Investigatory Powers Bill (Twelfth sitting) Debate

Full Debate: Read Full Debate
Department: Home Office
Committee Debate: 12th sitting: House of Commons
Tuesday 26th April 2016

(8 years ago)

Public Bill Committees
Read Full debate Read Hansard Text Read Debate Ministerial Extracts Amendment Paper: Public Bill Committee Amendments as at 26 April 2016 - (26 Apr 2016)
Question (this day) again proposed, That the clause stand part of the Bill.
Joanna Cherry Portrait Joanna Cherry (Edinburgh South West) (SNP)
- Hansard - -

It is a pleasure to welcome you back to the Chair, Mr Owen. Before the Committee adjourned for lunch, I was addressing clause 154, which is the opening clause of chapter 3 of part 6 of the Bill and deals with bulk equipment interference warrants. I explained that the Scottish National party wishes to see these provisions removed until such a time as the Government have produced what we consider to be an adequate operational case.

Bulk equipment interference is often described colloquially as hacking or bulk hacking. The guide to powers that accompanied the draft Bill made it clear that bulk hacking is a significant step beyond conventional surveillance powers, and remarked that bulk equipment interference is

“used increasingly to mitigate the inability to acquire intelligence through conventional bulk interception and to access data from computers which may never otherwise have been obtainable.”

Labelling mass interception powers as conventional is a bit odd when the Bill avows them for the very first time. The quote I just read out also underlines the fact that the Bill makes a considerable demand for unbridled access to all information. That is particularly worrying in the light of the very broad definition of “equipment” that is found in this part of the Bill. I am sure you will forgive me for skipping forward slightly, Mr Owen, but this does relate to clause 154. Clause 173 defines equipment as

“equipment producing electromagnetic, acoustic or other emissions or any device capable of being used in connection with such equipment”.

That is very open-ended and could even include cars and aircraft, which relates to the analogy with fighter aircraft that I made earlier. We are concerned that the power is open to potential abuse—not necessarily, as I have said before, by the current Government, but possibly by future UK Governments, as well as by other states that will follow our lead in legislation—because there is such loose language.

Following scrutiny of the draft Bill, the Intelligence and Security Committee reported that

“the Committee has not been provided with sufficiently compelling evidence as to why the Agencies require Bulk Equipment Interference warrants”

and

“therefore recommends that Bulk Equipment Interference warrants are removed from the new legislation.”

Before we adjourned this morning, I alluded to the fact that David Anderson QC had expressed concern about bulk equipment interference and said that he had not addressed the necessity and proportionality of such a power.

Despite what the ISC said, the power for bulk equipment interference warrants remains in the Bill. My argument is that that is rather concerning because bulk hacking, as I will call it, is by its very nature indiscriminate, as acknowledged in the draft Bill’s explanatory notes, which state that

“bulk equipment interference is not targeted against particular person(s), organisation(s) or location(s) or against equipment that is being used for particular activities”.

Instead, systems, services and software that have been carefully constructed to provide security are intentionally corrupted by bulk hacking to impose the eyes and ears of the intelligence agencies on every phone call, text message and web click.

To use an analogy from the offline world, granting this power would be equivalent to allowing the secret services to break into an innocent person’s house, bug it and leave broken windows for anyone else to get in, without the person knowing it has happened. The problem with the digital world is that the data can be rich and revealing, as I said this morning on communications data. Most of us put everything online nowadays, and our equipment will therefore be like a filing cabinet, with diaries, calendars, video archives, photo albums, bookshelves, address books and correspondence files.

Digital forced entry entails not only intrusion into highly personal spaces but control over those spaces. The individual who has hacked into a piece of equipment can not only access what is stored on it but add or delete files, send messages from it masquerading as the person to whom it belongs, turn it on or off and covertly activate cameras and microphones. It really is quite extraordinarily intrusive.

We heard about that in evidence on 24 March, when Eric King referred to GCHQ’s Optic Nerve programme, which involved hacking into webcams. Whatever one might think of it, many people use webcams for sex chat online. I am not talking about people who abuse children, which is obviously utterly reprehensible. Many consenting adults send indecent images to one another online using webcams. If they are doing that in the privacy of their own homes, and it is not illegal or hurting a child, I do not see any problem with it.

GCHQ’s Optic Nerve programme broke into individuals’ privacy. Such extraordinary power over the private lives of citizens fundamentally alters the relationship between citizen and state. If we allow this to go ahead without a proper operational case, it could breed distrust in law enforcement, which could have significant repercussions for the rule of law.

The equipment interference and bulk hacking envisaged in clause 154 have security repercussions. I alluded to those last week, so I will not go into detail. However, if we create a weakness in a piece of equipment in order to let the good guys—the security services—in, that weakness exists as a portal for the bad guys, as in criminals and terrorists, to get into the same equipment.

There are serious security concerns about bulk interference. This power is especially excessive, dangerous and potentially destructive. It is one of the most intrusive powers in the Bill, and it jeopardises the privacy of ordinary, innocent people who live in these islands. SNP Members urge fellow members of this Committee and parliamentarians to follow the Intelligence and Security Committee’s advice and remove these bulk equipment interference powers from the Bill until a convincing case has been made for not only their utility but their necessity and proportionality.

Keir Starmer Portrait Keir Starmer (Holborn and St Pancras) (Lab)
- Hansard - - - Excerpts

I, too, welcome you back to the chair, Mr Owen. This bulk power is, like the others, very wide. Equipment interference includes what is commonly known as hacking, which can be done remotely or by attaching monitoring devices to computers or communications equipment. As has been mentioned, equipment is defined very broadly, covering anything that produces electromagnetic or other emissions. The power is therefore very wide.

It is unsurprising that the ISC was initially sceptical and that David Anderson has raised a number of concerns. I will not repeat the points made by the hon. and learned Member for Edinburgh South West, who spoke for the SNP, but I want to draw attention to the relationship between this bulk power and thematic warrants, which was one of the concerns raised by David Anderson.

If one looks at the structure of clause 154(1), skipping for the moment subsections (2) and (3), and lays it alongside clause 88, the similarities in the description of the warrant are apparent. Part 5 deals with equipment interference and targeted warrants; chapter 3 of part 6 deals with bulk equipment interference warrants. Clauses 154 and 88 are very similar in structure and scope—the difference is that clause 90 qualifies clause 88. The difference we are discussing is that we have, in essence, the same power for equipment interference, but we do not have the qualification of the subject matter that is clause 90. We have already discussed clause 90 at some length and, for a targeted power, it is itself extremely wide.

--- Later in debate ---
John Hayes Portrait Mr Hayes
- Hansard - - - Excerpts

I acknowledge that it is certainly true that much rests on the operational case. In all our sermocinations, it has been clear to me that the hon. and learned Gentleman has identified that as crucial in advancing his argument that we need to provide still more transparency. He has done so in a reasonable way, because he acknowledges that there is a line to be drawn between the explanation of that case and revealing what cannot reasonably be said publicly because it would compromise the work of the agencies. I acknowledge that.

Of course, what the hon. and learned Gentleman did not say, although he knows it—perhaps he felt that there was no need to say it—is that the warrant must be deemed to be necessary for one of the core reasons: national security, serious crime or, where it is linked to national security, economic wellbeing. Access to the data must be deemed to be necessary on the grounds of the operational purposes. There is a test at each stage of the process and, in my judgment, that test is robust, but I again acknowledge that there may be a virtue in being clearer about the operational case. I was making a point about existing power—that power is currently available through the Intelligence Services Act 1994. Therefore, it is not new, but the safeguards are. Drawing those together in a single place, and therefore allowing the more straightforward exploration of both their purpose and their effect, is certainly new.

Above and beyond that, the oversight that is given additional strength in the later part of the Bill is there to ensure that all that is done meets the test that we have set, in terms of protecting private interests and so on. I acknowledge the argument about the operational case being a powerful one, but I think the structure of what we have put together stands scrutiny.

There is another argument that has not been used much in the Committee. In a sense, I hesitate to explore it now because in doing so I may be opening a hornets’ nest, but I am not a timid Minister, so why would I not want to face the stings that I might unleash? It is necessary to make the language future-proof, as far as one reasonably can. One of the criticisms of what we are doing—bringing the powers together in a single Bill, creating safeguards of the type we are building, trying to be as comprehensive as we can in this legislation—is that, because of the rapidly changing character of technology and the resultant effect that that has on both the threat and our ability to counter it, this legislation may be relatively short-lived.

If we look, albeit with the benefit of hindsight, at what has happened previously, we see that the legislation that the Bill replaces has, for the most part, been iterative—it has been a response to that dynamism. The language in the Bill is designed to be as carefully constructed as possible to allow the Bill to stand the test of time. Central to that is the advent of the double-lock mechanism, which should ensure that the powers are not misused by a future Government. That relates to something the hon. and learned Member for Edinburgh South West said in a previous sitting of the Committee. I think she argued that I cannot bind the future, and I said, with some reluctance, that that was true.

Joanna Cherry Portrait Joanna Cherry
- Hansard - -

Jo Cavan from IOCCO—the Interception of Communications Commissioner’s Office—told us on 24 March that the double lock and warrantry applies to only 2% of authorisations under the Bill. Does the Minister agree that he should be very cautious praying in aid the double lock as a safeguard when it applies only to such a small percentage of authorisations?

John Hayes Portrait Mr Hayes
- Hansard - - - Excerpts

Yes, but the hon. and learned Lady knows well that the double lock applies to some of the most contentious parts of the process and, at the end of the day, is the involvement of the judiciary in a process that has been exercised at the sole discretion of the Executive up until now. The significance of that marriage between Executive authority and judicial involvement is considerable. All but the most mean-spirited of critics would want to warmly acknowledge that, and I see the warmth emanating from the hon. and learned Lady as she rises.

Joanna Cherry Portrait Joanna Cherry
- Hansard - -

I am not going to be mean-spirited. I acknowledge that the Government have made a significant step in the right direction by introducing judges into the warrantry process. I have my reservations about the degree of the introduction—I would like to see full-blown judicial warrantry—but my point is about how far that double-lock process can be seen as a safeguard when it applies to only 2% of the authorisations under the Bill. My point is not that it is not a safeguard but that it applies to only 2% of authorisations.

John Hayes Portrait Mr Hayes
- Hansard - - - Excerpts

The double lock applies to all the most intrusive powers. We can have a debate about whether—I do not want to put words into the hon. and learned Lady’s mouth—she wanted to rob the Executive, rob the people’s representatives, of all their authority. She may have felt that it was unnecessary for those accountable to the people—the personification, as I hope I am, of the people’s will—to have any involvement in these matters, but I do not take that view. I believe in representative government and I think we have got absolutely right the marriage between Parliament and the judiciary—but we stray, I sense, from the precise detail of this part of the Bill.

My judgment is that we have reached the place that we need to get to in order to get the marriage between safeguard and effectiveness right, with the caveat that I have already introduced on the operational case, and in the knowledge that a bulk equipment interference warrant can be used to authorise the selection and examination of material obtained by the warrant and does not require a separate examination warrant and permits the disclosure of material acquired in the manner described in the warrant. I think that this is an important additional power and on that basis I hope that the Committee will agree to this part of the Bill.

Question put, That the clause stand part of the Bill.

--- Later in debate ---
Question proposed, That the clause stand part of the Bill.
Joanna Cherry Portrait Joanna Cherry
- Hansard - -

Part 7 of the Bill deals with bulk personal dataset warrants. In common with our position on other bulk powers in the Bill, the Scottish National party wishes the powers in part 7 to be removed from the Bill until such time as a convincing operational case has been made by the Government; that should be by way of an independent review of the necessity and proportionality of these powers.

The power to acquire bulk personal datasets does not currently exist. These are essentially databases held by either the private or the public sector. They are defined in the clause as,

“a set of information that includes personal data relating to a number of individuals”

where

“the nature of the set is such that the majority of the individuals are not, and are unlikely to become, of interest to the intelligence service”.

This is where our concern lies. The powers in this part of the Bill will afford the opportunity and the power to recover huge amounts of personal information, largely relating to private citizens who are innocent and not under any suspicion whatsoever. Bulk personal datasets will cover both manual and electronic records. So, for example, they will cover medical records. The definition given of personal data is a broad one. It,

“has the same meaning as in the Data Protection Act 1998 except that it also includes data relating to a deceased individual”.

The acquisition, retention and examination of these databases will be governed by a warrant system similar to the one we have just considered for bulk interception and bulk hacking. The warrants will be issued under the double-lock system. The Committee has had detailed submissions on the SNP’s position on double-lock systems so I will not take time discussing that unnecessarily.

Part 7 talks about class warrants and specific bulk warrants. Class warrants concern applications for descriptions of personal data—for example, health data or travel data. Under the terms of the Bill that is the default type of bulk personal dataset warrant. Both the Joint Committee and the Intelligence and Security Committee recommended that class bulk personal datasets be removed from the Bill, yet they remain. The Intelligence and Security Committee reported that the acquisition, retention and examination of any bulk personal dataset is sufficiently intrusive that it should require a specific warrant, and I would say there is considerable force in that argument. It is instructive to look at what the Chair of the Intelligence and Security Committee said about part 7 and bulk personal datasets in his speech on Second Reading. It is sometimes represented as a full retreat from the position of the Intelligence and Security Committee, but that would be a misunderstanding. The right hon. and learned Member for Beaconsfield (Mr Grieve) said:

“The third issue is that the Committee expressed concern about the process for authorising the obtaining of bulk personal datasets. It is undoubtedly necessary and proportionate that agencies should have the power to obtain them”—

That is his view, not mine—

“because they can be vital to their work in helping to identify subjects of interest, but they largely contain private information on large numbers of people of no relevant or legitimate interest to the agencies at all”.

There was an intervention at that stage, but he went on to say:

“Intrusiveness needs to be fully considered as part of the authorisation process, which was why the Committee recommended that that could be done far better if class-based authorisations were removed from the Bill and a requirement made that Ministers should authorise the obtaining and periodic retention of each dataset”.—[Official Report, 15 March 2016; Vol. 607, c. 838-9.]

I have no doubt that the shadow Minister will have more to say about this aspect, but I draw attention to it at this stage because while my party’s opposition is based on the fact that we would like to see this part of the Bill removed completely until a convincing operational case has been made, there are others who, although content with aspects of it, have expressed severe reservations about the class warrants.

--- Later in debate ---
Keir Starmer Portrait Keir Starmer
- Hansard - - - Excerpts

I am grateful for that intervention. There is a particular sensitivity about health and mental health records. The very fact of their being retained, examined and filtered—because that is what will happen—is of huge concern to many people. That is why the amendments suggest that they be either excluded or subject to a higher test to prove that it is really necessary. Although it was not formal evidence, the Committee had a briefing session with the security and intelligence services where the question arose whether they do in fact access health records. In those exchanges, the answer was, “No we don’t, at the moment.” When I asked why, in those circumstances, it was necessary to have this power, the answer was: “Because we can’t rule out that at some future date it might be necessary to get these records, in circumstances that we cannot foresee at the moment—so we would not want to restrict the ability to get them.”

That was an honest answer about the way that these records are dealt with. In formal evidence, the answer was that the internal guidance does subject accessing mental health records to a higher threshold. In a sense, the agencies have thought this through for themselves. They have recognised the extra sensitivity of such records and have their own internal processes to make sure that they are applying a higher test. That is a good approach.

Joanna Cherry Portrait Joanna Cherry
- Hansard - -

I remember the evidence that the shadow Minister alluded to. Does he agree with me that, notwithstanding the fact that agencies are telling us that they take steps to be more sensitive in relation to mental health data, the very fact that mental health data are going to be scooped up and available to others may act as a disincentive to certain members of the public to seek assistance with their mental health problems?

Keir Starmer Portrait Keir Starmer
- Hansard - - - Excerpts

I am grateful for that intervention. I am concerned about that issue; that is why we need to give particular care and attention to the operation of these bulk powers in relation to sensitive personal data—and mental health data are among the most sensitive. In a sense, the second set of modifications that we will come to later is aimed at putting in the Bill what is in fact current practice. Therefore it would not inhibit what the security and intelligence services are doing, but would make it clear to citizens that a safeguard is in place and reduce their anxiety about the extent of the use of these bulk powers.

I will say more about that when I get to the amendments, but they are issues that go to the breadth of the bulk personal datasets that we are now dealing with.

--- Later in debate ---
John Hayes Portrait Mr Hayes
- Hansard - - - Excerpts

The amendments relate to the question of whether warrants under this part of the Bill should ever allow the retention or examination of bulk personal datasets relating to various forms of medical information. The hon. and learned Gentleman qualified that to some degree by saying that he could see how there might be occasions on which health data were relevant to an investigation, but he rightly asked whether the safeguards were adequate and whether constraints on storage and use of that kind of information were in place.

Let us look first at the safeguards that are already contained in the Bill. These safeguards already ensure that no bulk personal datasets would be retained or examined unless it was appropriate to do so. Specifically, under the Bill, the security and intelligence agencies may retain and examine a bulk personal dataset only for the statutory purposes outlined in the Bill. Each warrant is subject to the double lock, and so must be approved by both a Secretary of State and a judicial commissioner. Each retention of a bulk personal dataset by the intelligence agencies is considered individually based on a strict consideration of necessity and proportionality. The Investigatory Powers Commissioner will also oversee the acquisition, retention, use or disclosure of bulk personal datasets by the agencies. The draft code of practice, as the hon. and learned Gentleman has said, makes clear that, when considering whether to retain and examine bulk personal datasets, the agencies will assess the degree or extent of the intrusiveness which retaining and examining the datasets would involve—that is to say, the degree or extent of interference with individuals’ right to privacy.

The draft code says more than that, though. It also makes clear that when considering whether to apply for a warrant in this class, agencies must consider factors such as whether the nature or the provenance of the dataset raises particularly novel or contentious issues, or whether it contains a significant component of intrusive data—I mentioned this in an earlier discussion. An agency would need to apply for a specific bulk personal dataset warrant if it sought to retain such a dataset comprised of medical records. None the less, notwithstanding those safeguards, which I felt it was important to outline, I can see why this matter warrants careful consideration. Before I go into that consideration, however, I want to say the following. I am prepared in this specific instance to confirm that the security and intelligence agencies do not hold a bulk personal dataset of medical records. Furthermore, I cannot currently conceive of a situation where, for example, obtaining all NHS records would be either necessary or proportionate.

That is where my note so far prepared ends, but I want to go further. Before I do, in order to build anticipation and excitement, I give way to the hon. and learned Lady.

Joanna Cherry Portrait Joanna Cherry
- Hansard - -

The Minister may be about to answer this question, but I am very interested, as I am sure all hon. members of the Committee and people outwith this room will be very interested, in what he has just said—that the security agencies do not currently hold a bulk personal dataset in relation to medical information. As the Bill stands, unamended, does he not agree that there is nothing in it to prevent them acquiring such a bulk personal dataset in future, if they were able to make a case for it?

John Hayes Portrait Mr Hayes
- Hansard - - - Excerpts

I may fall foul of my officials, which I would never choose or seek to do, except where I felt that it was right in the national interest, with the benefit of the wisdom of the Committee—enhanced, as I have said it is, with the addition of my right hon. Friend the Member for Chelmsford—and where I feel that the public expect us to go further. The hon. and learned Lady is right that we need to go further. Let me rehearse some of the ways in which we might do that—I will commit to none today, but I offer them to the Committee for further thought.

--- Later in debate ---
Keir Starmer Portrait Keir Starmer
- Hansard - - - Excerpts

That may well be. I listened carefully to the answer that was given—

Joanna Cherry Portrait Joanna Cherry
- Hansard - -

On the example that the Solicitor General has just given, does the hon. and learned Gentleman agree that such information could be obtained with a far more targeted warrant?

Keir Starmer Portrait Keir Starmer
- Hansard - - - Excerpts

It may well be that it could be dealt with in a more targeted way. As a general proposition, where targeted powers can be used they should be used. That is a theme that goes through the Bill and the code.