John Bercow
Main Page: John Bercow (Speaker - Buckingham)(7 years, 9 months ago)
Commons ChamberI beg to move amendment 4, page 2, line 6, at end insert
“, which includes a digital attack if the cultural property in question is in digital form.”
This amendment would make explicit that an offence is committed if the act committed under paragraphs (a) to (e) of paragraph 1 of Article 15 of the Second Protocol is a digital attack, where the cultural property in question is in digital form.
With this it will be convenient to discuss the following:
Amendment 5, page 2, line 17, at end insert
“, or
(c) a foreign national serving under the military command of the UK Armed Forces.”
This amendment would ensure that an offence is committed if an act described in paragraph 1(d) or (e) of Article 15 of the Second Protocol is committed by any foreign national serving under the military command of the UK Armed Forces.
Amendment 1, in clause 17, page 8, line 12, leave out
“or having reason to suspect”.
Amendment 2, page 8, line 12, leave out “having reason to suspect” and insert “believing”.
Amendment 3, page 8, line 12, leave out “having reason to suspect” and insert “suspecting”.
The amendment seeks to probe the Government’s thinking on whether digital attacks on cultural property would be considered as damaging cultural property under the Bill. I say in passing that we very much support the Bill, having first introduced it ourselves, but sadly we ran out of time in the Parliament prior to 2010. The Bill will bring into domestic law the offence created by article 15 of the second protocol to the 1954 Hague convention, so it is not before time. I am glad that there is House-wide support for the Bill, but we want to probe a few more points during the remaining stages, to make sure that the Government’s position is clear and on the record before it is sent for Royal Assent.
During previous debates, both here and in the other place, there have been many discussions about the digital reach of the Bill. Given that the original convention was written in 1954, with a subsequent protocol, that was obviously long before issues of digital property would have been actively considered. We welcome the numerous assurances provided by the Government, including by the Minister in Committee, that cultural property in digital form could be protected. If it is true that digital property is protected under the Bill, it would be natural that digital attacks on that property are also covered. The purpose of the amendment is to get the Government to confirm whether that is the case.
It would not be reasonable to recognise digital cultural property but not digital attacks on such property. Given that the Bill involves creating criminal offences, it is important that the Government put their thinking on the record. Their response to an amendment discussed in Committee highlights the need for clarity. We debated whether the cultural emblem of the blue shield, which the Bill introduces from the convention and which marks a protected item, could be shown in digital form. The Minister said:
“For modern, born-digital material, such as films and music, in practice we would expect the emblem to be displayed on the physical object on which the material is stored or on the building in which the physical storage object is kept, rather than being displayed digitally. That would help to ensure that the emblem is readily visible. That is not to say that it cannot also be depicted in digital form.”––[Official Report, Cultural Property (Armed Conflicts) [Lords] Public Bill Committee, 15 November 2016; c. 9.]
That could be interpreted as assuming that cultural property, even that which is digital, would be attacked only in a physical sense—in other words, that any attacker would be in close physical proximity to the item and able to see the blue shield on its casing. In reality, however, digital content is more likely to be attacked by way of hacking, in which case the question of how the blue shield could flag up digital cultural property to a potential attacker is relevant. Somebody hacking into a database of some sort will not see the shield on the hard drive’s casing.