Investigatory Powers Bill

Part of the debate – in the House of Commons at 1:31 pm on 15 March 2016.

Alert me about debates like this

Photo of Theresa May Theresa May The Secretary of State for the Home Department 1:31, 15 March 2016

I reiterate the point that I made previously and again just now: 100% of the compliance costs will be met by the Government. My hon. Friend asks me to provide a long-term commitment for that, and we are clear about that in the Bill. As she will be aware, it is not possible for one Government to bind the hands of any future Government in such areas, but we have been clear about that issue in the Bill and I have been clear in my remarks today.

Alongside the draft code of practice, I have published—at the Joint Committee’s request—a comparison of the differences between the proposals in the Bill and those set out by Denmark in recent years. I have also held further discussions with UK and US communications service providers on the proposals in the Bill, and we will continue to work closely with them as we implement this new power. As a guarantee of that, we have included a commitment that the Home Secretary will report to Parliament on how the Bill is operating within six years of Royal Assent. If Parliament agrees, it is our intention that a Joint Committee of both Houses will be formed five years after the Bill receives Royal Assent, specifically to undertake a review of the new legislation and to inform the Home Secretary’s report.

Part 5 of the Bill deals with equipment interference—for example, the acquisition of communications or information directly from devices such as computers or smartphones.

By bringing existing powers into the Bill, we have responded to recommendations made by David Anderson, QC, and by the Intelligence and Security Committee. The Bill places those powers on a clear statutory footing, and makes their use subject to the issue of warrants that must be approved by a judicial commissioner.

Hon. Members will be aware that not only are those powers already available to law enforcement bodies, but they are vital to so much of their work to prosecute serious criminals. In exceptional circumstances, that capability is also used to deal with threat-to-life situations that fall short of serious crime, most typically to identify missing persons. For example, we all expect that when a child goes missing and the parents know the password to their social media account, the police should be able to use that password to search for vital clues. The Bill preserves capabilities that are already available to law enforcement, and makes it clear that they can be used to save lives. Nevertheless, these are intrusive powers and their use must be strictly limited. In future, all equipment interference warrants will require the approval of a judicial commissioner.

The draft code of practice, which I published alongside the Bill, constrains the use by law enforcement of more novel or advanced techniques that hon. Members might reasonably expect to be the preserve of the National Crime Agency and similar bodies. Equipment interference warrants may only be served on communications service providers with the personal agreement of the Secretary of State.

Alongside the draft codes of practice, and in response to recommendations of the Intelligence and Security Committee, we published a comprehensive public case setting out how bulk powers—for interception, communications data and equipment interference—are used, and why they are more necessary than ever before. There are, of course, limits to how much can be said about those most sensitive bulk capabilities without handing an advantage to criminals and those who mean us harm. For that reason, the security and intelligence agencies have provided further, classified detail about the use of those powers to the Intelligence and Security Committee.

As the publicly published case for bulk powers makes clear, such powers are vital to the effective working of the agencies. They have played a significant part in every major counter-terrorism investigation over the past decade, including in each of the seven terrorist plots disrupted since November 2014. They have been essential to detecting more than 95% of cyber-attacks against people and businesses in the UK identified by GCHQ over the past six months, and they enabled more than 90% of the UK’s targeted military operations during the campaign in the south of Afghanistan.

Part 6 of the Bill places these powers on a clearer statutory footing and makes them subject to robust and consistent safeguards. In future, bulk warrants will need to be authorised under the double lock regime that I have described. Furthermore, the examination of any data obtained under a bulk warrant will need to be for an operational purpose that has been approved by a Secretary of State and an independent judge.