Feeds

Project Champion Report misses targets

On CCTV, privacy, data protection...

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

I should add this thought. The Home Secretary from this time was Jacqui Smith, the West Midlands MP for Redditch, who had signed the Transport for London Certificate. Is it credible that she was kept in the dark about the mass CCTV surveillance in Birmingham, the nearby major city? So perhaps someone should ask her to comment on the obvious Watergate questions: what did she know and when did she know it?

Let’s also be clear what I am concluding about the Report. I think the report into Project Champion is assuming that the system was supposed to become a “normal” CCTV system and its recommendations relate to a failure in implementing a “normal” CCTV system (ie one that relates to general policing).

However if the CCTV/ANPR system was NEVER intended to be a normal CCTV system then it had nothing to do with normal policing. It follows that the Report’s analysis is likely to have begun from the wrong starting point and this could jeopardise some of its conclusions (important though they are for normal policing).

That is why I suspect the report into Project Champion may be incomplete. It has missed out on the real issues that surround such mass surveillance by not discussing the effect of the national security exemption.

The fact is that there is no effective counter-balance to this national security exemption that leaves society very exposed to similar mass surveillance systems in future. If you don’t believe me on this one, you should read my Transport for London blog below and look at the corresponding Certificate.

The Project Champion Report is here (pdf). The press release saying the cameras have not been switched on is here.

Here's the blog about the Transport for London (TfL) Congestion Charge Cameras. This explains why that the national exemption is so broad that it permits the disclosure of CCTV/ANPR images to anybody on the planet (eg any national government agency including the unsavoury ones) for any purpose (eg for a purpose that has nothing to do with crime and national security).

The TfL National Security Certificate is here (pdf).

(Note – just to be sure: This blog relates to the data protection considerations that relate to surveillance when it is overt (ie by CCTV cameras visible to the public); I am not considering covert surveillance by hidden cameras that is subject to RIPA.)

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.