Use of telecommunications data in fighting crime legally and effectively.

Slides:



Advertisements
Similar presentations
SURVEILLANCE: opportunities and pitfall David Matthias QC and Ryan Kohli.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Overview of the Regulation of Investigatory Powers Act 2000 Andrew Charlesworth University of Warwick 10 June 2002.
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Internet surveillance in the UK Ian Brown. Signals intelligence Everybody’s at it: Echelon Frenchelon Multinationals “We steal secrets with espionage,
Computer and Data Security Laws and Regulations --short most basic version-- Nicolas T. Courtois - University College of London.
1 ICN Cartel Workshop 2013 South Africa Plenary I: Alternative Means of Cartel Detection (AGENCY ONLY) Stephen Blake Senior Director - Cartels and Criminal.
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
RIPA & The Protection of Freedoms Act 2012 Tim Glews
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
PACESetters 1 Purchasing Card (P-Card)Practices for a Transparent World presented by the Division of Finance July 1, 2013.
$$$$$$$ Know your Money! Financial Institutions and Services.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
RIPA John Riddell Weightmans LLP 12 th February 2015.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Information Commissioner’s Office: data protection Judith Jones Senior Policy Officer Strategic Liaison – public security 16 November 2011.
Waiting for the “Access” Axe to Fall: New Investigatory Assistance Legislation for Canada PST-2005 St Andrews, NB David A Townsend UNB-Law & NRC-IIT 12.
Forensic Surveillance techniques Profiling techniques
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
Law and Terrorism “The laws will thus not be silent in time of war, but they will speak with a somewhat different voice.” Chief Justice Rehnquist.
Parliamentary Oversight of Internal Security Forces Basic oversight features in liberal democracies: the role of Parliaments vis-à-vis internal security.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Complaints by Older Adults against Financial Institutions Examples and Possible solutions By Conor Cashman Senior Investigator.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
PRIVACY. In pairs Work out a definition of the word PRIVACY that you think makes sense You’ve got about 7 minutes...
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Chapter 18 - The Fourth Amendment and National Security.
Police ANPR Systems Surveillance camera Code of Practice An overview Presented by:Bill Mandeville Date:23 rd October 2013.
Payment Methods There are many ways to pay for goods and services.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Ioannis Iglezakis Directive on privacy and electronic communications.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Judgment of the Court of the European Union (Grand chamber) Retention of Telecommunications Data Holly Raiche Director, Internet Society of Australia.
Public Records Overview and Case Update: September 11, 2015 presentation Patricia Gleason Special Counsel for Open Government.
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
ISPs – Internet’s Secret Police? Ian Kerr Canada Research Chair in Ethics, Law & Technology Université D’ Ottawa University of Ottawa Faculté de droit.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Regulation of Personal Information Sally Brierley & Emma Harvey.
MLA FOR ASSET TRACING & RECOVERY INVESTIGATIONS: INTELLIGENCE & EVIDENCE.
Surveillance techniques Essential surveillance techniques available to landlords, providing evidential footage for civil and criminal cases when tackling.
Communications Data Consultations on access and a Code of Practice for voluntary retention Simon Watkin Home Office.
Digital evidence in criminal proceedings: legal considerations Arkadiusz Lach Department of Criminal Procedure Faculty of Law University of Nicolaus Copernicus.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
Community Safety Connect Steven Hume Community Safety and Security Manager.
NAFN Data and Intelligence Services. Introduction Established in 1996 One stop for all data and intelligence services Around 90% of local authorities.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
UNSW CLE 19 July Privacy and Law enforcement in the on-line world – the bigger picture. Nigel Waters Convenor, Australian Privacy Charter Council.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
© South-Western Educational Publishing Chapter 17 Credit Records and Laws Establishing Good Credit Credit Ratings and Legal Protection.
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Chapter © 2010 South-Western, Cengage Learning Checking Accounts and Banking Services Checking Accounts Banking Services and Fees 9.
Data protection—training materials [Name and details of speaker]
EU Data Retention Directive Team 5 March 21 st, 2006 Jeff Barger Jin Qiu Hunang Tim Schultz Tim Reiner.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Law School Privacy and Security on the Internet: the Balance between National Interest, Individual Civil Liberties and the Global Society Ian King Law.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Surveillance around the world
Title I Equipment Inventory Requirements
DRAFT POLICY GUIDELINES
Data Protection Act and Other Laws
Title I Equipment Inventory Requirements
ANALYSIS OF CELL PHONES
Data Protection principles
FOR YOUR EYES ONLY ‘They that can give up essential liberties to obtain a little temporary safety deserve neither liberty nor safety’ Benjamin Franklin.
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Use of telecommunications data in fighting crime legally and effectively

Prism Snoopers’ charter (the draft Communications Data Bill) Data retention GCHQ Edward Snowden Edward Snowden’s girlfriend

RIPA DNA Catching baddies assuming that this is a good thing Freedom and responsibility Liberty and security Feeling safe

RIPA (Regulation of Investigatory Powers Act 2000) – Part 1 Communications Chapter 1 Interception Chapter 2 Acquisition and disclosure of communications data – Part 2 Surveillance and covert human intelligence sources – Part 3 Investigation of encrypted data – Part 4 Scrutiny

One of the most useful tools in crime detection Significant in many high profile cases: – Holly Wells and Jessica Chapman – Letisha Shakespeare and Charlene Ellis – Rochdale sex trafficking gang In 2012 there were 870 vulnerable person cases in the West Midlands where telecoms data played a significant role in making the person safe

Oversight by IOCCO Code of practice All data requests must be: – Necessary – Proportional and must avoid – Collateral intrusion Managed process with statutory levels of sign-off

It is NOT the content of any communications It is: – Subscriber data (who) – Service use data (when) – Traffic data (where)

Subscriber Data relates to information held or obtained by a Communications Service Provider (CSP) in relation to a customer (e.g. name and address of account holder of an address)

Service Use Data is information relating to the use made by any person of a communications service (e.g. itemised telephone call records showing the date/time and duration of calls made and the numbers dialled)

Traffic Data is data that is or has been comprised in or attached to a communication for the purpose of transmitting the communication (e.g. anything written on the outside of a postal item concerning its postal routing) OR …

information tracing the origin or destination of a communication information identifying the location of equipment when a communication is made (such as the location of a mobile phone)

The acquisition of communications data: – is a well defined process with clarity – is a well managed process with clear lines of responsibility – has public scrutiny and oversight BUT, is it – necessary – proportional

There are three classes of flute players – one excellent, one good and one poor There is a delivery of three lots of new flutes – one excellent, one good and one poor Which group ought to have which type of flute? OR – it’s a double blind trial to see the effect of instrument type on playing quality

CCTV Cameras in ATMs ANPR The census Identity cards RIPA Centralised NHS records Published lists of surgeons’ death rates Tax records Loyalty cards Police on the beat DVLR, car insurance and MOT Covert operations GCHQ Google Amazon Android, iPhone etc.

All Home Secretaries for at least the last ten years have been trying to create a central database of communications data to be retained for at least 12 months “BAE Systems Detica (Evidence taken in private and not published)” on 24 October 2012 to Joint Select Committee scrutinising this bill. (419 pages of oral evidence and 613 pages of written evidence)

DNA is one of the other critical tools in crime detection This is a prototype Mobius strip, binary abacus It’s the logo of the National Dyslexia Association