4. “This application produced five telephone numbers, all of
which were researched for connections with the MPS
[Metropolitan Police Service]. One number was identified
as the switchboard number for Hinchingbrooke Hospital in
Cambridgeshire. It was established that Officer 15 DPG’s
wife Member of Public 3, was employed at that hospital
”Enquiries were made with Siemens in order to identify
from the data on the exhibit, which extension within the
hospital the call to The Sun was made from.”
Operation Alice Report, Metropolitan Police
http://www.iocco-uk.info/docs/Met%20Operation%20Alice%20Closing%20Report.pdf
6. The person calling the crisis line is not
ordering pizza. The profiler’s
assumption that the device is equal to,
or identical with, or identifiable with its
user is an obvious pragmatic reduction
Oliver Leistert: “Data doubles”
Leistert, Oliver. Data Retention in the European Union: When a Call Returns, International Journal of Communication 2 (2008)
11. “We kill people based on metadata”
General Michael Hayden, former director of
CIA and NSA
https://www.theguardian.com/commentisfree/2016/feb/21/death-from-above-nia-csa-skynet-algorithm-drones-pakistan
15. “It is inevitable that an investigator will
be tempted to use every means at his
disposal and to keep his options open
when planning covert surveillance; to
be, as often quoted in my presence at
ACPO conferences, “lawfully
audacious”
Sam Lincoln, Office of Surveillance
Commissioners
http://ukhumanrightsblog.com/2015/10/13/surveillance-under-ripa-neither-a-strict-legal-framework-nor-rigorously-overseen-sam-lincoln/
25. “When it comes to contracts, suppliers
that have routinely messed up are
handed more deals. When it comes to
policy, approaches that have proved
unsuccessful get dusted off and pushed
with renewed vigour.”
Kat Hall, The Register
http://www.theregister.co.uk/2016/09/19/ukgov_digital_economy_shambles/
26. The health sector has the most data
breaches, followed by local government.
Furthermore, not all threats to cyber
security or data protection are from
external actors: over 40% are caused by
employees, contractors and third party
suppliers, and half of these are accidental.
Information Commissioner’s Office
http://www.parliament.uk/business/committees/committees-a-z/commons-select/culture-media-and-sport-committee/news-parliament-2015/cyber-security-report-
published-16-17/