National Security Bill (First sitting) Debate

Full Debate: Read Full Debate
Department: Home Office
Scott Mann Portrait Scott Mann
- Hansard - - - Excerpts

Q The Bill allows for oversight of STPIMs. In your view, what is the strength of the independent function of your office?

Jonathan Hall: First, it is being able to go to the room where it happens—the meetings where these decisions are taken. When I review TPIMs, I have a completely free hand. I am able to interrogate officials and able to see whatever I want. That is really important. I am not just looking at judgments in courts, or just reading documents; I am actually there able to interrogate, test and challenge. That is what I do. Also, I think it is important that Parliament and the public have a sense of what is going on. Regrettably, because legal aid has not been made available in all cases for TPIMs, there are now fewer court cases, so general information about how this important but serious power is being exercised is relatively cut off. The independent reviewer can provide a lot of transparency about how it is operating.

Holly Lynch Portrait Holly Lynch (Halifax) (Lab)
- Hansard - -

Q Thank you ever so much for your time this morning. May I take you to clause 49, which refers to an independent reviewer carrying out a review of part 2 of the Bill? If it is appropriate for you to say so, have you been approached by the Government to consider how appropriate it would be for your office to take on that review of part 2? What is your assessment of how appropriate that would be compared with setting up a new independent reviewer for state threats legislation?

Jonathan Hall: It has been tentatively mentioned. Obviously, because the legislation has not been passed, I have not been formally asked whether I would do it, but it has been tentatively asked. My answer is that I think it actually is quite a good fit for the reviewer’s job, and I think it probably is right that the person who does the independent review of terrorism legislation should also do the state threats legislation. The reason is that this new legislation is really modelled on terrorism legislation. In crude terms, the concept of the foreign power condition sits in place of the purposes or acts of terrorism, and then there is the same framework in terms of very strong arrest power, detention up to 14 days, strong powers of cordons and search and investigations, and, of course, the PIMs. There are so many learning points between the two regimes that it does make sense.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q In your experience, do you think that that level of review should apply to part 1 as well as part 2 of the Bill?

Jonathan Hall: Having thought about this, I do. I do not think that decisions on prosecution are going to be made other than in really strong and good cases. Where I think one needs particular care is with all the strong powers that come before prosecution, for example with arrest and detention, as well as the PIMs, which are based not on beyond reasonable doubt but on the balance of probabilities.

We have to acknowledge that we live in quite a polarised world at the moment and that citizens of individual countries, such as Russia and China, and those who associate with them, are bound to fall under suspicion. There is a parallel here, in the sense that people used to argue—I think wrongly, but they did argue —that counter-terrorism laws in England and Wales were anti-Muslim, and I think having a reviewer is one way of offering reassurance that that is not the case.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q Thank you very much. Following the thread of the Minister’s questions on the state threat PIMs and having read your most recent review specifically on TPIMs, may I ask how effective you envisage the state threat PIMs to be, given your understanding of the implementation of TPIMs?

Jonathan Hall: I expect that they will be effective because the agencies and the Home Secretary will only think about imposing one when they think it is going to work. There are many more subjects of interest who have terrorist intents than are currently on TPIMs, and I expect that the same will be true in relation to people who are foreign threats. There will be many more people who are identified as foreign threats who will actually go under PIMs. At the moment I think only two people are under TPIMs, so it is very few. I would have thought that the agencies and the Home Secretary will think very carefully before imposing them.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q I noted your assessment of the introduction of polygraphs. Have you been able to consider their use in any ongoing cases?

Jonathan Hall: What I have been told is that polygraphs have not been used for TPIMs, as far as I am aware, but they have been used for released terrorist offenders and some disclosures have been made. Everyone always thought that the real utility of polygraphs and the clear reason for their use is the disclosures that people make when undergoing the process. I gather that some admissions have been made that have been valuable and have led to a recall. I do not have a huge amount of data, but they seem to have had some success in the context of terrorism offences.

Damian Hinds Portrait Damian Hinds (East Hampshire) (Con)
- Hansard - - - Excerpts

Q Mr Hall, thank you for being with us this morning. Coming back to STPIMs, you spoke with the shadow Minister a little bit about effectiveness but I want to ask for your thoughts about necessity. From your experience with the counter-terrorism regime, how do these sorts of devices get deployed and why? On transparency, I know there are sometimes concerns that these things may be used in large numbers. Will you say a word about how many TPIMs have typically been in operation at any one time?

Jonathan Hall: I cannot remember the total number of TPIMs. I think it is around 30, but I may be misremembering and that may also include—

--- Later in debate ---
Stewart Hosie Portrait Stewart Hosie
- Hansard - - - Excerpts

Q On the point about beyond reasonable doubt, one of the conditions in clause 33 to deploy an STPIM is that the Secretary of State would reasonably believe that the individual is or has been involved in some activity. If we remove “beyond reasonable doubt”, is “reasonably believes” sufficient, or should it be on the balance of probability?

Jonathan Hall: My view is that it is the same thing.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q You said in response to my hon. Friend the Member for Birmingham, Yardley that you had a point to make about part 1. I want to give you the opportunity to make that point.

Jonathan Hall: I am slightly uncertain and concerned about the scope of clause 3(2), the foreign intelligence services offence. On the face of it, an offence could be committed inadvertently, and it does appear to cover quite a lot of lawful conduct. The example that I have been debating with officials is the example of someone who sells miniature cameras, which is undoubtedly conduct of a kind that could assist a foreign intelligence service. My concern with clause 3(2) is that it does not seem to have a sufficient mental element, either that the individual who commits the offence is deliberately acting prejudicially to the UK interest, or knows or ought to suspect that there is some foreign intelligence service involvement, so I have a concern about that particular clause.

Sally-Ann Hart Portrait Sally-Ann Hart (Hastings and Rye) (Con)
- Hansard - - - Excerpts

Q You mentioned that restrictions to legal aid could be counterproductive and could harm rehabilitation efforts. Can you please expand on that?

Jonathan Hall: Not all terrorists are cold, calculating, ruthless killers who will go and commit terrorist acts whatever their circumstances. They may exist, but there are also quite chaotic terrorist-risk offenders. I have certainly come across cases where the terrorist risk from the individual—the chance of their stabbing someone, for example—goes up if they are not taking their medication or if they are homeless.

My concern about the legal aid is that it will make it harder, for example, for a terrorist offender, maybe 10 years after they have been released and who is facing eviction, to get legal aid. That means that you might have less good decisions made and a sense of injustice or grievance on behalf of the terrorist offender, who will perhaps say to themselves, “Why can’t I get legal aid when everyone else in my situation can?” My real concern is people becoming homeless or falling into debt when they might otherwise be able to get legal assistance.

--- Later in debate ---
Scott Mann Portrait Scott Mann
- Hansard - - - Excerpts

Q Just one final question for this witness, if I may. We have just had evidence from Jonathan Hall QC, who reflected that he did not think there was an operational need for part 3 of the Bill. Do you agree that it is legitimate for the Government to disrupt terrorist financing?

Sir Alex Younger: Yes.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q Thank you both very much for your time. To echo the Minister’s sentiments, we are grateful for your service to the country as well. Sir Alex, the measures in the Bill, particularly in clause 3 and some of the others on assisting a foreign intelligence service, do not make any attempt to distinguish between countries that are our allies or that we have friendly relations with—you talked about the Five Eyes partners, for example—and those countries that would seek to undermine us or are hostile states. Do you think it should attempt to distinguish between the two?

Sir Alex Younger: First of all, I think it is a good idea, fundamentally, to require people to say if they are acting on behalf of a foreign power. I am supportive of that because I know how difficult it makes it for people intent on conducting operations against us to operate, and makes it much easier to prove. I am therefore instinctively supportive of that, and of a register, and I think that we should get on with that. I have talked to the Government about that; they are understandably cautious, given all the unintended consequences attached to it, and the fact that our adversaries use those techniques in a way that lacks good faith and is malicious. However, fundamentally, I am supportive of it.

I have to be honest; I am more ambivalent about the idea of distinguishing between nations. My view of legislation generally, but particularly when it comes to technology, is that it is a mistake to write things to the current circumstances. It is much better to write things to the principles that you are seeking to employ. I am not a lawyer or a member of the Government, but my recommendation would be that we go for a principles-based approach in so far as we can.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q Thank you very much. May I ask you both about clause 23, which grants an extension of powers to the security services? It appears from speaking to other colleagues, particularly Members on the Intelligence and Security Committee, that the current legislation—the role of the Investigatory Powers Commissioner, the Fulford principles and the exemptions in the Serious Crime Act 2007—all works together quite well. Do you think that the extension in clause 23 is necessary and that it has the appropriate checks and balances that you would expect with such an extension of powers?

Sir Alex Younger: You are referring to the amendment to the Serious Crime Act?

Holly Lynch Portrait Holly Lynch
- Hansard - -

That is right, yes.

Sir Alex Younger: I strongly believe that that is necessary. I am conscious of the concerns that you will have, and even the contentious nature of the assertion, so if you will forgive me, I briefly have to tell you why.

First, alongside our ability to uphold our values and not be terrorists, the other reason why we have been successful in stopping bombs going off has been international partnership. That is because no one state or intelligence service really ever has the full facts. They have to work together and combine their information to get the intelligence that is required, proactively, to disrupt terrorist events. That was true in the analogue world; it is really true in the digital world. It is the thing that works and keeps us safe.

That involves an unavoidable risk. That risk, through all the safeguards that you will be familiar with—but which I am happy to talk about—is managed down to the very lowest level possible. However, ultimately, we are dealing with sovereign actors—other states who we do not control—and ultimately, when we are exchanging large bulk datasets, notwithstanding all the scrutiny and risk management, there is a possibility that there will be data in that dataset whose significance we do not understand until it is compared with another dataset that we do not have. That is an unavoidable risk.

An issue that I think you have to consider is, who should be carrying that risk? My view is that there must be accountability, but where an SIS officer or any other UK intelligence community officer is acting in good faith, within their instructions, as authorised by Ministers, on behalf of you and the public, it should not be them carrying the risk. It is more appropriately carried by the Government more broadly. I feel that, as you can tell from my body language, very strongly, as a leader.

It was unavoidable that we sent our young men and women into harm’s way when it came to physical risk. For instance, I served in Afghanistan. Our people were asked to go out on to the streets day in, day out. It involved physical risk that we mitigated down to the lowest level we could possibly manage, but it was part of the deal.

These risks are avoidable. Through this legislation and other measures, we can make sure that these risks are attached to the appropriate person or people or entity. I am much less comfortable as a leader about the idea that we therefore ask individual men and women in the UK intelligence community to suck it up. I do not think that is right.

Professor Sir David Omand: I very strongly agree with what Alex Younger has just said. I know from my own experience of GCHQ that information-sharing with our close allies and indeed more broadly is essential, and I think it is morally wrong to place that burden on the individual member of staff, who may be quite junior, who is simply following the policies and the instructions that they have had. In the end, the Government Ministers must account if something unexpectedly does go awry.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q Would it not be fair to say that no cases have yet been brought against anybody acting in that way on behalf of the security services, and would that not be because the protections that are in place in law already give them the discretion to do some of the activities that we are talking about?

Professor Sir David Omand: My counter-argument would be that this is actually a question of principle—how Government works, particularly in relation to people whom we as a nation are asking to take some significant risks on our behalf. This is an additional risk. You may say that it is theoretical; they may not feel it that way, and I think that we owe it to them to protect them.

Sir Alex Younger: It does not feel theoretical. You know, you have to examine the motives of the staff of the UK IC, who are ordinary members of the public, just like you and me. They are not doing this for personal gain.

There is a very practical point that I think the Committee must consider, which is the incentive. Over time, what is going to motivate admittedly a very mission-orientated community if they see personal legal jeopardy in an area where there is an unavoidable level of ambiguity? I think that will inhibit people from the exercise of sharing. I hope I have been really clear that it is the exercise of sharing that allows us, as a team, to deal with the threats that we face. The risk may be theoretical, but it does not feel like that when you are stood in front of the person or the computer.

--- Later in debate ---
Ben Everitt Portrait Ben Everitt
- Hansard - - - Excerpts

I think everybody here would agree that a team has to play by the same rules.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q The Bill creates a new offence of preparatory conduct in part 1. To what extent do you think that was an omission in previous legislation? I have heard from former members of the security services that they feel quite strongly that this is welcome, but the definition of preparatory conduct is drawn quite broadly. I wonder if you could comment a little on that.

Professor Sir David Omand: I was pleased to see the power in the Bill because, particularly in the digital age, you can take the offensive and you can prepare, but you may not have got to the stage of actually pressing the button. If you can demonstrate that a foreign state was engaged with help from inside the country in some serious espionage or sabotage activity, it seems to me that the very preparation is something that the prosecutors ought to be able to bring forward. In the terrorism example, the cases would be slightly different, but the offence of acts preparatory to terrorism has been extremely helpful to the prosecution authorities for good reason.

Sir Alex Younger: The bottom line is that we have to get in front of this stuff. Just speaking as a counter-terrorist practitioner, that is the additional discipline. It is not like solving the crime. We need to solve it before it has happened, and that raises a set of ethical and legal dilemmas where it is important to be striking the right balance, so I really welcome the proper treatment that we see of that in the Bill.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q Sir David, following up on your points about the digitisation of information, Microsoft told me that a great deal of online state activity is around theft and access to data policy development, and think-tanks increasingly becoming a focus for attempts to have a look at and steal that type of work. Are those some of the things that you are seeing in terms of hostile state activity online, and do you think that the clauses in the Bill go far enough in protecting that type of policy work and data?

Professor Sir David Omand: Probably not, but on the other hand you have to balance that against the risk that legislation would inadvertently catch, for example, academic activity in think-tanks. Alex Younger has referred to transparency and covertness. Where a foreign power is taking covert acts and dirty tricks in order to access our institutions, think-tanks and universities, that would be criminalised by the Bill.

Where a member of the embassy of any foreign state represented here attends, quite openly, think-tank meetings and so on—everybody knows who they are and they know they are on the guest list—that does not pose a direct harm. It would be a mistake to start to try to confuse those categories too much. However, what it comes down to is that this is a probabilistic business; this is doing things that increase the chances that we all protect the citizens and the interests of the state. This Bill alone is not going to prevent states from attempting harm against us, and it probably will not catch all those harms either, but it is a good start.

Scott Mann Portrait Scott Mann
- Hansard - - - Excerpts

Q I did not get a chance to ask you a question at the start of the session, Sir David, so I feel I am slightly obligated to ask you a question at the end. In terms of the need for reform, some of the legislation that preceded this is very old. You have mentioned some of this already, but could you expand a little on how changing the legislation will address some of the current state threats? It is worth having that on the record again.

Professor Sir David Omand: Well, there is a lot in the Bill. The move away from having to identify states as enemies, for example. States have interests of their own and they will promote those interests. If they are doing so openly through diplomatic and academic means, that is one thing, but if they are doing it, as some are, covertly, then although you might not categorise them as enemies, they are none the less conducting themselves in a way that causes harm. That is one of the examples where I think the Bill takes a more up-to-date view. It is not just nations with which we are at war or potentially could be at war.

None Portrait The Chair
- Hansard -

We have a few more minutes. Does anyone else have any further questions?

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q I will pick up on a thread from the previous question, if that is okay. We talked about some of the physical engagement around think-tanks, universities and academia. Microsoft has done some work that shows the prevalence of targeting online, with Government, NGOs and think-tanks seen as emerging targets for hostile state activity. For understandable reasons, some of the limitations of the Bill would make it quite difficult to pursue and prosecute when theft takes place entirely online by somebody who is overseas. With that in mind, do you think there is anything further that we could do in legislation? Is what we have in the Bill enough to disincentivise, stop, disrupt and criminalise online theft of policy development and data, as opposed to trade secrets, which the Bill is quite explicit about in clause 2?

Professor Sir David Omand: My reading of the Bill is that trade secrets and theft of intellectual property are well covered. You probably also have to have in mind the Online Safety Bill, which has a whole different set of considerations but which is, again, intended to reduce the amount of harmful content that citizens are exposed to. It is quite easy to envisage cases where a foreign state is putting material online covertly and pretending to be someone else.

In the 2016 US presidential election, there were a number of egregious examples of that—for example, in order to stir up conflict within society by exaggerating an existing split in society, be it over race, inequality or any other issue. That is the nature of the threat that we currently face in all democracies. You cannot solve it all by creating criminal offences where a link cannot be established back to the foreign powers condition, but you may be able—by working with the companies, which will exercise their own terms and conditions—to get more of this stuff removed. You need that as well as the powers in the Bill.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q Further to that, we intend to table an amendment that would put a requirement on the Government to commission an independent annual review of the prevalence of disinformation pushed online by hostile states—looking at it in its entirety, but also its specific impact on UK elections—to try to deliver the transparency piece alongside some of the new offences. Is that the sort of thing that you think would be helpful?

Professor Sir David Omand: Yes, and another important consideration is public education. I have argued before that we should start teaching critical thinking in schools and teaching kids how to be safe online when they come across deliberate and malicious misrepresentation.

None Portrait The Chair
- Hansard -

We have one minute left.

--- Later in debate ---
None Portrait The Chair
- Hansard -

I will bring you back in later. I call the shadow Minister.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q Thank you, Mr McGuinness, for your service and for keeping us and our communities safe. The Bill creates a new offence of sabotage. Is that something that you felt had been missing from previous legislation?

Paddy McGuinness: It was quite extraordinary that we had a range of different possible offences that relate to the kinds of things that a hostile state would commit in order to sabotage, for instance, critical national infrastructure—a target entity in the UK—and that it was not coherent. What I would put in front of the Committee when you are thinking about this is: the most common thing that I find now in corporate life, but also in Government or in policy space—and in Parliament where I do a bit of advisory work—is stovepiping.

You say “cyber” or “cyber-security” and people immediately think of cyber-security issues, or you say “insider issues” and they say they will deal with that, or they think of physical attacks or physical disruption and they deal with that. They do not understand that this is a playbook, which, if you are a Russian commander, you put together, and you have a choice of what you do.

So you go in an escalation route from, “Can we access this remotely through the internet? Is there another way of accessing it electronically? Do we have a spy within it? Can I send someone from the embassy to go and get close to it and do something to it? Shall I send in Spetsnaz covertly—you know, go to Salisbury and poison some people? Or shall I go to war?” You have that whole range of things and they all relate to each other. And all of them relate to sabotage. We need to approach this by understanding what the adversary is doing and not having little bits of powers in some criminal damage legislation, or in the Computer Misuse Act. That will not do because that is not the purpose of the opponent.

I have described it for disruption and destruction in a sense of warfare, and I have used a kind of Gerasimov Russian example. It is very interesting when one looks at the way in which intellectual property has been stolen. There are a few cases where we see the end-to-end Chinese state effort, where you begin with remote cyber-attacks in close proximity—the case I am thinking of was in the United States—and an inability to get in by those means. Eventually, the subversion and recruitment of a member of staff operating in Switzerland provided them with the intellectual property, which they were not able to access using the cyber techniques. All the way through they were intervening in the networks and activities of that company.

One final thought on this: one of the difficulties with this grey space activity, as Sir Alex described it, is that if you have a presence for an intelligence purpose, you can flick it over and turn it into a disruptive or destructive attack. That is where that preparatory bit is quite important, too: understanding that the simple fact of engaging and being present quickly takes you towards sabotage. I think these are absolutely vital powers.

Holly Lynch Portrait Holly Lynch
- Hansard - -

Q That is incredibly helpful and interesting; thank you very much for that insight. Can I take you from that to a slightly different issue? You heard the previous conversation with Sir Alex and Sir David about hostile state interference and making sure we have protected our democratic processes from that possible risk. How satisfied are you that UK elections are secure from foreign interference?

Paddy McGuinness: The Clerks may have told you, or it may be in my bio, I do not know, but after I left Government I was asked by the Oxford Internet Institute to join them in a thing called the Oxford Technology and Elections Committee, prior to the 2019 elections—with an urgency because of what had happened in the United States in 2016—to come up with some practical suggestions for what we might do to protect our elections. I refer you to it: it is a great bit of work, and the Oxford Internet Institute has gone on doing that work. I am no longer as involved, but there is good work there.

The way I would frame it is this: it is a bit like what I said about the powers that we have. Because we do not occupy the space, others step into it, so because there are not strong controls and real clarity about what is happening around our electoral processes, people mess about in that space. It is really important—this rather echoes something Sir Alex said—that we do not take messing about in the electoral space as being the same thing as delegitimising an election. We have a strong tradition in the United Kingdom of being able to make judgments about whether the way in which candidates have behaved or the way in which money has been spent in a given constituency makes an election void, and you possibly have to run it again. We are used to making that judgment.

One of the risks that I note in this space—again, this is a point Sir Alex made very nicely about Vladimir Putin’s intent, which is to have us off balance—is that if the Russians do hack into a political party’s servers and mess about within them, and maybe mess with the data or interfere, or if they play games with a technology platform that people rely on for information and put out information, and we decide as a result that we cannot trust a referendum or an election, they succeed. That is success for them, so I think what really matters in this space is the ability to measure the impact that state activity has on the democratic process we are looking at, and—as Sir Alex said—that there is bright transparency so we know who is doing what.

None Portrait The Chair
- Hansard -

I bring in Sally-Ann Hart.