Feeds

City Police still using Terror Act to bother photographers

Just when you thought it was safe to go snapping...

The essential guide to IT transformation

Smith attempted to obtain further explanation from the police in respect of their actions. He claims: "The answer they gave was because of my obstructive and non-compliant attitude."

At the end of the search, the police departed, having failed to return Smith’s mobile phone to him. This, in ordinary circumstances, might be considered theft - although s.45(2) of the Terrorism Act does entitle a PC to seize any item which "he reasonably suspects is intended to be used in connection with terrorism".

The difficulty in this case is that if the PC genuinely believed Smith to be carrying the tools of terror on him, it was clearly perverse to leave him free to carry out the rest of his mission, photographing buildings around the City of London.

We asked the City of London Police to comment on this incident – specifically asking them for their views on the removal of the phone and whether it constituted theft. An official spokeswoman told us: "A man was spoken to by officers yesterday after police were called by security personnel. He was later searched under terrorism powers."

What about the phone? No comment.

What about suggestions that the City of London continues to abuse s44 powers long after other forces have learned their lesson? She added: "We continue to work to make sure the city remains a safe place to work and visit."

Unless, presumably, your work includes taking photographs, in which case the safety of neither yourself nor your property can be guaranteed. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
Apple tried to get a ban on Galaxy, judge said: NO, NO, NO
Judge Koh refuses Samsung ban for the third time
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.