Data Breach: ARAP Applicants in Afghanistan Debate

Full Debate: Read Full Debate
Department: Ministry of Defence

Data Breach: ARAP Applicants in Afghanistan

Stewart Malcolm McDonald Excerpts
Tuesday 21st September 2021

(2 years, 7 months ago)

Commons Chamber
Read Full debate Read Hansard Text Watch Debate Read Debate Ministerial Extracts

Urgent Questions are proposed each morning by backbench MPs, and up to two may be selected each day by the Speaker. Chosen Urgent Questions are announced 30 minutes before Parliament sits each day.

Each Urgent Question requires a Government Minister to give a response on the debate topic.

This information is provided by Parallel Parliament and does not comprise part of the offical record

Ben Wallace Portrait Mr Wallace
- View Speech - Hansard - - - Excerpts

My right hon. Friend will know that I cannot talk about the broader means, but all means will be explored.

Stewart Malcolm McDonald Portrait Stewart Malcolm McDonald (Glasgow South) (SNP)
- Hansard - -

I thank the Secretary of State for his apology. I do not doubt the sincerity of it, and I do not doubt for a second the anger that he will have felt when he got the news of this unacceptable and quite dangerous leak yesterday. However, I have a few questions to follow on from those asked by the shadow Secretary of State, the right hon. Member for Wentworth and Dearne (John Healey), and the Chair of the Select Committee on Defence, the right hon. Member for Bournemouth East (Mr Ellwood).

Can the Secretary of State confirm whether the Taliban have the capability to monitor these people’s emails? I do not want to know if they are monitoring them—I suspect that he would not tell the House even if he did know—but do they have the capability to do so? How long will the investigation take? Who will carry out the investigation? Is the person who has been suspended an employee of the Ministry of Defence or of the Foreign, Commonwealth and Development Office?

Will the Secretary of State outline in a bit more detail, if he is able to, the additional resources that he intends to commit to ensure that people are not exposed to any more danger than they already are as a result of the leak? I understand entirely the point that he makes about using mass email as a communications method, but who signed off on that as an okay way to make that communication?

The shadow Secretary of State is right that when these breaches happen, we get these apologies and then there tends to be silence, so more broadly, what is being done to arrest this worrying trend of data leaks from the Secretary of State’s Department? Is he going to order a broader investigation? I think the House would welcome that.

Ben Wallace Portrait Mr Wallace
- View Speech - Hansard - - - Excerpts

I am grateful to the hon. Member for his series of questions. First, the investigation will be carried out by Admiral Sir Ben Key, the commander of joint operations at PJHQ—permanent joint headquarters—who also led the planning and the evacuation from Kabul.

On data leaks, the hon. Member is right that these are a concern. The previous leak obviously involved a senior official who deliberately broke the regulation, in so far as he took something out the Department. If the regulation had been followed, that would not have been the case. However, although I cannot say too much, I have instigated changes to improve information security within the Department, and I am happy to brief the hon. Member on that.

The “Manual of Protective Security”, the modern rules that govern information security, is, I believe, fit for purpose; it is really the training and the adherence to it that must be improved. I am graduate of something called the classified documents handling course from the early ’90s—I think I am the only saddo who actually knows what type of lock should be on what type of cabinet that links to different types of security classifications. Nevertheless, information security is not something that western Governments are good at, which is why our adversaries seem to be. We have to improve it, and we have to stand by it.

The Taliban, or obviously any Government that control a country, have control of the telephone network. I cannot say too much about what they can and cannot do; suffice it to say that the method we used to communicate with those people is a way of minimising that risk. One of the reasons we involve emails rather than telephone calls is to try to do that, which is important.

On resource, right from the beginning of this process, way back in August, or in July, I was very clear with my senior military commanders and civil servants that they would have whatever resource they needed to process emails and carry people out, for example. We will fly these people back from third countries out of the MOD budget. It is my view that we should continue to stand by them, including using married quarters, for example, in military establishments to look after them if they cannot get places elsewhere. There has not been a resource problem; the challenge is whether people have been asking for the resource within the system to do this.

The individual concerned was a member of the Ministry of Defence, but I am very keen that it is not just the poor person who drafts the email who is held to account, but the chain upwards, to ensure that this does not happen again.