Feeds

Cops and Home Office plot uber-CCTV network

Tracking all of the people, all of the time

The Power of One Infographic

ANPR, of course, allows vehicles (well, numberplates, anyway) to be secretly, automatically located and tracked nationwide in large numbers, as it costs much less per vehicle than a surveillance team. Facial recognition could allow the same to be done with actual people.

This kind of data can be very handy. The classic example might involve hooking up a ring of ANPR cams around the national capital to a database of heavy trucks normally operating in - let us say - certain intensively-monitored places in Northern Ireland. One could tell the computer to flag up any HGV approaching the City of London having recently been in South Armagh, for instance. That won't necessarily foil the enemy, but it makes his job harder.

Near-real-time use of nationwide CCTV may not be an option now, but the government would like it to be. The two main requirements, of course, would be a central database of every camera and a network allowing access to it from elsewhere than a local control room, shop till etc. Consider these repetitious grumbles from the report:

The [Data Protection Act] does not require CCTV systems to be registered – this is considered to be at the heart of all the problems...

No effective systems for registration of CCTV are in place...

[There is] no central register of CCTV systems nationwide...

The answer?

A system of registration is needed and an initial step towards this would be to create a database listing all CCTV schemes. Such a database would provide information such as location of cameras, their coverage...

Bingo. Step one to a real Bourne-style panopticon. And:

Only in a few of the more recent installations is there remote access... on almost every occasion where police need to view CCTV material, they first have to attend the venue... This is all prior to assessing if the CCTV has even captured the event...

This is assumed to be bad. Again, the top cops have plans:

The delays and difficulties outlined above need not arise if the live and stored CCTV systems were networked and the CCTV material was easily accessible... Consideration needs to be given to the expansion of the networks to include CCTV from shopping centres, transport and commercial CCTV schemes.

There's even a note about plugging in the cams in the corner shop - strictly with the owner's permission of course. And it comes with the admission that:

Security, access and audit trails need to be stringent and continuing management scrutiny of the security, access and audit trails will be essential.

No shit. This is actually worse than what Jason Bourne has to put up with, as the spooks would one day have no need to know where he was to start following him on camera. Rather, the second he drove the wrong car, used the wrong credit card - or maybe even just took down the top of his hoodie - ding! Nearby cams would swivel round and he would be followed in real time until the cold steel bracelets snapped shut on his wrists.

Honest, that's the plan:

In future, as technology is developed... such a network will allow the use of automated search techniques (i.e. face recognition) and can be integrated with other systems such as ANPR, and police despatch systems... [there might also be links of] transport system cameras to travel cards [and] shop cameras to Electronic Point of Sale (EPOS) systems... actions can be triggered by associated events and post event CCTV images can be quickly searched against other events/data...

The Power of One Brief: Top reasons to choose HP BladeSystem

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.