Feeds

Petty crimes, 150,000 kids and a million new records

Police DNA database under fire

SANS - Survey on application security programs

Have you ever used one of those machines at a fairground or on a seaside pier? You know, the ones that stretch a penny out, imprinting it with a touristy message and the date of your holiday?

Well, get yourself down to the local nick and hand over your fingerprints and a DNA sample immediately, because defacing a coin is one of 5,000 offences that will qualify you for inclusion on the Police National Computer, according to a report from The Association of Chief Police Officers (ACPO).

Other qualifying crimes include picking wildflowers, cruelty to a badger and attempting to kill yourself.

Deletion of a record will remain "exceptional", and only at the discretion of a chief of police. ACPO sets out guidelines for cases where this discretion might be exercised, for example in the case of an unlawful arrest or sampling, or when it is "established beyond reasonable doubt that no offence existed".

Which sounds rather like "guilty until proven innocent" to us, but what would we know?

ACPO says it has now clarified the difference between records being held for police work and records being held for other purposes. The report says that access to the records of anyone not convicted of an offence will be restricted to police only, but that the record will not be destroyed.

"The record will be retained on PNC until that person is deemed to have reached 100 years of age," the report says.

The PNC now contains over 4.5 million records, and according to the Liberal Democrats more than one million new names have been added to the database in the last ten months. Liberal Democrat Shadow Home Secretary Nick Clegg MP said in a statement that more than 150,000 children under 16 have now been profiled and their records stored, adding:

"These figures underline the shocking extent to which this database has intruded, often without parental consent, into the lives of our children. Thousands of these children will have been found guilty of no crime, yet samples of their DNA will remain on file for life.

"The disturbing and illiberal policy of adding a child's most personal information to a massive government computer system, simply on the grounds of an accusation, must stop immediately." ®

High performance access to file storage

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.