How the police copy and keep your phone secrets
2012 11 22

By Jack Serle | TheBureauInvestigates

The police routinely copy and keep the contents of suspects’ mobile phones, according to this week’s Sunday Times.



In under half an hour the police could get from your phone your call history, all your text messages and your whole contacts book and put them into a vast database, the article claimed. And there the information stays, even if you are released without charge after a night in the cells.

The disturbing report claimed that as many as 22 English and Welsh police forces, including the Metropolitan Police and British Transport Police, are using off-the-shelf technology to do this. It claimed that the Metropolitan Police alone have 16 extraction terminals across London with 300 officers trained to use them.

In many ways it is a golden age for detective work. The police can access data from all kinds of sources because smartphones are both incredibly versatile and ubiquitous. Besides the emails and candid snaps from a night out, they can trawl your apps like Facebook or LinkedIn.

The Sunday Times report suggests that British police forces are treating the contents of citizens’ phones like they treated peoples’ DNA. For much of the previous decade British police collected DNA from arrested suspects and kept the samples even after the suspect was acquitted. In this way they collected and stored 1 million samples before the law stopped them.

In 2008 the European Court of Human Rights overturned a House of Lords ruling and decided it is illegal for the police to store innocent citizens’ DNA. The Sunday Times’ argues that ’there is a direct parallel’ between keeping DNA records and ‘keeping the mobile phone data of those who have never been convicted of any offence.’

Civil liberties group Big Brother Watch agrees. They are adamant it is outside the law, saying so both to the paper and in a letter sent to Christopher Graham the Information Commissioner in May this year.

[...]


Read the full article at: thebureauinvestigates.com




Related Articles


Latest News from our Front Page

Sweden’s military drills for an invasion of Stockholm
2014 11 24
During two weekends in November, units from the Life Guards, Command and Control and Luftvärnsregementet practiced defense of Stockholm. Stockholm, and its vital public infrastructure, will be defended in the event of armed aggression, and it must be practiced. Therefore joined several units to defend the strategically important locations in and around the capital. Comment: Pro NATO influences in Sweden once again ...
Recent Israeli Synagogue Attack, a Possible False Flag?
2014 11 21
Dear Friends - I woke up yesterday morning to see a newspaper lying on the kitchen table with the front page proclaiming that five people were slain in an Israeli synagogue after a so-called "Palestinian attack." Some members of the media said that four people were killed, others said five, so it seems like that there was some confusion (or ...
The Michael Brown Shooting, Race Baiting for Political Power and Militarization of the Police
2014 11 21
From Youtube: The evidence clearly shows that Officer Darren Wilson was justified in shooting Michael Brown, so why is this case being hyped by the mainstream media and the leftist political establishment?
Ancient Aryan Mummies and Pyramids of China
2014 11 21
After years of controversy and political intrigue, archaeologists using genetic testing have proven that Caucasians roamed China’s Tarim Basin thousands of years before East Asian people arrived. The research, which the Chinese government has appeared to have delayed making public out of concerns of fueling Uighur Muslim separatism in its western-most Xinjiang region, is based on a cache of ancient dried-out ...
Detekt: A New Malware Detection Tool That Can Expose Illegitimate State Surveillance
2014 11 21
Recent years have seen a boom in the adoption of surveillance technology by governments around the world, including spyware that provides its purchasers the unchecked ability to target remote Internet users’ computers, to read their personal emails, listen in on private audio calls, record keystrokes and passwords, and remotely activate their computer’s camera or microphone. EFF, together with Amnesty International, ...
More News »