Feeds

UK police chase pics, email, phone records in bomber hunt

W R all CCTV

  • alert
  • submit to reddit

Security for virtualized datacentres

London police have asked the public to turn in mobile phone still and video pictures as they hunt the terrorists behind last Thursday‘s bomb attacks on the UK capital.

The call came as Britain’s authorities sought to secure email and mobile phone records as they continue their hunt for the bombers.

Much of the media networks’ coverage of the bombings came from stills and video captured on camera phones and other mobile devices.

London’s Metropolitan Police on Sunday asked people who captured images on Thursday, both before and after the bombings, and either in or close to the areas where the bombings happened, to forward them to images@met.police.uk.

"These images may contain crucial information which could help detectives in what is a painstaking and complex inquiry,“ said the head of the Met's Anti-Terrorist Branch, Deputy Assistant Commissioner Peter Clarke.

Meanwhile, UK authorities have begun contacting ISPs as they looks for leads on the bombers. El Reg has received reports that individuals trying to cancel accounts with providers have been told they can‘t, as security services have already told providers to freeze all accounts.

The Observer reported today that authorities had asked service providers to provide any information deemed relevant. At present there is no requirement to comply, but this may not be the case for long.

The Observer said UK home secretary, Charles Clarke, will this week propose new data retention measures covering mobile phone and internet service providers at an emergency meeting of European Union interior ministers on the implications of the bombings. Clarke will also apply pressure on areas such as law enforcement databases, tracking passports and movements of explosives. Clarke has said he believes authorities might have been able to prevent the bombings if they had access to such data.

Clarke’s efforts could revitalise EU efforts to require providers to retain data for at least years. As of last month the initiative seemed moribund, as member states pushed the program while the EU parliament battled against it.®

Related stories

For ambulance-chasing bloggers, tragedy equals opportunity
VXers release 'London bombing' Trojan
Don't let bombs become political ammo
London locks down after terror attack

Remote control for virtualized desktops

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.