Feeds

Police slam internet justice - then use it themselves

What is contempt anyway?

Beginner's guide to SSL certificates

Safer Neighbourhoods Chief Inspector Rick Tyson, said: "We always try to offer support in the first instance and did so in this case. However we had to take matters further due to the persistence of the women's behaviour and the needs and concerns of the local community."

Of course, with no trial in the offing, there is no suggestion that such actions would endanger prosecutions. However, the issue that many critics of ASBOs have raised is that they are very odd law: once an ASBO has been granted in respect of a specific piece of behaviour, the ASBOed needs only subsequently to cause a neighbour "alarm" or "distress" for the full weight of the ASBO to be triggered, and the individual to receive a criminal conviction.

Catherine Stephenson of the International Union of Sex Workers (IUSW) told us: "Placing these women’s pictures on the police website might be considered not unlike painting a target on their backs, encouraging neighbours to make complaints, or worse, outing them to anyone with a grudge against sex workers."

While the Met does wait for some form of legal sanction before publicising individual details, City Police went a step further, taking the News of the World out on patrol and allowing their photographer to snap away as the police raided two Polish women who were selling sex from their home in Aldgate, East London.

The women were subsequently not charged, but the damage was done: their pics, with faces obscured, but otherwise according to the women recognisable from other details, appeared shortly after in the News of the World.

City Police told us: "ACPO guidelines clearly state that working with the media on operations can assist in the prevention and detection of crime. It is important that our community is aware of the work the force is carrying out to respond to its concerns and reduce crime in the City."

However, publication of such pictures is quite possibly prejudicial, could possibly incite a complaint and might be damaging to the legal process should any of the individuals ever come to trial.

It may be time for the police and courts to instil some consistency when it comes to making details of possible criminals public. ®

Security for virtualized datacentres

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Big Content outs piracy hotbeds: São Paulo, Beijing ... TORONTO?
MPAA calls Canadians a bunch of bootlegging movie thieves
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.