Feeds

Panicky Plod apologises to Innocent Terror Techie

Watch your knapsack

Maximizing your infrastructure through virtualization

A Reg contributor who was unlawfully arrested and had his home PCs inspected by the Met has received an apology from the police after four years.

David Mery was wearing a coat "too warm for the season" and was carrying a laptop - according to the police who arrested him at Southwark Tube station, the day after the second wave of London bombings in 2005.

The Police made a search under the Prevention of Terrorism Act but having found nothing suspicious and Mery co-operative, were set to release him. Then decided to make an arrest on grounds that he was a public nuisance.

"I was arrested for a made up offence most likely in order to justify their having closed the tube station," Mery says.

The Police's own self-policing bureaucracy failed - with the Met's own "Directorate of Professional Standards" arguing that there were reasonable grounds for arrest. It decided to make an exception.

I would like to apologise on behalf of the Metropolitan Police Service for the circumstances that arose on 28 July 2005 including your unlawful arrest, detention and search of your home. I appreciate this has had a deep and traumatic impact on your lives and I hope that the settlement in this case can bring some closure to this.

I shall ensure that the officers concerned are made aware of the impact of the events of that day and also the details of the settlement in this case.

Mery also asked that the police destroy his DNA samples and delete his PNC record and they have finally agreed - although police insist they must keep innocent people's data. He wrote a guide on how to delete your DNA evidence for the Reg.

You can read the four year saga here. ®

Application security programs and practises

More from The Register

next story
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
US Social Security 'wasted $300 million on an IT BOONDOGGLE'
Scrutiny committee bods probe derailed database project
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Australia floats website blocks and ISP liability to stop copyright thieves
Big Content could get the right to order ISPs to stop traffic
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.