Investigatory Powers Bill (Sixth sitting) Debate
Full Debate: Read Full DebateLucy Frazer
Main Page: Lucy Frazer (Conservative - South East Cambridgeshire)Department Debates - View all Lucy Frazer's debates with the Attorney General
(8 years, 7 months ago)
Public Bill CommitteesNo, because I want to develop the argument. It is vital that we look at the underpinning of all this. None of the three reports that informed the drawing up of the Bill, nor the three reports arising from the pre-legislative scrutiny of the draft Bill, recommended any changes whatever to the authorisation regime for communications data. For example, David Anderson QC recommends authorisation of the acquisition of communications data by a designated person in a public authority. RUSI recommended:
“For the acquisition of communications data otherwise than in bulk, an authorisation by the relevant public authority. Communications data should only be acquired after the authorisation is granted by a designated person.”
Prior to that, the report from the Joint Scrutiny Committee on the draft Communications Data Bill 2012 looked into the authorisation regime in depth and concluded that it was indeed the right model.
I entirely accept that anything that can sensibly be done to improve the already strongly regulated regime should be done. That is precisely why we have, for instance, provided for a new criminal offence that applies to persons in public authorities who knowingly or recklessly obtain communications data from a communications service provider without lawful authority. We have made the highly regarded SPOC—single point of contact—regime, which provides expert advice and guidance to authorising officers, a mandatory requirement in the Bill.
Does the Solicitor General think that one of the reasons that David Anderson supported these clauses is the benefit of communications data in Operation Magpie, to which he refers specifically in his report, when Cambridgeshire County Council protected more than 100 elderly and vulnerable persons from attempts to defraud them by using communications data powers?
I am grateful for that powerful example provided by my hon. and learned Friend.
It is important to note that in the report on the draft Bill—I am looking at paragraph 11 of the summary of conclusions and recommendations—the Joint Committee stated:
“We believe that law enforcement should be able to apply for all types of communications data for the purposes of ‘saving life’. We recommend that the Home Office should undertake further consultation with law enforcement to determine”—
the report then makes references to various things in the draft Bill that would not necessarily read over to the Bill that is before the Committee.
The point I am seeking to make, in the round, is that we have a tried and tested system, which is being replicated—indeed, enhanced—by the Bill, that deals with a very large number of applications. According to the latest annual report by the Interception of Communications Commissioner, in 2013 there were 517,236 authorisations and notices for communications data in total. That contrasts that with warrantry and intrusive and limited interception of communications—in the same period, there were 2,795—so we are talking about a very different set of parameters, with a large volume of requests. My worry is that, however well-intentioned the amendment is, it is wholly unrealistic when it comes to fighting crime.