In message <[log in to unmask]>, at 15:12:45
on Thu, 21 Jul 2011, Ibrahim Hasan <[log in to unmask]> writes
>Now the spotlight turns to access to communications data under RIPA
>
>http://www.guardian.co.uk/media/2011/jul/21/phone-hacking-police-mobile-tracking
The audit trails kept by the operators make it plausible that requests
for a specified VIP's phone records could quite quickly be unearthed.
And associated with that would be the formal request (which would reveal
the purported reason for the request).
I'm also interested in the use of what I'll call "Spyware", sometimes
available for legitimate employee- and child-tracking as well as more
classic malware, being used for nefarious purposes by stalkers rather
than investigative journalists.
ps Not all RIPA requests for traffic data will be associated with mobile
phones, some will be for fixed line phones and Internet. So numbers like
144,000 need to be seen in that context.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|