Feeds

Interpol chief slams UK on terror database cooperation

Too much toothpaste panic, not enough checks on suspects

The Power of One Infographic

The boss of Interpol has slammed Britain's procedures for monitoring suspected international terrorists.

In a newspaper interview at the weekend, secretary general Ronald Noble charged that UK authorities do not check immigrants against Interpol's database of 11,000 suspects.

He told The Sunday Telegraph: "The UK Government really needs to catch up and realise that unless it consults global databases for passports, names and photographs then it risks letting dangerous people roam free."

According to to the BBC, the Home Office insists border officials are "aware" of the list. Interpol's figures record about 50 immigration checks against its list per month, compared to 700,000 by French authorities.

The UK does not share its own watch-list through Interpol. British security services rely mostly on country-by-country bilateral intelligence agreements, rather than international databases.

"The guys detained last week could be wanted, arrested or convicted anywhere in the world and the UK would not know," Noble said, referring to the suspects in the failed car bombings in London and Glasgow.

Noble's comments to the press come on the back of his open letter last week, which he used to question the emphasis on baggage checks at airports. He noted: "Few, if any, of the thousands of non-nationals arrested and jailed worldwide have their fingerprints checked against global databases to ascertain their true identity or to verify if they are wanted or known by other countries.

"But try to carry a bottle of spring water onto a plane and you will be stopped in your tracks."®

Maximizing your infrastructure through virtualization

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.