Act to extend any provision of that Act by Order in Council to any of the Channel Islands may be exercised so as to extend there (with or without modifications) any amendment or repeal of that provision which is made by or under this Act.”
Amendments 296 to 300 agreed.