All 1 Debates between Luciana Berger and Lord Mann

Tue 4th Nov 2014

Internet Abuse of Members of Parliament

Debate between Luciana Berger and Lord Mann
Tuesday 4th November 2014

(10 years ago)

Commons Chamber
Read Full debate Read Hansard Text Read Debate Ministerial Extracts
Lord Mann Portrait John Mann (Bassetlaw) (Lab)
- Hansard - - - Excerpts

I wish to raise the problems that Members of the House and many more people in our communities face from the abuse of social media. For me, and probably for all hon. Members, social media has huge benefits. It is a great liberator and gives many new opportunities to people throughout the world to communicate in different ways. However, it has a small but vicious and nasty downside. Indeed, having called the debated, I noted a story in the newspapers. Mr Yaya Touré, a footballer, went back on to Twitter after five months and was immediately viciously abused by racists. Mr Robert Hannigan, the head of GCHQ, said this morning that internet companies are in denial over the use of the internet by terrorists and criminals.

We have seen the most grotesque misuse of the right of freedom of expression by individuals using the internet in a series of cases affecting Members. My hon. Friend the Member for Walthamstow (Stella Creasy), who successfully prosecuted, said that

“the authorities didn’t even know how to begin investigating whether one person was sending these messages”—

the abusive, hateful and violent messages she was receiving—

“or many individuals”.

The grotesque racist abuse from a whole range of people in the past few weeks aimed at my hon. Friend the Member for Liverpool, Wavertree (Luciana Berger) has been a factor in my request to Mr Speaker to grant this debate. On Saturday, 10 people were arrested as a direct consequence of issues raised on the internet. When I had the temerity to raise the issue on a point of order in the House, I received the most extraordinary fake messages, allegedly in my name, which were deliberately meant to upset, alienate and aggrieve individuals in the community: incendiary words that were fiction and mere lies—nothing I would ever contemplate saying—but put up by one of these individuals in my name and then spread by others across the internet. There has been an arrest in the past few days.

The Inter-parliamentary Coalition for Combating Antisemitism, which I chair, and the Anti-Defamation League in the US, have spent the past four years agreeing best practice for responding to cyber-hate. A whole range internet providers—Google, Twitter, YouTube, PayPal, Facebook—have agreed five procedures for internet providers:

“Providers should take reports about cyberhate seriously, mindful of the fundamental principles of free expression, human dignity, personal safety and respect for the rule of law.”

The last three are being violated repeatedly, both in relation to Members and to people—far more people—outside this House. What the internet companies and law enforcement companies are doing in this country is insufficient.

The second guideline states:

“Providers that feature user-generated content should offer users a clear explanation of their approach to evaluating and resolving reports of hateful content, highlighting their relevant terms of service.”

Having had this happen against me and seeing it against others, I have no idea what those terms are. They are not upfront. They are not available for people to see. No one has a clue what the internet companies claim to be doing about it.

The third guideline states:

“Providers should offer user-friendly mechanisms and procedures for reporting hateful content.”

I would advise anyone to take as an example Twitter. To know how to use Twitter’s response one has to be something of a computer expert. It is not user-friendly and it is not immediately available for those being harassed on the internet by others, sometimes in a criminal way.

The fourth guideline states:

“Providers should respond to user reports in a timely manner.”

Even when the police use requests under the Regulation of Investigatory Powers Act 2000 Twitter, Facebook and others, they go to the United States, or even Europe where the companies have their headquarters, rather than have them agreed in this country, This delays hugely the ability of the police to gain the information even to contemplate prosecuting.

Fifthly:

“Providers should enforce whatever sanctions their terms of service contemplate in a consistent and fair manner”.

I am not suggesting, and nobody else is, a hierarchy of victims or any special privileged treatment for MPs, but the fact is that Members of Parliament are receiving the most grotesque and criminal hate abuse on the internet. If that can be done to Members of Parliament, can we imagine what is being done to people out in the community? I am now hearing countless examples of the most extraordinary abuse even of tiny children and of victims being abused when the victim complains. Businesses are another example, with people’s businesses torn apart by abuse on the internet.

Luciana Berger Portrait Luciana Berger (Liverpool, Wavertree) (Lab/Co-op)
- Hansard - -

I congratulate my hon. Friend on his tireless work in this area. Does he agree with me that we must have in mind those people to whom he alludes and who are not in this House and have to suffer in silence and in isolation? They often have no support, and these people should be at the forefront of our minds. We need to do everything we possibly can to tackle this issue for them.

Lord Mann Portrait John Mann
- Hansard - - - Excerpts

A system that would work for a Member of Parliament at the top of society—as, in reality, we are—should and must also work for anybody in society. We have the ability to fight back against this abuse. We have the ability to contact the police at a senior level and immediately. I shall come on to what can and should be done even for Members of Parliament, but for people being bullied, intimidated and criminally harassed by people on the internet, there is very little ability and very little knowledge to respond, largely because the internet companies do not take their responsibilities seriously. The police and the Crown Prosecution Service are behind the times when it comes to dealing with this problem.

Social media is regarded as a communication tool, but it is also a search engine. Others are going in and seeing what is there. It is used to incite, as happened in the case with me, or to organise, in the case of others, and often goes far beyond the initial expression to cause further damage at the aimed-for victim. There are real-life consequences—huge, real-life consequences—and lack of resource is not a defence that these social media companies can use.

We have seen racist and anti-Semitic abuse with people weighing in across the world, with the most extraordinary stuff being put up in their own domains in their own countries, but linking together because they have been brought together using social media. Then the opportunity is taken to target individuals and to repeat target them, with groups of people joining in the cyber-bullying and harassment, including criminal harassment. Some examples are potentially within the reach of our law enforcement, but others are well beyond it.

Even when there have been convictions—actual convictions for doing this in the most extraordinary and horrific ways to members of the public—Twitter and Facebook, to name but two, have not taken down the associated Twitter and Facebook accounts when people were convicted of abuse on the basis of evidence that those two companies helped to provide. So the culprits continue to glory in that abuse and repeat it against other victims. Something is seriously and significantly wrong with how these internet companies are dealing with the problem, but it can be seen, too, in the sanctions used by the courts and requested by the police in this country.

We need simple systems to report abuse. They should be simple to the police and authorities in this country and simple to the internet companies. We need internet companies that can be contacted directly and that do not hide away so that no one knows who runs them. I am told by these companies that it is very easy to write simple algorithms that can deal with such problems. Why, then, are these algorithms not being used, particularly where abuse has been reported and a conviction has been made?