(8 years, 4 months ago)
Lords ChamberMy Lords, Amendment 13 is also in the name of my noble friend Lord Strasburger. In Committee, we moved an amendment that would have triggered implementation of the Privacy and Civil Liberties Board that the Liberal Democrats in the coalition Government insisted was part of the package of measures included in the Counter-Terrorism and Security Act 2015. We withdrew that amendment but the Government have failed to give us any hope that it will be accepted. At this stage we are introducing a new amendment to establish an alternative Privacy and Civil Liberties Board based more closely on the well-regarded American model.
In the United States the Privacy and Civil Liberties Oversight Board is an independent, bipartisan agency within the executive branch. It comprises four part-time members and a full-time chairman, and the board is vested with two fundamental authorities: first, to review and analyse actions the executive branch takes to protect the nation from terrorism, ensuring that the need for such actions is balanced with the need to protect privacy and civil liberties; and secondly, to ensure that liberty concerns are appropriately considered in the development and implementation of laws, regulations and policies related to efforts to protect the nation against terrorism. We want a similar body in the UK, and we are not the only ones who do. The Prime Minister, when Home Secretary, committed the Government to,
“ensure we have more transparency from Government”,
which we are doing through this Bill. She continued:
“We will also reduce the number of bodies that are able to have access to the communications data”,
which, again, we are doing through this Bill, and,
“establish a privacy and civil liberties board based on the US model”.—[Official Report, Commons, 10/07/14; col. 472.]
It is only the latter commitment that this Government have failed to fulfil and which this amendment seeks to address. Noble Lords will see that the wording of the amendment seeks to reflect as accurately as possible the American model, which is widely seen as a world-class example of its kind.
Is the noble Lord therefore saying that the American approach to this matter is totally protective of civil liberties?
My Lords, I am saying that the American model provides significant safeguards, in that somebody represents the side of privacy and civil liberties in the argument; it is not simply a case of the security agencies’ side being put, as perhaps some might see in this country.
Unlike the previous amendment, this amendment does not seek to replace the Independent Reviewer of Terrorism Legislation. On the contrary, noble Lords will see that the independent reviewer must be consulted on the appointment of members of the board. This is complementary to, not a replacement for, the Independent Reviewer of Terrorism Legislation. The current reviewer, Mr David Anderson, has previously argued that the post of independent reviewer is under-resourced and that it does not cover a wide enough range of laws. He said:
“If appropriately staffed and directed by the Independent Reviewer, the proposed new body could sharpen that investigative function and increase its scope”.
I accept that Mr Anderson also has concerns, and no doubt my noble friend Lord Carlile of Berriew, his predecessor, will tell us that he too has concerns. However, it continues to be the view of the Liberal Democrats—
My Lords, I am very grateful to those who contributed to this debate. As far as my noble friend Lord Carlile of Berriew is concerned, I am not familiar with the Patriot Act but I know that the Privacy and Civil Liberties Oversight Board has made a significant difference in redressing the balance of some laws in the United States. Even though the noble Baroness, Lady Buscombe, spoke to members of that board and asked whether the Government must listen to it, the fact is that the Government in America did listen and acted on some of the board’s recommendations.
Clearly, these people would need to be security vetted. They will be appointed by the Secretary of State, who could impose whatever conditions she thought fit on those people.
On sloppy drafting, I am afraid it is that no more than three members of the board should be of the same political party rather than that three members should not be of any political party, which is what I think my noble friend suggested.
I am sorry to interrupt the noble Lord again, but could he clarify what that phrase is intended to mean? The way I, and I think my noble friend, read it is that, of a board of five, three can be of the same political party. Is the noble Lord saying that it is in the interests of civil liberties and all these other things to have a board of which three members are from the same political party—presumably the government party? Will that really then be an independent board?
The fact is that it is up to the Secretary of State to appoint those members to the board. One would hope that the Secretary of State would use the freedom provided by this amendment to ensure that the board is balanced. As with the noble and learned Lord, Lord Keen, I also have my brief. However, on this occasion it would be disrespectful to the House to press this amendment to a vote. Despite my brief, I beg leave to withdraw the amendment.
(8 years, 6 months ago)
Lords ChamberMy Lords, this amendment is one of several in this group in my name and that of my noble friend Lady Hamwee. Amendment 158A probes what is meant by the term “any other information” in terms of the purpose of an equipment interference warrant. Clause 93(2) states that an “equipment interference warrant”,
“requires the person to whom it is addressed to secure interference … for the purpose of obtaining—(a) communications”,
which is defined in Section 126(1); “(b) equipment data”, defined in Section 94; and “(c) any other information”, which is not defined. Can the Minister at least give some examples of what “any other information” means? Amendments 185B and 185C cover the same point in other subsections of Clause 93.
Amendments 158D to 158M and Amendments 169B to 169T make a different point—to try to ensure greater targeting of equipment interference warrants. Clause 95 sets out the subject matter of targeted equipment interference warrants. Clause 95(1)(b) states that the warrant may relate to,
“equipment belonging to, used by or in the possession of a group … who share a common purpose or who carry on, or may carry on, a particular activity”.
Such a broad and potentially large group of people can only in the loosest sense be described as targeted.
Amendment 158J applies the same arguments to targeted examination warrants in Clause 95(2)(b). Similar arguments of not being too broad and not being sufficiently focused apply to Clause 95(1)(f):
“equipment which is being, or may be, used for the purposes of a particular activity or activities of a particular description”.
Instead, Amendment 158H would insert:
“A targeted equipment interference warrant may be issued only if the persons or equipment to which the warrant relates are named or specifically identified using a unique identifier”,
which could, for example, be the IP address for a particular device. Similar wording in Amendment 158M would apply to targeted examination warrants.
It is worth remembering what targeted examination warrants are for. If, as a result of the bulk collection of the content of overseas communications, the security services discover UK-based communications that they want to examine the content of, they must first have a targeted examination warrant. This is to prevent the bulk collection of the content of communications of UK citizens. How then can it be right that such a targeted examination warrant applies to such a broad range of communications as,
“a group of persons who share a common purpose or who carry on, or may carry on, a particular activity”?
If the security services know that the communication is UK-based, they must also know whose communication it is and can therefore specify that in the warrant.
Subsections (1)(g) and (h) and (2)(d) and (e) of Clause 95 make provision for the issuing of targeted equipment interference warrants and targeted examination warrants for the purposes of testing, maintenance of equipment and the training of people. Amendments 158F, 158G, 158K and 158L would leave out those provisions.
In the first Committee sitting we discussed the issuing of interception warrants for the purposes of testing equipment and training agents, and the noble and learned Lord responded to the debate at cols. 105 and 106. In response to the Minister’s explanation, I said that I was still puzzled about training and testing warrants. I accepted that new equipment required testing and individuals needed to be trained in real-life situations but said that I was concerned about who the individuals or organisations were that might be targeted in these training exercises, bearing in mind that the normal provisions regarding proportionality and necessity in terms of suspicions that these individuals were up to no good would presumably not apply in training and testing situations. If they were real bad guys, a non-testing and training warrant could be issued. The noble and learned Lord failed to convince me then, but perhaps he can try again now.
Amendments 169B and 169T make the necessary consequential changes to the requirements that must be met by warrants in terms of the details that must be included in equipment interference warrants. I beg to move.
My Lords, I listened very carefully to the noble Lord, Lord Paddick, and his explanation of his amendments, but I was not at all convinced. If we believe that there is a need for the Bill, which I do, but have reservations about some of the issues around encryption, we have to ensure that the relevant agencies have some tools in their kit box. One of those tools has to be the ability to interfere with or look at the specific equipment. What the noble Lord is trying to do is to restrict the availability of that power to such an extent that it would effectively become almost useless. It would simply be available if you have one named individual. Therefore surely it is right that a significantly broader power should be available to engage here.
The question that the Minister who is going to respond needs to answer is this: how will the test of proportionality be applied in such cases? Presumably it is not proportionate to have such a broad sweep contained within the authorisation that it is inappropriate and overly onerous. The mechanism is therefore this: how is it determined that this is a proportionate and proper use of the power, and can we and the public be reassured that the mechanisms exist to ensure that that proportionality is adhered to?
I am obliged to noble Lords. I know that these are probing amendments and I shall address them in that light. Of course some of these amendments were discussed in the other place and, as noted, were considered again by this Committee in the context of interception.
Amendments 158D to 158M and 169B to 169T would remove the ability of the warrant-requesting agencies to apply for a warrant against an organisation, a group of persons with a common purpose, or a group of persons carrying out the same activity. They would require a warrant to name or identify each person or piece of equipment to which the warrant relates and they would remove the ability to obtain warrants for testing and training activity. As I have already set out when we considered similar amendments in the context of interception, it is important that those responsible for keeping us safe have the powers they need. These amendments would undermine their ability to employ those powers.
Let me start with the amendments regarding unique identifiers. As I explained in the context of interception warrants, it is not always possible at the outset of an investigation to know or have identified all of the individuals who may be subject to a warrant over the course of that investigation. The example of a kidnap gang applies to equipment interference just as it applies to interception. When a warrant is granted against a gang, the person applying for the warrant may not know that there are four members of the gang rather than three. The ability to grant a warrant against the gang in order to establish its size and to identify co-conspirators is precisely why the Bill provides for thematic warrants. Thematic warrants are already available to the equipment interference agencies under the Intelligence Services Act 1994 and the Police Act 1997 and they are invaluable when investigating complex or fast-moving threats. It is right that the Bill should not undermine their ability to do this.
I would seek to reassure your Lordships that the Bill already provides in Clause 107 that the warrant has to describe the relevant persons, locations, activity or groups and the type of equipment to which the warrant relates in so far as it is reasonably practicable to do so. This is an important safeguard which will assist the oversight of thematic targeted warrants. The Investigatory Powers Tribunal recently considered the use of equipment interference in this way. It determined that,
“a warrant is lawful if it is as specific as possible in relation to the property to be covered by the warrant”,
and that,
“it need not be defined by reference to named or identified individuals”.
Let me turn to the amendments that seek to remove the ability to grant a warrant relating to particular subject matters. This was also discussed at some length in the other place and very recently in this Committee, again in the context of interception. Such a change would be operationally damaging and is moreover unnecessary. The Bill and the statutory code of practice impose strict limits on the issue of warrants, including in relation to organisations or groups of persons. I should emphasise that such warrants are not open-ended. Their scope must be sufficiently limited that the issuing authority can properly assess the necessity and proportionality of the interference. Further, under the Bill a judicial commissioner will need to approve the issuing authority’s decision. So the clause does not allow for overly broad warrants to be issued. Moreover, removing the ability to seek warrants against persons carrying out the same activity could prohibit the agencies from, for example, seeking a warrant against individuals accessing a particular website in order to access child abuse images. In such cases it is vital that law enforcement should be able to identify suspects and bring them to justice.
My Lords, as I said earlier in Committee, it is important that, in assessing any proposal made in the Bill, we strike the balance between the need for it and any possible negative consequences, and whether that may weaken the security of a device, enabling the malign elements, as opposed to benign, to penetrate systems. As I understand it, the purpose of the amendment is to try to ensure that that balance is clear in the Bill. It would place an obligation on those seeking warrants and those considering them to look at whether that balance has been struck and ensure that it has.
It is reasonable for those seeking warrants to demonstrate that they have considered whether there are any negative consequences of the action they are prepared to take, particularly if it leads to a weakening of the general security of a wider system that may mean it is prone to attack from cybercriminals or others accordingly, or that there is likely to be a large amount of collateral damage in other people’s information being made available to the authorities.
I make it clear that I do not think the fact that the information of other people who are not the purpose of a warrant may be compromised is necessarily a reason why we should not proceed with this. It should be balanced with the consequences. For example, I can conceive of circumstances where a warrant might be sought for a machine in an internet café. Clearly, that is because certain individuals are thought to be using it. In any application I would want consideration to be given to what would be done about those other, presumably entirely innocent individuals who might use the same machine.
I am concerned that, as part of the process, there should be consideration of the downsides of a particular application: whether it is weakening the system or interfering with the privacy of other people who are not specifically targeted. If either is the case, there should be clear consideration of what can be done to minimise those risks. The fact that another person is not the subject does not necessarily mean that it should not be proceeded with. It is a matter of proportionality—the benefits that will be gained from the action being taken and whether those are properly considered by those making the application and those considering whether to approve it. For those reasons, the amendment is broadly helpful. I hope that Ministers may be prepared to accept this or something like it to provide that assurance.
My Lords, I added my name to Amendments 159 and 160. Amendment 164 is in my name and that of my noble friend Lord Rosser. Our points are much the same as those made by my noble friend Lord Harris. I do not think there will be planting of evidence, for example. Our concern is much more about the risk to any public cybersecurity system, and we would want that to be taken into account. These amendments follow the recommendations of the Joint Committee. The idea is to minimise any potential risks. If, for example, the Secretary of State has to take into account any risk to the security and integrity of the networks, that by itself will ensure that any applicant sets that out in the form they submit. We hope the Government will respond, as my noble friend Lord Harris said, not necessarily by using these exact words but in the spirit of these amendments in order to retain overall security.
(8 years, 7 months ago)
Lords ChamberMy Lords, Amendment 93 stands in my name and that of my noble friend Lord Rosser and is on the same issue of encryption. Encryption is fundamental to keeping the whole of the digital economy safe and secure. It is widely used by business, government and consumers to protect sensitive and confidential information and as a building block in the advanced security technology which has been described.
The undermining of encryption would not simply mean that the communications of criminals could be read more easily; it would risk creating a major vulnerability in the security infrastructure, which could be exploited by various malicious actors, be they criminal gangs or rogue states. So it is important for this economy and for all the financial and other businesses that depend on it that the foundations of encryption technology remain absolutely firm.
There will be times when state security undoubtedly needs access to encrypted information for a specific investigation. This is not the problem. The problem is whether the Government would ever require a company to engineer such access, enforcing the company to create a model which, if then followed by other nations with perhaps less security than ours, would lead to a lowering of standards. We welcome the statement by the Government that they do not require industry to build back doors into their encrypted products. The Bill as it stands is perhaps not as clear as the commitments the Government have made.
Clause 226 risks making encryption intrinsically weaker if a company could be asked to build the ability to break the encryption. Amendment 93 seeks to address that. We hope the Government will understand that, when the request is made, they should not ask a company to develop a new way of breaking encryption that is not already within its ability. At the moment, the clause implies that, where companies that did not have the ability to remove the protection were issued with a notice, they would be required to build that capability so as to adhere to the notice. That is worrying the companies because of the general undermining of encryption. End-to-end encryption is essential to protect sensitive personal, commercial and security information. I think the Government share our concern that we should maintain that.
The thrust of Amendment 93 makes it explicit that a company would be required to remove the electronic protection only where it had the current capacity to do so and that it should not have to engineer it. We hope it will be accepted by the Government.
My Lords, first, I should draw attention to my interests in the register on policing and counterterrorism matters. Secondly, I should make clear that my starting point on the Bill is that it is important that the developing gaps in access to communications data are addressed to protect the nation against all sorts of threats.
In any set of counterterrorism or counterespionage measures, or whatever else it might be, you have to look at the balance and weigh the benefit to the nation in protecting its citizens by having those powers against the potential downside or consequences of exercising them.
When we come to the question contained in this group of amendments—essentially about enabling or requiring companies to break the apparent encryption—we have to look carefully at the potential downsides presented by this. The first downside, or danger, is that by enabling this to happen—by creating the mechanism and requiring companies, as my noble friend Lady Hayter said, to make new arrangements so that encryption can be broken—you create a back-door mechanism. This would be available not just to the forces of good—those who are trying to protect all our security—but to cybercriminals and those who would do us ill. Therefore you need to weigh clearly what you are trying to do against whether you are creating something that will make it easier for criminals and those who would do us harm.
The second element is the extent to which what we do in this country sets a precedent that will be seized in other countries, whose interests may not be the same as ours or as positive as ours towards their citizenry. If we create that precedent, what is to prevent Governments in other countries saying that they want the same powers and therefore doing the same? That test has to be applied to quite a number of the measures in the Bill. As I say, my starting point is that I want the state to be able to fill the gap in its access to communications data that is emerging and opening up. However, I want to hear from the Government a clear explanation of why in this set of cases the benefits outweigh the potential disbenefits.
My Lords, a number of amendments here separately seek to remove the encryption provisions from Part 9 or propose modifications to them.
I will begin with Amendments 92, 102 and 103, which propose removing the encryption provisions from Clauses 226 and 228. If these are anything other than probing amendments, I have to say that they are irresponsible proposals, which would remove the Government’s ability to give a technical capability notice to telecommunications operators requiring them to remove encryption from the communications of criminals, terrorists and foreign spies. This is a vital power, without which the ability of the police and intelligence agencies to intercept communications in an intelligible form would be considerably diluted.
Let me be clear: the Government recognise the importance of encryption. Encryption keeps people’s personal data and intellectual property secure and ensures safe online commerce. The Government work closely with industry and businesses to improve their cybersecurity. However, law enforcement and the intelligence agencies must retain the ability to require telecommunications operators to remove encryption in limited circumstances—subject to strong controls and safeguards—to address the increasing technical sophistication of those who would seek to do us harm.
Encryption is now almost ubiquitous and is the default setting for most IT products and online services. If we do not provide for access to encrypted communications when it is necessary and proportionate to do so, we must simply accept that there can be areas online beyond the reach of the law, where criminals can go about their business unimpeded and without the risk of detection. That cannot be right.
These provisions simply maintain the current legal position in relation to encryption and go no further. They retain the ability of law enforcement and the security and intelligence agencies to require companies to remove encryption that they have applied, or that has been applied on their behalf, in tightly prescribed circumstances. It would not—and under the Bill could not—be used to ask companies to do anything that it is not reasonably practicable for them to do.
The safeguards that apply to the use of these provisions have been strengthened during the Bill’s passage through Parliament. First, the “double-lock” authorisation process now applies to the giving of notices, which means that a judicial commissioner must approve the Secretary of State’s decision to give a notice. The Secretary of State must also consult the relevant operator before a notice is given. The draft codes of practice, which were published alongside the introduction of the Bill, make clear that should the telecommunications operator have concerns about the reasonableness, cost or technical feasibility of any requirements to be set out in the notice—which includes any obligations relating to the removal of encryption—it should raise them during the consultation process. Furthermore, the new privacy clause in the Bill requires that regard be given by the Secretary of State to the public interest in the integrity and security of telecommunications systems when deciding whether to give a technical capability notice.
My Lords, can the Minister clarify for me—I am sure that other noble Lords have got to the point precisely—that the requirements that the Bill seeks to create will apply only where a service provider has offered a service which most people might assume is secure and encrypted but has built in an existing arrangement which allows it to access it? Would it apply only in those circumstances? If that is not the case, perhaps the Minister could explain in what other circumstances it might apply. Can he further tell us whether there is an expectation in the Bill that, where a service provider is developing a new service, it must ensure that it has the facility to access what the user would assume are encrypted data?
The answer to both questions is that it depends on what is reasonably practicable for the communications service provider. The power will apply usually to encryption that the provider has applied or has been applied on its behalf. If there are other circumstances where it would apply, I will take advice and write to the noble Lord, but we come back to what is reasonably practicable for the company. It is why the Government maintain a dialogue with communications service providers to ascertain what is practicable and what is not, and what would be cost effective and what would not be. However, broadly speaking, the noble Lord was right.
I am sorry to press the point, but I need to understand it. I understand the Minister’s answer in respect of the requirement applying where it is reasonably practicable because the encryption arrangement has been applied by the service provider, but is he saying that there is an expectation that in building new services a service provider should create something where it is technically possible for it to undermine that encryption? If so, that would raise a very different point which is important to clarify. Is the service provider required to make it technically practicable in future services as it develops them for this to be allowed?
It might be, but it might not be. Again, it depends on what is reasonably practicable in the particular circumstances. Those circumstances might vary from provider to provider and from situation to situation, so it is not possible for me to generalise about this, but I will take further advice and write to the noble Lord about it.
I was certainly not implying that the Government wished to ban end-to-end encryption; in fact, we do not seek to ban any kind of encryption. However, there will be circumstances where it is reasonably practicable for a company to build in a facility to de-encrypt the contents of communication. It is not possible to generalise in this situation. I am advised that the Apple case to which the noble Lord referred could not occur in this country in the same way.
Is the Minister therefore saying the Government’s expectation is that service providers will in future ensure that it is reasonably practicable for them to access those communications? If that is the case, I think that he is raising a whole new group of issues.
The Bill is clear that any attempt to obtain communications data must be necessary and proportionate, or it will not be permitted. It is crucial that the Bill provides a robust, legal framework which means that the law is consistently applied correctly. That is why we are introducing the double lock involving judges signing off warrants for the most intrusive powers, which means that the Secretary of State’s decisions, other than in the most urgent cases, will be independently scrutinised before warrants can be issued. I come back to the central point here, which relates to encryption: we do not think that companies should provide safe spaces to terrorists and other criminals in which to communicate. They should maintain the ability when presented with an authorisation under UK law to access those communications.
(8 years, 10 months ago)
Lords ChamberIf I was in a position to make the statement today, I am sure the noble Lord appreciates that I would do so. He may be familiar with the wheels of government and with the requirement for these matters to be approved at various levels before a final statement is made. If I was in a position to make that statement, I reassure the noble Lord that I would not hesitate to make it.
But this is Third Reading. Is there not a sense of urgency in these matters?
There is certainly a sense of urgency in this matter and that is why I expressed my apology to the House and the noble Baroness, Lady Lister. I had indicated that by Third Reading I would be in a position to confirm the Government’s position on this. However, it is a matter that requires detailed consideration. It is a matter that has ramifications. It is a matter that has to be considered in conjunction with Home Office guidelines. It is a matter that must be consulted on and finally approved before issue, and it is for that reason that, regrettably, there has been a period of delay in respect of this point.
I underline that it will not involve an absolute prohibition. It will, however, involve a very limited power of detention to be exercised only in exceptional circumstances and for a very limited period. That is what is anticipated at present. As I sought to point out on Report, it is simply not practicable to have an absolute bar in respect of pregnant women. There are circumstances in which, for example, a pregnant woman arriving at an airport or a port, clearly with no right at all to enter the United Kingdom, may present either a security risk or a risk of absconding, and without any power of detention it would be quite impossible to arrange her return at that time of arrival. Therefore, in these circumstances, I urge the noble Baroness to withdraw her amendment.
(11 years, 4 months ago)
Lords ChamberMy Lords, I am really pleased to hear what my noble friend says. There is great interest in this issue, particularly in the different types of military working dogs. I have asked my department to put in the Library a list of all the different types of specialist and protection dogs, as well as the reasons why a small number of working dogs were killed during the past three years—I think that it was two this year, one the year before and one the year before that—along with information on the number of dogs that were put to sleep and the reasons for that.
My Lords, I accept that this Question is primarily about the rehoming of military dogs, but is there not also a problem with the substantial number of ex-servicemen who end up sleeping on our streets because they are not afforded the proper moves into civilian life? I would be grateful, if he cannot do so today, if the Minister could perhaps report to the House at some future stage on the steps being taken to ensure that ex-service personnel are treated appropriately by this society?
My Lords, I am very happy to do that at a future point in a defence debate, but this is a good-news story about what we are doing for military dogs. I am very unhappy to see us going off-piste.
(11 years, 10 months ago)
Lords Chamber
To ask Her Majesty’s Government what is their policy on the deployment of autonomous weapon systems by United Kingdom Armed Forces.
My Lords, I declare an interest as an adviser to Lockheed Martin, although not on its defence business. I beg leave to ask the Question standing in my name on the Order Paper.
My Lords, the United Kingdom does not have fully autonomous weapon systems. Such systems are not yet in existence and are not likely to be for many years, if at all. There are currently a limited number of naval defensive systems that could operate in automatic mode, although there would always be naval personnel involved in setting the parameters of any such operation. I must emphasise that any type of weapon system would be used only in strict adherence with international humanitarian law.
My Lords, I am grateful to the Minister for that reply. Is it the view of Her Majesty’s Government that there is a world of difference between a drone operated remotely from several hundred or thousands of miles away and one that is automatic and involves no human intervention before it discharges? In that context, will he tell us a bit more about the Mantis development by BAE Systems, which I understand is supported and funded by the UK’s Ministry of Defence, which the BAE Systems website describes as,
“Able to fly by itself, able to think for itself”?
My Lords, I agree with the noble Lord. As I said in the original Answer, the UK complies fully with its obligations under national and international law, and that applies to autonomous weapon systems. However, although technological advances are likely to increase the level of automation in some systems, just as in non-military equipment, such as cars, the MoD currently has no intention of developing systems that operate without human intervention.
As for Mantis, the MoD initiated a jointly funded advanced concept technology demonstrator in 2008, which led to flight trials in 2009. The MoD has no current involvement in BAE Systems’ Mantis advanced concept technology demonstrator.
(12 years, 3 months ago)
Lords ChamberMy Lords, my noble friend makes a very good point. It was not just the Armed Forces but huge numbers of people, including my noble friends Lord Coe and Lord Deighton, and as my noble friend Lord Addington said, the huge numbers of volunteers, who helped to make it such a successful Olympic and Paralympic Games.
Could the Minister tell us how many government contracts for infrastructure support are going to G4S in future, and whether the armed services will be ready to step in if need be in the event of G4S again failing to win a gold for logistics?
My Lords, I am very sorry to disappoint the noble Lord but I am unable to answer that question.