Data Retention From the police point of view

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

Forensic Victimology 2nd Edition
Chapter 7 Resolving Conflicts and Preventing Violence Lesson 3
FATHER MOTHER SISTER. Vocabulary Crime Implicated Violence Correctional center Victims Katana Torture Assassin Punishment Homicide Rape Criminal Record.
Copyright 2010, The World Bank Group. All Rights Reserved. Police Statistics, Crime, Criminals and Resources Part 1 Crime, Justice & Security Statistics.
Mock Trial.  GOAL IS TO MAP OUT YOUR CASE IN A STORY  TELL A STORY FROM YOUR PERSPECTIVE  DO NOT ARGUE!
Understanding family violence data Workshop facilitator: Pauline Gulliver.
BELL WORK Why do you think people who are abused are afraid to get help?
The Crime Picture Chapter 2 Frank Schmalleger Criminal Justice Today 13 th Edition.
SEX OFFENDERS AND VICTIMIZATION IN OUR COMMUNITY Awareness, Support and Prevention San Diego County Sex Offender Management Council
CHILDREN’S HEARING SYSTEM. CHILDREN’S HEARINGS Need to know: Why a child may appear before a hearing How the hearings system works Actions that can be.
CJ210: Unit 8 Sex Crimes and Burglary Investigation.
Evidence Collection 3 rd Grade Workshop. When a crime has been committed, a team of policemen usually called investigators are sent to the scene of the.
Protecting Society and helping keep people safe THE CHANGING NATURE OF POLICING SIR PETER FAHY Chief Constable.
L ESSON 2 A website is a collection of different types of data, which can be anything like text, graphics, videos etc. combined together to provide.
Child sexual exploitation training for hotel staff Operation Makesafe.
American Probation and Parole Association The Scope and Nature of Sexual Violence in South Carolina Austin, Texas January 2006.
Identifying Risk to Children. Police officers need to have a full understanding of identifying, assessing and investigating child abuse incidents and.
 Gang violence is violence amongst groups of people known as gangs.  It happens a lot in cities or highly populated areas.  Also, California is known.
Extending the crime survey to include fraud and cyber Joseph Traynor.
What affects did crime have on the society of Richmond in the 1900’s?
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
1 Crime in American Society. 2 Crime Data Sources Uniform Crime Reports (UCR) National Crime Victimization Survey (NCVS) Self-Report.
Child Abuse. People with a household income of $15,000 or less are twice as likely to abuse their children. Lack of knowledge about child development.
Crimes By 丘丽香 519. Crimes  Britain Britain  China China   In both countries, crimes against property are the most frequently committed crimes.
Ch. 7 Lesson 1 Notes Conflict Resolution How Conflicts Occur Conflict is A conflict does not have to be a contest in which one side wins and the other.
 MOU O 4 MOU O 4.
Learning Outcomes LO3 Understand how to respond to evidence or concerns that a child has been abused or harmed. AC 3.1 Describe signs, symptoms, indicators.
By: Najah Killian, Shardashia Hall, Trevor Lewis, Nathan Rockholt
It mustn’t be this way Crimes and Baddies.
Creating your online identity
Balancing the right to Protest
Tutors:Maureen McLachlan & Joanne Duval
Crime can cause significant costs for society.
PEER - Bulgaria Dublin, 4th Nov., 2016.
Sandwell’s Family Group Conferencing Service
Sharing Images – The Law
Teenagers. What are they like?
Robbery Response and Prevention Training
Unit 4 Word power.
Cohabitation effect Sliding vs. deciding
Operation Makesafe.
Child protection.
Pre-writing topic discussion: Speak to your partner
Crime Scene Basics STEM Forensics.
Crime in the United States
Regulation of Investigatory Powers Act 2000
Identifying Risk to Children
Findlay Creek Safety Meeting March 21st, 2018
A look at how and why we punish today
What is bullying?.
Chapter 16 Section 3 Juvenile Crime.
Scientific Method Vocabulary.
Chapter 10.
Top Five Computer Related Crimes
Scenario: You are an eyewitness to a crime: A man has robbed a bank, but instead of keeping the money for himself, he donates it to a poor orphanage that.
Authors: Damjan Fujs Miha ZEMLJIČ
Consequences of crime.
Crime in the United States
Lesson 6-1 Civil Law (Tort Law).
THE PUBLIC THE VICTIMS REPORTING CRIME
Japan’s Efforts to Promote a Safer Internet Environment for Children
Crime in the United States
‘County Lines’.
By: Alejandra Ramos and Maria Vazquez
The Structure of Canada’s Courts
Child sexual exploitation sessions
Police Powers.
Differences and similarities
Scenario: You are an eyewitness to a crime: A man has robbed a bank, but instead of keeping the money for himself, he donates it to a poor orphanage that.
Presentation transcript:

Data Retention From the police point of view Privacy vs Security Data Retention From the police point of view

Theory and practice What is the Theory and what is the Practice? Theory - if things should be, but not Practice - things are, but nobody knows why The ideal is, when Theory and Practice work together.

Some facts for background We have in Estonia active SIM-cards (ca 1 600 000) more than citizens (ca 1 300 000). Ca 90% citizens are using Internet. The telecommunication is already involved with all areas of our life. Almost in all criminal cases communication devices are used at some point. Some crimes have changed in nature, and telecommunication is more and more involved. Often there are no physical evidence any more, like it used to be. You can find traces only from the Internet - for instant frauds. Today it is even possible to rob a bank through the Internet. We have a lot of cases where all phases of the crime remain in the Internet (child pornography).

Some raised proposals for regulation of DR Retained data should only be used for investigation of serious crimes DR is only allowed when person is involved in crime or has criminal ties. Time for DR should be shorter. All those proposals will make police work more complicated. WHY???

Retained data should only be used for investigation of serious crimes There are a lot of crimes and minor offences that are commited using telecommunication devices or are commited against them, but these are not considered as serious crimes. Examples: Internet scams – somebody sells not existing goods in the internet, and collects money from simple-minded people. The amount of money per case is not big, it means – DATA IS NOT AVAILABLE. Group of youngsters are steeling mobilphones from elders and children. The cost of phones is small, violence was not great - DATA IS NOT AVAILABLE. BUT......

Retained data should only be used for investigation of serious crimes Community is very much concerned in cases which affect the sense of security and expectations to solve these cases are much higher than in cases where somebody stole 100 000 EUR from state. What should the police do?

DR is only allowed when person is involved in crime or has criminal ties. More than 50% of pedophiles and persons involved in child pornography don’t have any earlier criminal record. Usually community knows them as nice family members and not very rarely these people are well known in community. The same situation is with first level drug dealers on the street. They live and act as regular citizens. Do we need to let them continue untill we can prove their involment in crime and then start DR?

DR is only allowed when person is involved in crime or has criminal ties. Sometimes we need to start the investigation with collection of data of the victim. Example: Recent trend is, that young girls (13-15) sell themselves in the Internet to get „pocket money“. BUT THEY ARE VICTIMS, not criminals. For different reasons victims of violens or sexual abuse don´t tell us the truth or just leave out some important facts. We have to collect evidences without victims help, processing also victims data. Sometimes we need to know, who was close to victim during the crime (rape case), and where it happened. Again we need to process victims data.

Time for DR should be shorter. In Estonia the time for DR is one year. The oldest data (1 year) is needed only in serious crime cases – homicide, robbery, pedophile cases and etc, where in the beginning of investigation we usually don`t have any ideas who is the suspect. In pedophile cases we try to find as many victims as possible. Because these victims need help and they never come to ask it by themselves. Therefore in such cases we use all allowed data.

My opinion of the solution From Security side: No additional limitations for DR The data should be available for all crimes and misdemeanours which are commited using telecommunication devices or are commited against them. From Privacy side Better supervision of the retention and use of retained data. DR should be states responsibility, not service providers.

Thank you for attention Let Theory and Practice work together