Upgrade & Secure Your Future with DevOps, SRE, DevSecOps, MLOps!

We spend hours on Instagram and YouTube and waste money on coffee and fast food, but won’t spend 30 minutes a day learning skills to boost our careers.
Master in DevOps, SRE, DevSecOps & MLOps!

Learn from Guru Rajesh Kumar and double your salary in just one year.

Get Started Now!

Scottish Police bought a fleet of devices for smartphone data-mining

Source: engadget.com

Police in Scotland are getting ready to roll out a fleet of ‘cyber kiosks’ that will allow them to mine device data for evidence. The kiosks — PC-sized machines — have been designed to help investigations progress faster. At the moment, devices can be taken from witnesses, victims and suspects for months at a time, even if they contain no worthwhile evidence. According to Police Scotland, the kiosks will enable officers to quickly scan a device for evidence, and if relevant information is found, the device will be sent on for further investigation. If not, it can be returned to its owner straight away.

The kiosks are not able to save any data — they can only display it to an investigating officer. The only information the kiosks retain is details on how they have been used — by whom and at what times. The software is also able to segregate data based on type (such as messages or pictures) and date range, to help officers more quickly find what they’re looking for. Deputy chief constable Malcolm Graham said that “By quickly identifying devices which do and do not contain evidence, we can minimise the intrusion on people’s lives and provide a better service to the public.”

Police Scotland says it consulted a variety of groups and experts before commissioning the technology, and has given assurances that it will only examine a digital device where there is “a legal basis and where it is necessary, justified and proportionate to the incident or crime under investigation.” While the kiosks have the ability to bypass passwords and lockscreens, this will only be done after consultation with the police cybercrime unit. However, some critics have voiced concerns regarding data privacy and abuses of power — a growing narrative around the globe. The roll-out of the cyber kiosks – which will begin in Scotland on 20th January — comes only a few days after it emerged the FBI extracted data from a locked iPhone in the US, prompting fresh concerns over civil freedoms.

Related Posts

Introduction to Data Visualization Tools and what is the Types of Data Visualization Tools

Introduction to Data Visualization Tools Data visualization tools are essential when it comes to presenting complex data in an easy-to-understand format. With the increased reliance on data-driven Read More

Read More

What is Data Transformation and Key Features and Benefits of Data Transformation Tools

An Introduction to Data Transformation Data transformation is the process of converting data from one format to another format to meet specific needs or requirements. It involves Read More

Read More

What is Data Cleaning and What are the Importance of Data Cleaning Tools

What is Data Cleaning? Simply put, data cleaning is the process of identifying and correcting errors, inconsistencies, and inaccuracies in a dataset. It is a crucial step Read More

Read More

What is Data Mining and what is the Future of Data Mining Tools

Introduction to Data Mining Tools Data mining is the process of discovering hidden patterns and insights in large datasets. It involves the use of statistical and mathematical Read More

Read More

Trending Report: Lifesciences Data Mining And Visualization Market Wrap: Now Even More Attractive| Keyplayers- Tableau Software, SAP SE, IBM, SAS Institute

Source – https://ksusentinel.com/ (Version 2021) Lifesciences Data Mining And Visualization Market report published by Stratagem Market Insights is an in-depth analysis of the market covering its size, share, value, growth Read More

Read More

KDD in data mining assists data prep for machine learning

Source: searchenterpriseai.techtarget.com A machine learning application’s value is dependent on the quality of data used to train and deploy it. Organizations are responsible for creating or acquiring Read More

Read More
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x