Feeds

MPs call for crackdown on pre-paid credit cards

Child abusers getting away with it

Secure remote control for conventional and virtual desktops

The government has been urged by MPs to tighten controls on pre-paid credit cards, with claims they help child abusers avoid detection online.

Labour MP Geraint Davies said the cards were routinely used by paedophiles to hide their identities as he proposed a bill on Wednesday to force credit card companies to act.

He wants Visa and Mastercard to be liable when pre-paid card are used to access to abuse material, which would probably lead to their withdrawal or strict identity controls.

"Until 2002, users simply submitted their credit and debit card details online to download images of abuse from the web," Davies said.

"These days the new route for users is to hide their identity by using pre-paid credit cards to download images. These pre-paid cards are available to adults and children for £100 a time at service stations and high street retailers without the need to provide proof of identity."

Davies' private member's Bill - introduced under what is know as a Ten Minute Rule Motion - drew support across the Commons, with backing from Tories including Edward Leigh, the chairman of the Public Accounts Commitee.

Under current legislation, Davies said, no proof of identity is required to purchase a pre-paid card worth up to £100.

"That is why Parliament should back the provisions in my Bill to make credit and debit card companies liable for penalties when their cards are used to download images of abuse," he said.

Davies acknowledged that Visa and Mastercard had taken action following a police crackdown on online child pornography in 2002 to monitor and report illegal use of conventional credit cards, but said abusers have migrated to pre-paid.

"The credit card companies are not taking pre-emptive action," he charged.

"There is lots of money involved and no appetite for voluntary industry action."

"I hope that the Government will listen and adopt the provisions into mainstream legislation."

Ten Minute Rule Motions are typically used to draw government attention rather than in expectation of becoming law. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Bono: Apple will sort out monetising music where the labels failed
Remastered so hard it would be difficult or impossible to master it again
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.