Previous Section | Back to Table of Contents | Lords Hansard Home Page |
Those in software development are fully aware of the capabilities of software. Many tools traditionally used by hackers are also used by security consultants when checking a system to make it safe from those doing the hacking. The noble Earl, Lord Northesk, put across far more effectively and succinctly than I ever could the import of his amendment.
Lord Bassam of Brighton: I listened with interest to the noble Earls, Lord Northesk and Lord Erroll, as I always do when they speak on these subjects, and I certainly understand the thinking behind their amendments. I also understand that they reflect a concern about how subsection (1)(b) of the new Section 3A offence will be interpreted. The noble Earls explained carefully and very well that the concern rests on how paragraph (b) deals with dual-use tools. Obviously it is not the article that is at issue but how it is likely to be used, and that takes us to the heart of the matter.
The noble Earl, Lord Northesk, is proposing to remove subsection (1)(b), which provides that an offence is committed if a person does any of the listed acts believing that the article is likely to be used to commit a relevant offence. Removing the paragraph would limit the use of the subsection to instances where the prosecution could prove that the article was intended to be used to commit computer misuse offences. We consider it important that the offence covers those who believe it is likely that the article will be used to commit offences, irrespective of intent. Further, the clause as drafted sets a high test to protect those with legitimate intentions. The supplying offence that we are talking about here is very narrowly drawn, and the high threshold that we require to prove the offence underlines that.
The noble Earl, Lord Erroll, has proposed something slightly different. I am extremely impressed by his extensive consultation arrangements on the 9.19 am from Surbiton, or wherever his train was from. It seems a novel way of carrying out consultation on computer misuse; nevertheless, it is valuable for the potential thesaurus that it supplies us with.
We do not believe that his proposed alternativethat of exchanging likely with primarilydiffers significantly from the current draft. Asking whether a person believes that the primary use of an article is to commit offences seems to be the same as asking whether he believes that an article is likely to be used to commit offences. Also, the proposed formulation would not deal adequately with a case where the primary purpose could be said to be legitimate but the article in question was supplied by a person who believed that it would be likely to be used to commit offences. The noble Earl, Lord Erroll, might like to consider that nuance further. The burden on the prosecution of showing that the accused believed that the article was likely to be used in the commission of an offence under Sections 1 or 3 of the Act will not, as I said earlier, be an easy one to discharge.
It would not be sufficient for the producer of the article to show that it had been used for such a purpose on some occasions because that does not show a belief that the article in question will be so used. On the contrary, the producer will be taken to believe that the article would be used honestly, as it is in the majority of cases. The prosecution may need to prove that the supplier knew something about the person to whom he supplied the article on which to base a belief of dishonest use. Obviously, that will not be an easy task.
We recognise the concerns of legitimate product manufacturers, the IT security industry and the research community about the need for clarity on how these provisions will apply to them. We have carefully considered the standard to be applied and we are satisfied that we have struck the right balancebetween protecting those who develop or supply tools for legitimate use and criminalising those who deliberately or recklessly develop or supply them for criminal use. I hope that what I have said provides that clarity. I express my gratitude again to both noble Earls for providing the Government with the opportunity to clarify our intentions. I invite them to withdraw their separate but distinctive amendments.
The Earl of Northesk: I thank the Minister for that reply and I thank the noble Earl, Lord Erroll, and the noble Baroness, Lady Harris, for their contributions and their support for the amendments. Regrettably, I am none the wiser. The Minister has not clarified the issue for me one iota. My understanding is that at the heart of this lies the legal definition of likely. It is a sad fact that vast swathes of the IT sector remain, to this day, confused about how the word likely will be interpreted by the courts. They simply will not take the risk of falling foul of this provision. I do not mind whether the noble Lord wishes to dismiss that, but that happens to be true.
I have very serious difficulties about how the courts will interpret the Governments intent vis-Ã -vis likely. How will the courts measure it, and against which yardstick will they measure it? There is absolutely nothing in the Bill to suggest that they can so do. I will read what the Minister has said extremely carefully, but, on first hearing, it does not clarify matters at all. With certainty, I shall return to this matter on Report. In the mean time, I beg leave to withdraw the amendment.
Amendment, by leave, withdrawn.
The Earl of Erroll had given notice of his intention to move Amendment No. 178ZA:
The noble Earl said: I have listened to the Minister with great interest. He has clarified for me a confusing point about the production and the supply of these tools. One is trying to criminalise people who advertise on the internet saying, Great hacker tool available, derived from such and such, best thing ever, why dont you buy it for X?. I have no problem with criminalising the sale or the supply of a tool because one knows that that is likely to be used by hackers. Separating out the development and, therefore, the supply of legally developed tools to educational establishments or authorised computer users might well solve part of the problem.
The second point that occurred to me
while listening to the noble Earl, Lord Northesk, is that we need a
definition for likely. Perhaps we should put in an
entire legal definition of what we think likely is
likely to mean when it gets to the courts. That would be another way
around the matter. With those
11 July 2006 : Column 617
[Amendment No. 178ZA not moved.]
Clause 42 [Transitional and saving provision]:
The Minister of State, Home Office (Baroness Scotland of Asthal) moved Amendments Nos. 178A to 178C:
On Question, amendments agreed to.
Clause 42, as amended, agreed to.
Baroness Anelay of St Johns moved Amendment No. 179:
(a) after paragraph (a) of subsection (5A) there is inserted- (b) after subsection (5B) there is inserted- (6) This subsection applies where- (a) a person has been previously convicted of an offence contrary to section 1 of the Protection of Children Act 1978 or section 160 of the Criminal Justice Act 1988; (b) the apparatus or data storage device containingthe protected information contains an indecent photograph or pseudo-photograph of a child; (c) the apparatus or data storage device containing the protected information has come into the possession of any person together with other apparatus or a data storage device which contains an indecent photograph or pseudo-photograph of a child; or (d) the court is satisfied that the protected information is likely to contain an indecent photograph or pseudo-photograph of a child. (7) This subsection will not apply where the person to whom the notice is given can show that the protected information does not contain an indecent photograph or pseudo-photograph of a child. (8) Indecent photograph or pseudo-photograph of a child shall have the same meaning as in the Protection of Children Act 1978.The noble Baroness said: I shall speak
also to Amendments Nos. 180 and 196, which also stand in my name. The
two new clauses would strengthen the law dealing with sex offenders,
especially those who offend against children. The issues covered by the
11 July 2006 : Column 618
In another place, the Government accepted another amendment that inserts a new clause giving the police extra powers to enter and examine the relevant offenders home address. The new clause, although rejected by the Government for this Bill, was, with the agreement of the whole of thisHouse, inserted in Committee on the ViolentCrime Reduction Bill in May. Unfortunately, the Government did not give such a positive and speedy response to the amendments before us today and I hope that we can now make more progress with them.
Amendment No. 196 simply amends the Long Title so that the matter of child pornography would come within the scope of the Bill. As, later, we shall come to government amendments that would amend the Long Title, I hope that amending the Long Title is no longer an anathema to the Government.
Amendment No. 179 deals with encrypted data. It is well known that paedophiles collect pornographic images of children that most certainly constitute child abuse. Some of the images are real; some are digitally manufactured. One must at all times remember that every photograph of a real event is a record of a real act of abusing a child. Many of the images are in the form of videos or DVDs or on computers. Increasingly, they are kept on remote storage. Some computers that the police collect have no hard drives at all. They are driven or initiated by a disk and the information is stored remotely. Increasingly, the information is hidden by encryption. We used to have simple encryption, but we have now moved to 128 bit and 256 bit encryption. I understand that the software is freely available on the internet and is relatively easy to use. Essentially, it is unbreakable.
I am advised that matters are likely to become worse from the point of view of breaking security systems when Vista, the replacement for the Windows operating system, is due out during the course of next year. Once that system is up and running, the security is such that when the computer is turned off, it automatically encrypts all the information on it so that when the police collect the computer and turn it on, they cannot break through the encryption. Some information can be destroyed, preventing access by the police.
Clearly, the police need access. They need to seek evidence against individuals and, because offenders sometimes work in groups, they need to find evidence against the wider group as well. It is vital for the police to be able to identify the children involved. That is crucial not only in detecting the abusers but making it possible to offer some hope that the children may be rehabilitated and suffer as little long-term damage as possible.
The new clause
deals with encrypted data found on computers and storage in cases where
the police
11 July 2006 : Column 619
Accordingly, it is unlikely that a defender who has indecent and abusive photographs of children on his or her computer would comply with the notice. We need to step up the penalty to achieve that compliance, so I suggest that such offenders should be liable for up to 10 years imprisonment, which is the penalty for contravening Section 1 of the Protection of Children Act 1978. I have no firm view on that; the amendment was tabled to probe the Governments intentions.
The proposed new clause would simply raise the sentence if a court was satisfied that it was more than likelywe return to likely, to which the noble Earl, Lord Erroll, referredthat most of the encrypted data consisted of indecent photographs of children. We suggest the use of the civil burden of proof because the offence would be not the possession of photographs of children, which would be punished separately, but the failure to hand over the encryption key. The higher sentence would apply only when one of two thresholds was passed: the computer had non-encrypted indecent photos of a child or children on it; or the person had previously been convicted of an offence contrary to Section 1 of the Protection of Children Act 1978 or Section 160 of the Criminal Justice Act 1988.
Amendment No. 180 would insert a new clause relating to offences requiring notification. Sections 48 to 50 of the Sexual Offences Act 2003, which make provision for the offences of recruiting or controlling a child involved in pornography or prostitution, are not prescribed for the purposes of notification requirements under Part 2 of that Act. I confess that my noble friends and I, and my Front-Bench colleagues in another place, quite simply missed that point during the passage of the Act. Those sections are not being used by the police and prosecutors because they do not have the notification that applies to most of, if not all, the other provisions relating to the abuse of children.
I hope the Minister
will agree that there is no valid reason why people convicted of such
an offence should not be required to notify the police of their
details, because they are directly involved in the abuse and
exploitation of children and need monitoring and risk assessment. Time
was somewhat limited when these matters were debated on Report in
another place, but the Government made some encouraging noises, which
were welcome, about consulting on them. I would be grateful if the
Minister would say what the Governments current thinking is on
the
11 July 2006 : Column 620
Lord Hylton: I welcome the intention behind the amendments because they would tighten up the law, which would benefit the protection of children not only in this country but overseas; for example, in the Philippines. It is quite certain that children have been abused and exploited for the purpose of making pornographic films, videos, disks and other computer material, and anything that can be done to reduce that will surely be to the good.
Lord Bassam of Brighton: It is the case that those developing this area of criminal law have had to work hard in the past decade to keep pace with developments in technology and our emerging and developing understanding of the activities of those who are involved in paedophile activity. I am very grateful to the noble Baroness for tabling the amendments, as they enable the Government to set out how we intend to approach these matters. I am also grateful to the noble Lord, Lord Hylton, for his intervention, because he touches on a very important point; this is a global phenomenon, and anything that we can do in this country to tackle these issues, which will have a beneficial effect elsewhere, should be done with enthusiasm and an international spirit.
Amendment No. 179 is designed to increase the maximum penalty for the offence, in Section 53 of the Regulation of Investigatory Powers Act 2000, of failing to comply with the requirement to disclose protected information or the key to it. We had long arguments at the time about those offences. The increase in the maximum penalty would apply in the circumstance set out in new subsection (6) of Section 53 of RIPA, including where the offender has a previous conviction for possession of an indecent image of a child.
The use of information technology by terrorists and criminals to facilitate and conceal evidence of their unlawful conduct in order to evade detectionor prosecution is increasing. Consequently, the Government have concluded that it is now timely to implement the provisions of Part 3 of the Regulation of Investigatory Powers Act 2000, including Section 53, which are not presently in force. The threat to public safety posed by terrorist use of encryption technologies was recognised by the House in Section 15 of the Terrorism Act 2006, which increased the maximum penalty for the Section 53 offence to five years in a national security case. On 7 June, the Government published for consultation a draft statutory code of practice for the investigation of protected electronic data and the exercise of powersin Part 3 of RIPA. This consultation also invites comments on proposals to amend Section 53 of the Act in line with this new clause.
The Government remain very sympathetic to what the noble Baroness seeks to achieve by way of her amendment. However, first, we want to allow further opportunity for public consideration and comment on the proposals, and to consider what legislative changes to bring before the House in the light of current consultation. I am sure that the noble Baroness will feel able to assist us in that by withdrawing her amendment.
I now turn to Amendment No. 180. Schedule 3 to the Sexual Offences Act 2003 lists the offences for which a conviction, finding or caution will, subject to certain sentencing thresholds being met, result in the offender being made subject to the notification requirements of Part 2 of the 2003 Act. These requirements are colloquially known as the sex offenders register. When Schedule 3 was drawn up, we decided that the offences under Sections 48 to 50 of the 2003 ActCausing or inciting child prostitution or pornography, Controlling a child prostitute or a child involved in pornography, and Arranging or facilitating child prostitution or pornographyshould not be included. That decision was taken because we believed that these offences, while undoubtedly abhorrent, were not strictly sexual offences, unlike, say, rape, but could be motivated by factors such as simple greed.
We did however include the offences in Schedule 5 to the 2003 Act. By doing so, we could ensure that if an offender demonstrates that they pose a risk of serious sexual harm, courts can make a sexual offences prevention order either when dealing with such an offence or on subsequent application from the police. Being made subject to such an order leads to the offender going on the sex offenders register as well as being subject to prohibitions imposed by the order. However, while it may be true that these offences need not necessarily be strictly sexual in their nature, their perpetrators demonstrate at the very least a callous disregard of the sexual well-being of children and may pose a threat, and so may require the monitoring that being made subject to the register will bring.
Officials already intend reviewing the content of Schedules 3 and 5, which will take place over the summer. I assure the noble Baroness that her suggestions, as set out in her amendment, will receive sympathetic consideration during that review, including her comments about using the civil measure of guilt. As part of our review, we will be more than happy to meet and discuss with the noble Baroness her concerns and to listen to her other ideas about these offences. Any changes to Schedules 3 and 5 will not require primary legislation. They can be made by affirmative order, which means that Parliament will have the opportunity to debate the proposal. I am sure that the noble Baroness will appreciate that, rather than making piecemeal changes, we take the view that we should await the results of the review, which we will conduct in an entirely open way with the organisations, charities, voluntary sector bodies and so on with which we usually consult in these matters. We hope to make all the necessary changes through an order which will be laid in the autumn.
Again, I am grateful to the noble Baroness for her concern and care in this matter. If we can proceed in this way, I think we can achieve jointly our objectives which I am sure are not totally dissimilar.
Baroness Anelay of St Johns: I am grateful to the Minister for that sympathetic reply and I think that progress is being made here. I am also grateful to the noble Lord, Lord Hylton, for his support. He is absolutely right to point out that, when we talk about offences in these terms, we are also trying to protect children overseas who may be abused through the use of internet pornography. It would not be right to go into more detail on the Ministers response except to say that I welcome his proposal for a meeting. I put it on the record that I would be grateful if the Home Office invited my honourable friend in another place, Sir Paul Beresford, to take part. I know that the Home Office has involved him in previous discussions and that he would value any continued participation.
Lord Bassam of Brighton: I am sure that that can be arranged.
Baroness Anelay of St Johns: I thank the Minister and I beg leave to withdraw the amendment.
Amendment, by leave, withdrawn.
[Amendment No. 180 not moved.]
[Amendment No. 181 had been withdrawn from the Marshalled List.]
Baroness Linklater of Butterstone had given notice of her intention to move Amendment No. 182:
Penal custody for childrenThe noble Baroness said: I shall not move this amendment for the time being. However, we attach great importance to this subject and we will return to it on Report.
[Amendment No. 182 not moved.]
Schedule 12 [Schedule to be inserted into the Protection of Children Act 1978]:
[Amendment No. 183 not moved.]
Schedule 13 [Schedule to be inserted into the Protection of Children (Northern Ireland) Order 1978]:
[Amendment No. 184 not moved.]
Clause 45 [Immigration and asylum enforcement functions: complaints and misconduct]:
[Amendment No. 185 not moved.]
Baroness Anelay of St Johns moved Amendment No. 185A:
The
noble Baroness said: I rise briefly to movethis amendment only
because it was originally not
11 July 2006 : Column 623
This probing amendment follows concerns specifically raised by the Scottish Law Society, which states:
Lord Dholakia: I support the amendment for the reasons identified by the noble Baroness, Lady Anelay. It would be helpful if the Minister could give us an explanation about documents that have legal privilege.
Lord Bassam of Brighton: I will go carefully over my speaking note. I can see that the amendment has three possible consequences, which I shall go through because I want to test them back to the noble Baroness. She will then, no doubt, tell me whether I have addressed the issues and satisfied the intent of the amendment and the probing nature of her comments.
First, if the amendment is intended to safeguard members of the public from the seizure of legally privileged documents belonging to them by immigration officers or officials of the Secretary of State exercising immigration and asylum enforcement functions, we argue that sufficient safeguards already exist in the current legislation. In this clause, enforcement functions exercised by immigration officers and certain other officials are defined as including the types of powers already exercised by those officers under the existing provisions of the immigration Acts. These include, for example, powers of arrest or powers of search and seizure. Thisis to enable the Independent Police Complaints Commission under future regulations to have oversight of these types of powers where they are exercised by immigration officers or certain other officials in the enforcement and removals context.
Clause 45 does not create new powers for immigration officers or other immigration officials. Where powers for such officers and officials to search and retain documents exist in the current law, provision is already made in the legislation for the protection of legally privileged documents. For example, Section 28E(6) of the Immigration Act 1971 qualifies the power that an immigration officer has to enter and search premises following the arrest of a suspect to ensure that legally privileged items cannot be seized. Policy instructions to immigration officers also make it clear that legally privileged material should not be seized.
If the amendment is concerned that the Independent Police Complaints Commission under future regulations will obtain legally privileged information belonging to a private individual, I can again reassure the noble Baroness. If the IPCC obtains such material in the course of one of its investigations, it would be obliged to return it unopened or unread unless the owner of the privilege had waived that privilege. IPCC investigators carrying out investigations have the same powers under the Police Reform Act 2002 as a constable in England and Wales. Therefore, the only warrants that they could seek are those under PACE or terrorism legislation. Legally privileged information will be outside the scope of these warrants, as provided for by Sections 8 and 10 of PACE.
The position where the Immigration and Nationality Directorate is the holder of the legal privilege will be different, however. Section 17 of the Police Reform Act 2002 currently enables the IPCC to require the disclosure of information, including legally privileged information held by the police, by Her Majestys Revenue and Customs or by SOCA, under equivalent provisions, where disclosure is required for the carrying out of an IPCC function. The intention of Clause 45 is to ensure independent scrutiny of immigration officers and officials exercising police-like powers within the community under future regulations similar to the scrutiny that is in place for the police. To require different practices for the disclosure of legally privileged information where IND is the holder of the privilege would be anomalous.
If the third interpretation is the intention of the amendment, the amendment could prevent the disclosure of legally privileged information between the IPCC and the Parliamentary Commissioner for Administration. We take the view that that would be undesirable. The IPCC and the PCA may wish to disclose legally privileged information under the gateway created by Clause 45(5) as part of their functions or for the purposes of a joint investigation under Clause 45(6).
I trust that I have dealt to the noble Baronesss satisfaction with all the potential interpretations that might arise from the amendment. I hope that I have reassured her that the concerns that were quite properly raised by the Law Society of Scotlandit is very good at thishave been addressed and that she will feel able to withdraw the amendment.
Next Section | Back to Table of Contents | Lords Hansard Home Page |