Feeds

MPs call for crackdown on pre-paid credit cards

Child abusers getting away with it

Beginner's guide to SSL certificates

The government has been urged by MPs to tighten controls on pre-paid credit cards, with claims they help child abusers avoid detection online.

Labour MP Geraint Davies said the cards were routinely used by paedophiles to hide their identities as he proposed a bill on Wednesday to force credit card companies to act.

He wants Visa and Mastercard to be liable when pre-paid card are used to access to abuse material, which would probably lead to their withdrawal or strict identity controls.

"Until 2002, users simply submitted their credit and debit card details online to download images of abuse from the web," Davies said.

"These days the new route for users is to hide their identity by using pre-paid credit cards to download images. These pre-paid cards are available to adults and children for £100 a time at service stations and high street retailers without the need to provide proof of identity."

Davies' private member's Bill - introduced under what is know as a Ten Minute Rule Motion - drew support across the Commons, with backing from Tories including Edward Leigh, the chairman of the Public Accounts Commitee.

Under current legislation, Davies said, no proof of identity is required to purchase a pre-paid card worth up to £100.

"That is why Parliament should back the provisions in my Bill to make credit and debit card companies liable for penalties when their cards are used to download images of abuse," he said.

Davies acknowledged that Visa and Mastercard had taken action following a police crackdown on online child pornography in 2002 to monitor and report illegal use of conventional credit cards, but said abusers have migrated to pre-paid.

"The credit card companies are not taking pre-emptive action," he charged.

"There is lots of money involved and no appetite for voluntary industry action."

"I hope that the Government will listen and adopt the provisions into mainstream legislation."

Ten Minute Rule Motions are typically used to draw government attention rather than in expectation of becoming law. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Why Oracle CEO Larry Ellison had to go ... Except he hasn't
Silicon Valley's veteran seadog in piratical Putin impression
Big Content Australia just blew a big hole in its credibility
AHEDA's research on average content prices did not expose methodology, so appears less than rigourous
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.