Feeds

Panicky Plod apologises to Innocent Terror Techie

Watch your knapsack

Top three mobile application threats

A Reg contributor who was unlawfully arrested and had his home PCs inspected by the Met has received an apology from the police after four years.

David Mery was wearing a coat "too warm for the season" and was carrying a laptop - according to the police who arrested him at Southwark Tube station, the day after the second wave of London bombings in 2005.

The Police made a search under the Prevention of Terrorism Act but having found nothing suspicious and Mery co-operative, were set to release him. Then decided to make an arrest on grounds that he was a public nuisance.

"I was arrested for a made up offence most likely in order to justify their having closed the tube station," Mery says.

The Police's own self-policing bureaucracy failed - with the Met's own "Directorate of Professional Standards" arguing that there were reasonable grounds for arrest. It decided to make an exception.

I would like to apologise on behalf of the Metropolitan Police Service for the circumstances that arose on 28 July 2005 including your unlawful arrest, detention and search of your home. I appreciate this has had a deep and traumatic impact on your lives and I hope that the settlement in this case can bring some closure to this.

I shall ensure that the officers concerned are made aware of the impact of the events of that day and also the details of the settlement in this case.

Mery also asked that the police destroy his DNA samples and delete his PNC record and they have finally agreed - although police insist they must keep innocent people's data. He wrote a guide on how to delete your DNA evidence for the Reg.

You can read the four year saga here. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
US Supreme Court supremo rakes Aereo lawman in oral arguments
Antenna-array content streamers: 'Ruling against us could dissipate the cloud'
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.