Feeds

Mayor Ken's Low Emission Zone - a load of hot air?

Motorist surveillance goes orbital

Beginner's guide to SSL certificates

Extending the camera zone

TfL, characteristically, has not mentioned privacy at all, if there are to be camera based systems at many locations across the LEZ, the system must by definition capture the VRM (number plate) of all vehicles passing it - whether or not they are required to pay any congestion or pollution charges. Of course, the system may then discard the data for all vehicles that are exempt from the charge.

TfL also mentions that it may consider including the sections of the M1, M4, M11, and A3113 that are within the M25 in the LEZ; currently doing so would require the approval of the Secretary of State. However, that may not necessarily be needed as at some point very soon a Transport Bill will be presented to Parliament which will enable councils to introduce road charging on a "trial basis".

To avoid over-complicating matters by involving other councils, the LEZ will cover the 33 Greater London boroughs, which is not quite the whole M25 area. But depending on the pervasiveness of the monitoring equipment it could potentially form an "instant" extended charge zone, or maybe just a snooping and surveillance one.

As to the costs of the Low Emission Zone, if a transport company has no choice but to buy new vehicles or pay the charge, then it logically follows that significant elements of this will be passed on ultimately to consumers - you and me. Unless we happen to be driving a foreign registered vehicle.

So there will certainly be less pollution in the Greater London Area - which is clearly good news, as a former cyclist in Central London I certainly welcome it.

But with barely a mention of it in Ken's gleaming press releases, we will be in a situation where every vehicle can be tracked and traced - and I don't recall seeing that in any manifesto, or recall Londoners being given the option to vote on it. Remember, once the system is in, there is no turning back, or getting away from it.

Of course, it is possible that TfL is either not aware of the issues - or has hoped no one will notice. ®

Jason Scrutton was the risk manager for the contractor who delivered the London Congestion Charging project, and currently assists his clients with stakeholder engagement and congestion management. Until recently, he regularly used to cycle from east to west London.

Security for virtualized datacentres

More from The Register

next story
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.