Feeds

Project Champion Report misses targets

On CCTV, privacy, data protection...

  • alert
  • submit to reddit

The essential guide to IT transformation

I should add this thought. The Home Secretary from this time was Jacqui Smith, the West Midlands MP for Redditch, who had signed the Transport for London Certificate. Is it credible that she was kept in the dark about the mass CCTV surveillance in Birmingham, the nearby major city? So perhaps someone should ask her to comment on the obvious Watergate questions: what did she know and when did she know it?

Let’s also be clear what I am concluding about the Report. I think the report into Project Champion is assuming that the system was supposed to become a “normal” CCTV system and its recommendations relate to a failure in implementing a “normal” CCTV system (ie one that relates to general policing).

However if the CCTV/ANPR system was NEVER intended to be a normal CCTV system then it had nothing to do with normal policing. It follows that the Report’s analysis is likely to have begun from the wrong starting point and this could jeopardise some of its conclusions (important though they are for normal policing).

That is why I suspect the report into Project Champion may be incomplete. It has missed out on the real issues that surround such mass surveillance by not discussing the effect of the national security exemption.

The fact is that there is no effective counter-balance to this national security exemption that leaves society very exposed to similar mass surveillance systems in future. If you don’t believe me on this one, you should read my Transport for London blog below and look at the corresponding Certificate.

The Project Champion Report is here (pdf). The press release saying the cameras have not been switched on is here.

Here's the blog about the Transport for London (TfL) Congestion Charge Cameras. This explains why that the national exemption is so broad that it permits the disclosure of CCTV/ANPR images to anybody on the planet (eg any national government agency including the unsavoury ones) for any purpose (eg for a purpose that has nothing to do with crime and national security).

The TfL National Security Certificate is here (pdf).

(Note – just to be sure: This blog relates to the data protection considerations that relate to surveillance when it is overt (ie by CCTV cameras visible to the public); I am not considering covert surveillance by hidden cameras that is subject to RIPA.)

The essential guide to IT transformation

More from The Register

next story
Super Cali signs a kill-switch, campaigners say it's atrocious
Remote-death button bad news for crooks, protesters – and great news for hackers?
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.