Oyster sceptic.
In message , at 19:56:09 on
Wed, 4 Feb 2009, Paul Corfield remarked:
I may have missed it but where is the statement that said that the 7/7
attackers used Oyster cards to travel on the system and that the data
was used to track them - either on pre-attack surveillance trips or on
the day itself?
You have imagined that scenario.
I have?
You asked if you'd "missed" something, and I replied that you hadn't, you'd
just imagined it.
I hadn't appreciated mind reading
You are David Hansen AICMFP.
was part of your skill portfolio.
Every new big terrorist "event" causes yet more emergency legislation
and more invasion of privacy (I won't start a debate about how justified
it is, but that's plainly what happens).
I think it will depend entirely on who is in power if such an event
happens. Without making political points I might like to imagine that
the politicians might just take pause and look at what is already on the
statute book before paying too much heed to the hysterical demands of a
tabloid press baron or two.
Such mission creep is nothing to do with what press barons demand.
We've had the Congestion Charging mission creep (July 07) and the Oyster
Card data is simply another box to tick.
I really don't think it is you know. There is simply too much data in
too technical a format for open ended access to the system to be of any
value whatsoever.
They can afford to spend a billion or two putting it into intelligible
form.
--
Roland Perry
|