My Lords, I rise to speak in this debate because I have spoken on RIPA and given consideration to the proposals for data retention, about which I am being lobbied. I am interested in ICT—information and communications technology—and I sit on the advisory board of ISTA, the Information Systems Security Association. So this is an area in which I am interested.
When I first saw the proposals in the Bill my first thought was ““Why not?”” I have often wondered why such information is not available to the courts and not used to prosecute criminals in order to protect us. I then thought that it may be to cover up the fact that the intelligence services do not receive as much information as we think they receive and that it may be a way of scaring criminals. I then thought a bit harder and came to the conclusion that that is probably not so, particularly as I know something about technology.
The next question that arose in my mind was: how often are intelligence sources not given enough information to trap suspects in some other action or something else that they are doing? In other words, why can they not use the intelligence to catch them for something else? It must be fairly rare that you have to rely only on intercept evidence to trap someone. The only case I can think of is where I was involved in considering some fraud issues about 15 years ago and we were trying to find where Mr Big might have slipped up and communicated with some of his underlings. Of course, such people try to cut themselves out of the picture—you see this in stories about the Mafia and so on—and so you try to trace that one piece of communication that they made to someone in the field because they do not want to get their own hands dirty. So I can see these proposals may be useful in that kind of situation.
But then we come to the next issue—which really worries me—and that is the question of what evidence is presented in court if some of it is protected. This could lead to selected presentation. It is rather like advertising the review of a play, where the good bits are printed, the bad bits are cut out and you end up with a highly selective presentation. Sooner or later someone will manufacture or twist evidence in order to present too good a case. Something will come out of the woodwork, there will be a scandal and the judges, quite rightly, will say, ““We need to know more. You will have to reveal more about this evidence””. The point has been made by several noble Lords that this could be the thin end of the wedge and will slowly open up—probably because one of the agencies will make a mistake.
I am also concerned that we start off in law with great barriers and extreme confidentiality and then something comes into fashion—anti-money-laundering, for example—and suddenly the protected client-lawyer relationships and communications are completely destroyed overnight by a government who think it is a good idea to do so. Knowing that Parliament will suddenly take these rather extreme views over a short-term issue, we have to be very aware and careful to ensure that we are not opening up a can of worms.
Some people who wish to enhance their careers—this is not particularly concerned with those who work in the intelligence services, but they are no different from other human beings—may use information that they should not use to push their career forward, even though they have the power to do so. We have to be very careful that that should not happen and we need to put in very strong protections.
We know—you cannot get away from the fact—that there are inter-agency rivalries. The reason for all these agencies is to ensure that there is some rivalry, to ensure that there are silos and to ensure that all the information does not leap across them. But this can lead to mistakes being made and, once you start making mistakes you have the problem of reverse engineering in the way people think. Having written software programmes, I am aware of this problem. I have always enjoyed looking at a programme and working out the thoughts of the person who had written it. Given a system, I am very interested in how to get into it or around it. It is not hacking, particularly, but a consideration of where its vulnerabilities are and so on. Once you are aware of the concept that it is possible, you can then work out how it can be done. So that is one of the dangers.
You can work in two ways: either on an analysis of what has happened or an analysis of what has not happened—in other words, you work on the cases that have been brought to court and wonder why the other ones have not been brought, or the other way round. It is amazing what inadvertent information you can give away by your behaviour and by what you reveal. So that is another issue that needs to be looked at extremely carefully.
I am aware that some other countries do not receive the intelligence information that we receive. I do not particularly want to know why or why not—I ought not to because I am not cleared to that level of security—but it is a known fact that has been quietly revealed in the speeches that have gone before me. But would it be all right to reveal some information at the lower end of the scale? We open people’s letters, we can photograph letters and written information and so on, so why, when prosecuting the smaller criminals, can we not use telephone tapping information? Or can we? I am not sure where the lines are drawn in intercepting communications.
Information obtained under Clause 1(1)(b) of the Bill, which relates to the admissibility of intercept and metering evidence, is retained under RIPA and is available to a plethora of government agencies. As that is well known, why can we not use that kind of information? I think it would be perfectly all right to use information that is obviously and effectively in the public domain, although with restricted access. If the police have tapped a telephone or carried out some interception that is above board, I cannot see the problem in using any of that information. But I can see a problem with high-level intelligence information, about which we have to be very careful.
Interception of Communications (Admissibility of Evidence) Bill [HL]
Proceeding contribution from
Earl of Erroll
(Crossbench)
in the House of Lords on Friday, 18 November 2005.
It occurred during Debate on bills on Interception of Communications (Admissibility of Evidence) Bill [HL].
About this proceeding contribution
Reference
675 c1321-3 Session
2005-06Chamber / Committee
House of Lords chamberSubjects
Librarians' tools
Timestamp
2024-01-26 18:32:02 +0000
URI
http://data.parliament.uk/pimsdata/hansard/CONTRIBUTION_277283
In Indexing
http://indexing.parliament.uk/Content/Edit/1?uri=http://data.parliament.uk/pimsdata/hansard/CONTRIBUTION_277283
In Solr
https://search.parliament.uk/claw/solr/?id=http://data.parliament.uk/pimsdata/hansard/CONTRIBUTION_277283