Did you mean over human intelligence?
Angus MacKay: ...source of information should not be fettered. It is therefore not our intention that those who carry out such activities, which Christine Grahame described, should fall within the definition of a covert human intelligence source. As section 1(7) of the bill makes clear, covert human intelligence sources are individuals who establish or maintain a relationship with another person for the...
Lord West of Spithead: The consultation on of the Regulation of Investigatory Powers Act 2000 was launched on 17 April 2009. It covers which public authorities are able to access communications data or use directed surveillance or covert human intelligence sources, and the purposes for which authorisations can be sought and the ranks at which local authority authorisations can be granted. The consultation will...
Lord Rosser: ...the importance of our police and security services, including the National Crime Agency, and thank them for the vital work they undertake on our behalf. We also recognise the importance of covert human intelligence sources and the results they achieve. The director-general of MI5 has said: “Since March 2017, MI5 and Counter-Terrorism Police have together thwarted 27 terror attacks....
Caroline Flint: Numbers of authorisations granted for the carrying out of directed surveillance (under section 28 of the Regulation of Investigatory Powers Act 2000 (RIPA)) or for the conduct or the use of covert human intelligence source (under section 29) are published in the Annual Reports of the Chief Surveillance Commissioner. Sections 28 and 29 of RIPA came into force on 25 January 2000. The published...
Caroline Flint: The hon. Gentleman's argument is that the provision covers undercover officers. It does not, and that was explained in the other place. The Schengen convention covers the basic bread-and-butter covert surveillance work of law enforcement officers. It does not deal with infiltration of organised gangs by undercover officers. That is why it is proposed in the Bill only to amend the...
Jack Straw: The validation of human intelligence sources is described in Chapter 5.9 of Lord Butler's report. The report commended SIS for the thoroughness with which it had sought to validate these sources after the war. These matters have been examined during the course of the Butler Review and other inquiries, and covered during debates and statements on Iraq.
Baroness Jones of Moulsecoomb: To ask Her Majesty's Government, further to the Written Answer by Baroness Williams of Trafford on 11 March (HL13990), whether the inspection teams covering juveniles as covert human intelligence sources also examine how policy is set regarding (1) payments to, (2) inducement of, and (3) frequency of use of, each juvenile.
Baroness Kennedy of The Shaws: I am interested to hear the noble Lord, Lord Lester, the great human rights lawyer, defending secret processes of this kind. There is no doubt that applications will be made for closed material proceedings in those sorts of cases because the state will not want to divulge the circumstances in which locational intelligence was given. What we as members of the public would want to know would be...
Jim Wallace: Today we issued final codes of practice on covert surveillance and covert human intelligence sources. These codes provide a framework within which public authorities covered by the legislation should exercise the powers and duties under the 2000 act. The codes of practice will not come into force until draft orders under section 24(5) of the 2000 act have been laid before and obtain approval...
Lord Filkin: ...of powers and duties under that Act. The codes support the Act by providing clear and, we hope, unambiguous guidance on authorising the carrying out of covert surveillance and the use of covert human intelligence sources. Section 71(3) requires all draft codes of practice issued under RIPA to be published and the Secretary of State to consider any representations. The provisions in Part 2...
Julian Lewis: On behalf of the Intelligence and Security Committee, I entirely endorse the tributes and good wishes paid by the Solicitor General and the hon. Member for St Helens North (Conor McGinn) to my right hon. Friend the Member for Old Bexley and Sidcup (James Brokenshire). His professionalism, calmness and dedication as Security Minister and in other roles are a model for us all. We admire him...
Jim Wallace: ...heard Mr Gallie and Mr Wallace and have considerable sympathy with the sentiments that underlie the amendment. We would all agree that it is important to ensure the security and welfare of a covert human intelligence source. Sources should be protected even after they have ceased operating as such. We have considered the matter since it was raised at stage 2, but it is considered more...
Robert Buckland: ...to the area of your competence with regard to communications. As you have acknowledged, the proposed reforms would require judicial approval for not only that, but directed surveillance and covert human intelligence sources. I am going to put it simply: would it not be an anomaly if we left the area that you cover out of any proposed reforms to the other two areas in which there is...
Kevan Jones: ...forever. I think he does not quite understand why the Government are not at least moving on this. The ISC’s remit is defined in the Justice and Security Act 2013. It sets out which Departments we cover, and the Department for Digital, Culture, Media and Sport is not one of them. However, as I said last week, security is increasingly being covered by other Departments, and this Bill is a...
Theresa May: ...President Mr Justice Michael Burton - Vice President Sir Richard Gaskell Sheriff Principle John McInnes QC Mr Richard Seabrook QC The tribunal considers proceedings brought under section 7 of the Human Rights Act 1998 against the intelligence agencies and, in respect of the investigatory powers covered by the Regulation of Investigatory Powers Act 2000, by all public authorities. It also...
Baroness Park of Monmouth: We are not worried about bugging, intercepts and all the rest of it—of course that can be done, and there is no danger if it is found out. It is an embarrassment; you have to find another way of covering the target—you have to start again. We are talking about the rare and almost irreplaceable human source who takes years to get into place. If he or she is lost, the replacement is...
Viscount Younger of Leckie: ...information provided to us. We have done this to be as transparent as we can without hindering our ability to detect fraud and protect data. The PIC also explains that DWP does not use artificial intelligence to replace human judgement to determine or deny a payment to a claimant. We will only use data for lawful purposes. The DWP annual report and accounts 2022 to 2023 - GOV.UK...
Charles Clarke: ...Vice President Mr William Carmichael Sir Richard Gaskell Sheriff Principal John McInnes QC Mr Peter Scott QC Mr Robert Seabrook QC The Tribunal considers proceedings brought under section 7 of the Human Rights Act 1998 against the intelligence agencies and in respect of the investigatory powers covered by the Regulation of Investigatory Powers Act 2000, by all public authorities. It also...
Mr Rupert Allason: Certainly those disclosures could not have been made under clause 1. Members of the security and intelligence services understand their position, although they may not like the idea of being told retrospectively that they are now covered by an entirely new form of legislation that restricts their human rights. And who knows—many of them may well he prompted to go to the European court in...
Ben Wallace: ...the Regulation of Investigatory Powers Act 2000 The consultation is in relation to the following codes: 1. The Covert Surveillance and Property Interference Code of Practice. 2. The Covert Human Intelligence Sources Code of Practice These codes provide guidance on the authorisation of directed surveillance, intrusive surveillance and covert human intelligence sources under Part 2 of...