Safer Internet Day 2015
Safer Internet Day 2015 will be celebrated globally on Tuesday 10th February with the slogan ‘Let’s create a better internet together’.
Coordinated in the UK by the UK Safer Internet Centre the celebration sees hundreds of organisations get involved to help promote the safe, responsible and positive use of digital technology for children and young people.
Globally, Safer Internet Day is celebrated in over a hundred countries, coordinated by the joint Insafe/INHOPE network, with the support of the European Commission, and 31 national Safer Internet Centres across Europe.
The day offers the opportunity to highlight positive uses of technology and to explore the role we all play in helping to create a better and safer online community. It calls upon young people, parents, carers, teachers, social workers, law enforcement, companies, policymakers, and wider, to join together in helping to create a better internet. Ultimately, a better internet is up to us!
As part of Safer Internet Day the training arm of SRM, iSafely will be involved in an event to promote internet safety and introduce a new internet safety program and interactive web portal.
Watch this space for further updates.
Interception of Communication Data
Police are hacking into hundreds of people’s voicemails, text messages and emails without their knowledge, The Times has discovered.
Civil liberties campaigners reacted with concern to the disclosure that police were snooping on personal messages so often, without any external monitoring and with few safeguards.
Read full article here (subscription needed).
A slightly misleading article using very provocative language such as ‘hacking’ and ‘snooping’ when in actual fact, Police forces are using recognised and authorised procedures to gain the information.
A lot depends on the interpretation of the word ‘intercept’. If taken literally then it will be the interception of the communication when it is being transmitted between persons. To do so in these circumstances would require the higher authority of the Home Secretary.
In any other occasion the communication will be sitting on a server in an ISP (Internet Service Provider) and therefore is not being intercepted. Requests for these communications would therefore fall under that of a production order.
There is no hacking involved at all.
There is also emphasis placed on the fact that it is left to the Judges to decide whether to grant a production order with very little safe guards in place. Why should we be concerned with this when we accept the very same system to obtain search warrants which cover a person’s home and not just that persons phone?
The system is controlled and open to scrutiny.