The hon. Lady has produced a formidable list of questions, but I only have one for her, on amendment 5. It seems to me that the process we are describing does not enable people to discover who the user of an instrument was; it locates or identifies only the instrument from which the communication was made. Therefore, amendment 5 would be inoperative, because it could never be demonstrated that it was being used to establish who the user was as it cannot be guaranteed to do that.
Counter-Terrorism and Security Bill
Proceeding contribution from
Lord Beith
(Liberal Democrat)
in the House of Commons on Tuesday, 9 December 2014.
It occurred during Debate on bills
and
Committee of the Whole House (HC) on Counter-Terrorism and Security Bill.
Type
Proceeding contribution
Reference
589 c810 
Session
2014-15
Chamber / Committee
House of Commons chamber
Librarians' tools
Timestamp
2022-03-25 14:10:07 +0000
URI
http://hansard.intranet.data.parliament.uk/Commons/2014-12-09/14120941000119
In Indexing
http://indexing.parliament.uk/Content/Edit/1?uri=http://hansard.intranet.data.parliament.uk/Commons/2014-12-09/14120941000119
In Solr
https://search.parliament.uk/claw/solr/?id=http://hansard.intranet.data.parliament.uk/Commons/2014-12-09/14120941000119