Counter-Terrorism and Security Bill Debate

Full Debate: Read Full Debate
Department: Home Office

Counter-Terrorism and Security Bill

George Howarth Excerpts
Tuesday 9th December 2014

(9 years, 5 months ago)

Commons Chamber
Read Full debate Read Hansard Text Read Debate Ministerial Extracts
Pete Wishart Portrait Pete Wishart
- Hansard - - - Excerpts

I see by his response that he is not. I hope the amendments are rejected and that in future we do something that will make our country safe without having to resort to measures such as TPIMs.

George Howarth Portrait Mr George Howarth (Knowsley) (Lab)
- Hansard - -

I wish to take slight issue with the hon. Members for Perth and North Perthshire (Pete Wishart) and for Brighton, Pavilion (Caroline Lucas). The hon. Gentleman’s speech seemed to play to a particular event that will take place over the next few months in Scotland and the rest of the United Kingdom, and it was more about distancing the Scottish National party from the position taken by Labour. That is fair enough; he is entitled to do that but he seemed to be putting rather more heat than light into the debate. To be slightly more serious—as I am sure he intended to be—the problem with the approach taken by him and the hon. Member for Brighton, Pavilion is that they describe a black and white world where either we have the evidence, in which case we go through the court system, prosecute someone and if that is successful they receive an appropriate sentence, or else there is not enough evidence to bring forward a court case so someone is not controlled at all. The difficulty is that the world is not black and white in that way.

Suppose one of our intelligence agencies has information from a liaison partner—the United States, for example—about somebody’s connections, or plans that they may be involved in with a third party elsewhere in the world to commit an act of terrorism in this country. There is a problem with taking such a case through the courts because the information it is based on is governed by the control principle—namely that that information is the property of the other agency, which in this case is in the United States. To allow that information to appear in a court case as evidence would undermine the relationship between the UK and that liaison partner.

George Howarth Portrait Mr Howarth
- Hansard - -

There is an argument against that, which I suspect the hon. Lady is about to make, but an inescapable choice has to be made.

Caroline Lucas Portrait Caroline Lucas
- Hansard - - - Excerpts

No one is suggesting that the issue is black and white. There are shades of grey and balances of judgment, but the hon. Member for Perth and North Perthshire (Pete Wishart) and I are saying that with TPIMs and control orders, that balance of judgment is wrong. If we look at things such as intercept evidence, we can see that there will be other ways of bringing evidence to bear to help us reach a solution, rather than the draconian and counterproductive measures suggested by those on both Front Benches.

George Howarth Portrait Mr Howarth
- Hansard - -

I am interested in the hon. Lady’s intervention. Later in the proceedings we will discuss intercept evidence, although I suspect that she will take an entirely different view on that from me, my hon. Friend the Member for Kingston upon Hull North (Diana Johnson) and the Minister. I hope to comment on the limitations of intercept evidence because it is not always feasible to rely wholly on evidence that in some cases may not exist. Some people may operate in a world where they are not connected online, and do not make telephone calls or give any indication of their intentions. The obvious example is Roshonara Choudhry who was convicted and is now serving a prison sentence for trying to kill a Member of this House. It would have been impossible to find out through intercept evidence what she was intending to do, so there is not always the possibility of relying on that entirely.

My hon. Friend the Member for Kingston upon Hull North asked the Minister a series of questions and I hope he will respond positively. For some people the court system is not appropriate although they are known to be a threat for various reasons, and there must be some way of dealing with that.

James Brokenshire Portrait James Brokenshire
- Hansard - - - Excerpts

The contribution by the right hon. Member for Knowsley (Mr Howarth), a member of the Intelligence and Security Committee, encapsulates some of the challenges and difficulties surrounding the principles of this debate. It is notable that contributions over the past hour have been about some of the principal issues concerning the types of measures that should be available to deal with the threat of terrorism, as well as—obviously and rightly—more detailed examination of the Bill.

We have had this debate on previous occasions, and I respect the view of the hon. Members for Brighton, Pavilion (Caroline Lucas) and for Perth and North Perthshire (Pete Wishart), whose approach has been entirely consistent. In some cases, however, there will be an inability either to prosecute or deport an individual, yet a significant risk will be attached to them—the point made by the right hon. Member for Knowsley. The Government have a responsibility to deal with that risk.

My strong preference would be for prosecutions—absolutely, there are no two ways about it—but that is not always possible for a range of reasons. That is the challenge the Government face in terms of seeing the threat and the risk, and being able to assure national security, as the public and the House would expect. Therefore, reluctantly, a measure is required, and we judge that TPIMs are the appropriate way to meet that risk and challenge. I would prefer that that were not the case—in that I agree with the hon. Members for Brighton, Pavilion and for Perth and North Perthshire—but from the intelligence picture that I have seen and the advice I have been given, sadly and regrettably I believe that TPIMs are necessary to be able to guard national security in that way.

Since April 2010 more than 750 people have been arrested for terrorism-related offences. More than 210 have been charged and more than 140 successfully prosecuted. I say to the hon. Member for Kingston upon Hull North (Diana Johnson) that the introduction of TPIMs was part of a careful and considered counter-terrorism review. She will recall the debates. Consideration was not rushed, but made on the basis of careful analysis of all counter-terrorism legislation to examine the risk and the threat, and what was appropriate and proportionate. That led to a number of changes under the Protection of Freedoms Act 2012, the point that the hon. Member for Perth and North Perthshire was underlining. An assessment was made of which powers were no longer necessary because they no longer added to the protection of the public. That is why we made a number of changes and I was proud to be the Minister leading that Bill through the House. It was part of the process of constantly evaluating and assessing the measures in place in order to consider what is proportionate, appropriate and necessary to guard our national security. In our judgment it is appropriate to make further changes, which is why we seek to bring these measures before the Committee today.

TPIMs have always been part of a package of legislative measures and investment provided to the police and security services to undertake further investigations. That investment will have led to other prosecutions. People who not have gone on to a TPIM have been brought before the courts as a consequence of that investment in capabilities. That is a positive result and something I think right hon. and hon. Members wish to see.

The Terrorism Prevention and Investigation Measures Act 2011 provides a powerful range of measures to manage the threat from terrorists who cannot be prosecuted or deported. TPIM notices are imposed only in cases that require stringent measures, but where they are used, they provide a valuable capability. The Government are committed to ensuring that the appropriate tools are available to our security services and the police for the protection of national security. That is why clause 12 introduces a new power for the Secretary of State to compel a TPIM subject to reside anywhere in the UK, subject to the restrictions we have talked about in the debate thus far. It is important to recognise the benefits that accrue and that there are safeguards in place. The Secretary of State has to make an assessment to determine whether a TPIM should be granted, why we judge it is human rights compliant and how that view has been upheld by the courts.

--- Later in debate ---
George Howarth Portrait Mr George Howarth
- Hansard - -

I wish to begin by providing some context. The Intelligence and Security Committee’s report in February 2013 referred to the Home Office’s assessment that there was a

“25% shortfall in the communications data that public authorities would wish to access and what they are currently able to access.”

That is, of course, an estimate, as it is not possible to be precise about what is unknowable, but the existence of a shortfall is a legitimate cause for concern. The report goes on to suggest that

“left unchecked, this gap will increase.”

Perhaps the Minister will be able to say whether it has increased and, if so, whether by an appreciable amount. It would be interesting to know that, and I suspect it has increased.

It is worth spending a little more time examining what we know about both the scale and the sources of interceptions that take place. In his annual report for 2013, the interception of communications commissioner, Sir Anthony May, noted that the total number of authorisations for interception of communications data under part 1 of RIPA stood at 514,608, down from 570,135 in 2012. He pointed out that these figures do not represent sole individuals, because

“public authorities often make multiple requests for communications data in the course of a single investigation but also make multiple requests for communications data in relation to the same individual.”

The figures give some indication of the scale of this, rather than the number of individuals who are covered. Under the same process, Sir Anthony notes that 87.7% of authorisations were at the request of the police and law enforcement agencies, 11.5% were from the intelligence agencies, and the rest were from local and other public bodies.

Worldwide, the scale of online communications is daunting. About 3 billion people have access to the internet, and during the time I have been speaking more than 200 million e-mails will have been sent, 2 million Google searches will have been made and there will have been 6 million Facebook views. So why is it considered important that the police, intelligence agencies and other bodies have access to some of the data records of these online communications? Overwhelmingly, internet traffic is benign; it is people using the various platforms for perfectly legitimate and legal purposes. However, a small proportion—I estimate it to be no more than a tiny fraction of 1%—is used for illegal purposes, and my hon. Friend the Member for Kingston upon Hull North (Diana Johnson) referred to some other purposes that are cause for concern.

My hon. Friend’s new clause 2 would, if agreed, require the Home Secretary to review the time taken by communications service providers to disclose information linking an individual to an internet protocol address. That is important for two reasons. The first is that, as we tragically discovered with Fusilier Lee Rigby’s murder, CSPs will, on occasion, receive information that in some cases could crucially be the catalyst for a warrant to enable greater surveillance measures on an individual to take place. In turn that can, in some cases, prevent a terrorist attack.

IP addresses are the key to unlocking who is contacting whom, and that can be critical. But they are not straightforward. Typically, a communications service provider with, say, 10 million to 15 million customers would have allocated to it 100,000 IP addresses. For the larger commercial bodies or public bodies, a series of static IP addresses will be allocated. But for the vast majority of users, IP addresses are dynamic. In practice, a range of numbers is allocated randomly to customers, which is why the former head of GCHQ used the analogy of finding a needle in a haystack.

Secondly, the range of platforms is constantly changing, with new ones entering the market all the time. A good example of that is WhatsApp, which was recently acquired by Facebook for $22 billion. On 1 April, that platform, which is adaptable and easy to use, handled, over a 24-hour period, 64 billion messages, 20 billion of which were sent and 44 billion of which were received. In such a dynamic sphere of activity, it is vital that procedures are in place and properly monitored to ensure that, when the security and intelligence services need to locate a needle in a haystack, the haystack is still in place, and that is what this section of the Bill seeks to ensure. It means that urgent inquiries of either a historical or planned terrorist or criminal activity can be located.

Julian Smith Portrait Julian Smith
- Hansard - - - Excerpts

The right hon. Gentleman makes a powerful case for us to go further. What would he do now? He has made it clear that there are many technologies that need much more scrutiny and oversight. What would he do if he were in charge?

George Howarth Portrait Mr Howarth
- Hansard - -

Had the hon. Gentleman waited a while longer, I was about to say what more could be done. It is right that we have a statutory provision, and, subject to the concerns that my hon. Friend the Member for Kingston upon Hull North highlighted being satisfied, the provisions contained in the Bill are appropriate. However, there is a problem that we cannot resolve within the context of our own domestic legislation. Many of the communications service providers are not based in the UK; they are based mostly in the United States. Increasingly, the Republic of Ireland is seen as a location of choice for some companies. Google and perhaps one other CSP have already relocated there. It is increasingly clear that whatever legislation we put in place, it will not, of itself, be enough to resolve the problem.

Mark Field Portrait Mark Field
- Hansard - - - Excerpts

Does the right hon. Gentleman also accept that the increased knowledge of the general public and—dare I say it—of individuals who would do us harm about the techniques adopted by the security services and others have also helped to ensure that there is now much more sophisticated encryption in place, which also plays an important part in further reducing our capacity to know precisely what is happening on the internet?

--- Later in debate ---
George Howarth Portrait Mr Howarth
- Hansard - -

The hon. Gentleman is quite right and he, like me, is a member of the Intelligence and Security Committee. We have good reason to believe that there are any number of encryption packages that can be bought quite openly on the internet. It is a matter not just of the communications service providers encrypting communications that take place but of individuals buying packages that enable them to do that themselves, which makes the situation even more difficult.

What more can we do? It is no use pretending that this problem is unique to the UK; it is a very difficult international problem. I know that the Home Secretary, the Foreign Secretary and others are in constant dialogue with their opposite numbers in the United States, but there needs to be a growing understanding between ourselves and the places where CSPs are located that there cannot be this ungoverned space within which criminal activity can take place unchecked on the basis that it is in another jurisdiction from where it is being perpetrated. That issue can only be properly resolved by states, either bilaterally or multilaterally, agreeing protocols and ways of dealing with these issues. Obviously, it is much more easy to do that with friendly states—states with which we share common values—than it is in some other areas where internet providers might decide to locate because there will not be many controls on them. Clearly, that is another matter that needs to be seriously avoided.

We need to have order in this ungoverned space. I am talking about legal compliance and there not being this free space in which crime, terrorism and other activities can illegally take place. It is also important that the CSPs take a more responsible view of what they are being used for. Like the hon. Member for Cities of London and Westminster (Mark Field), I have seen some CSPs washing their hands of such responsibilities, saying, “That is a matter of jurisdiction. We are not in that jurisdiction so we will comply with the laws where we are.” That might be good for their reputations with their customers, but it is a fairly cynical way of operating. I hope that, through the intervention of our own Government and Governments elsewhere, CSPs can be brought to the view that they should behave responsibly and in such a way that upholds the law right across the world—except in cases where the rule of law does not operate.

Mark Field Portrait Mark Field
- Hansard - - - Excerpts

Is the right hon. Gentleman happy for me to put it on the record that it is also the case that many CSPs do a very good job of co-operating with the police and law enforcement agencies? Part of the difficulty has been that the revelations of the past 14 or 15 months have exposed what some would call an over-cosy relationship between those service providers and the state. I am talking about not so much here in the UK, but in mainland Europe and the United States of America, and it has been commercially damaging to many of those providers.

George Howarth Portrait Mr Howarth
- Hansard - -

As always, the hon. Gentleman makes a good point. Sometimes the difficulty is that the amount of data and communications that providers store means that they are unable to know what is there. Very often, controls are triggered electronically, and so human eyes might not necessarily see the communication that relates to a terrorist plot, organised crime or even, in a hidden corner of it all, some kind of child abuse. Quite often, no human eyes see it, and it may be that only after an event—as in the case of Fusilier Lee Rigby—do people become aware that there was a communication that indicated that someone was about to or was likely to do something, and that knowing about it could have made a difference, as we concluded in our report the other week. Perhaps I have presented too cynical a picture of communications service providers. I know that, on occasion, they do co-operate constructively, but I believe that increasingly we need the space in which they operate to be better regulated, and that requires international controls agreed between responsible allies and CSPs themselves.

--- Later in debate ---
John McDonnell Portrait John McDonnell
- Hansard - - - Excerpts

indicated dissent.

George Howarth Portrait Mr Howarth
- Hansard - -

I look forward to hearing what my hon. Friend has to say. I acknowledge that he and his supporters have a valid point to make. I just think it is a tricky area in which to legislate and there might be a better way of doing it that we have not thought of yet.

John McDonnell Portrait John McDonnell
- Hansard - - - Excerpts

Everyone else who has spoken so far seems to have explained my amendments, and I am grateful to them. I tabled new clause 1 and amendment 11 because there is now a sense of urgency about dealing with this matter. I speak as the secretary of the National Union of Journalists group in Parliament—a group of MPs drawn from various political parties in the House. Throughout proceedings on RIPA and DRIPA and now this Bill, we have been discussing this issue. To put it simply, this House has always recognised in legislation the need to protect journalists, because we see journalism as one of the bulwarks of democracy in this country. Although we may not be enamoured of journalists or individual newspapers at times, we believe they play a vital democratic role in exposing what happens, particularly in regard to the behaviour of public authorities, Governments, corporations and others. That is why over the years we have written into legislation protection for journalists, as well as for other professions where there are issues of confidentiality, and the House has accepted that in all the debates so far.

--- Later in debate ---
The hon. Lady will be well aware of the review that David Anderson is conducting, which is due to report next May. She will also know that, as per the discussions we had on DRIPA, the Bill is time-limited to December 2016. Indeed, she will note that the provisions in clause 17 are time-limited to December 2016, for the very reason that the House will need to return to these matters in the next Parliament. I think that is right and proper, so that the issue can be considered in the round and in the light of the different reports, including the ISC report, David Anderson’s report and the Home Affairs Committee’s report, which was published in the past few days, in order to inform a measured, proper debate in the next Parliament on these issues, recognising the speed at which DRIPA was brought before the House and, equally, to ensure that the legislation remains in the right place.
George Howarth Portrait Mr George Howarth
- Hansard - -

I have a suggestion. Where a situation is changing rapidly, such issues are sometimes dealt with in legislation by adding a schedule that can then be updated by order. It is not necessarily the best way, but it is one way of dealing with that type of situation.

James Brokenshire Portrait James Brokenshire
- Hansard - - - Excerpts

I recognise that in certain circumstances that might be appropriate, but the challenge in this case is the fast-paced nature of technology, which means we would always be playing catch-up. The original RIPA legislation was therefore intended to be technology-neutral so that, if the technology moved on, it was still able to capture that, just as our criminal law is intended to cover all forms of communications. I think that might be a better way of seeking to achieve that. However, that is part and parcel of David Anderson’s review of RIPA, and therefore the existing legislation and a number of the themes that have been touched on by right hon. and hon. Members in this debate, and also the continuing utility of these provisions.