Do they get to keep the armbands
To take home to their daughters? Given the prices charged for "branded" items surely a cop will happily dropgum where the boss can see if it will mean they get to take a rand name item home to their kid...
A new punishment awaits rule-breaking Thai police officers: Hello Kitty armbands. Unable to control his officers with other disciplinary measures, Colonel Pongpat Chayaphan has said that those caught breaking police rules will be forced to wear a pink armband tagged with Hello Kitty and a pair of hearts, The Associated Press …
This post has been deleted by its author
According to a report on a Japanese game show a few days ago, it seems the armbands were cheap knockoff Kitties.
A Thai police spokesman said "there are only 10 armbands and they are for internal use, so we aren't subject to copyright regulations".
A Sanrio spokesperson said "we are currently investigating the truth of the reports and have no comment at this time on any action we may be taking".
The scheme was quietly stopped after only two days.
Click on any of the related stories links - they're all related to this one too.
ISTR an article a few weeks ago which had _no_ related stories, and the error message below gave something away about the underlying code ... can't remember what now. If someone could find something similar and decipher that we may get there.
More important than where's the IT angle (which the link to AP fits, as this looks like it was lifted by a bot), is "where's the iPhone angle", shurely.
They should make them wear strap-ons and walk around beating them with their trunchons, which would be appropriate for the Bang-Kok police force. Ho ho.
Serious breaches of conduct should see the strap-on wearing coppers pimped-out at the local ladyboy meat farm. That'll teach 'em good and proper.
Europol cops have arrested nine suspected members of a cybercrime ring involved in phishing, internet scams, and money laundering.
The alleged crooks are believed to have stolen "several million euros" from at least "dozens of Belgian victims," according to that nation's police, which, along with the Dutch, supported the cross-border operation.
On Tuesday, after searching 24 houses in the Netherlands, officers cuffed eight men between the ages of 25 and 36 from Amsterdam, Almere, Rotterdam, and Spijkenisse, and a 25-year-old woman from Deventer. We're told the cops seized, among other things, a firearm, designer clothing, expensive watches, and tens of thousands of euros.
The UK's police service is set to spend up to £50 million ($62.7 million) buying hardware and software for a legacy communication network that was planned to become obsolete in 2019.
The Home Office had planned to replace the Airwave secure emergency communication system, which launched in 2000, with a more advanced Emergency Services Network by the close of the decade. However, the legacy network has seen its life extended as its replacement was beset with delays. The ESN is expected to go live in 2026.
In a procurement notice, the Police Digital Service (PDS) said it was looking for up to three suppliers of Terrestrial Trunked Radio (TETRA) Encryption Algorithm 2 (TEA2) compatible radio devices – including handheld, desktop, and mobile terminals – as well as software, accessories, services, and maintenance for use on the UK Airwave system.
FluBot, the super-spreader Android malware that infected tens of thousands of phones globally, has been reportedly squashed by an international law enforcement operation.
In May, Dutch police disrupted the mobile malware's infrastructure, disconnecting thousands of victims' devices from the FluBot network and preventing more than 6.5 million spam text messages propagating the bot from reaching potential victims, according to Finland's National Bureau of Investigation on Wednesday.
The takedown followed a Europol-led investigation that involved law enforcement agencies from Australia, Belgium, Finland, Hungary, Ireland, Spain, Sweden, Switzerland, the Netherlands and the US.
The Home Office is looking to replace its ancient and creaky National Firearms Licensing Management System (NFLMS) in a £20m contract.
NFLMS is the central police database of every firearm owner and every individual firearm in England and Wales. Whoever wins the contract will have a relatively low profile but critically important system to deliver.
"NFLMS is used by forces teams across England and Wales and these teams conduct approximately 170,000 licence grants, renewals and variations per year," said a notice on procurement website Bidstats.uk.
UK police forces have no overarching rules for introducing controversial technologies like AI and facial recognition, the House of Lords has heard.
Baroness Shackleton of the Lords' Justice and Home Affairs Committee said the group had found 30 organisations with some role in determining how the police use new technologies, without any single body to guide and enforce the adoption of new technologies.
Under questioning from the Lords, Kit Malthouse, minister for crime and policing, said: "It is complicated at the moment albeit I think most [police] forces are quite clear about their own situation."
The Clop ransomware gang pwned a managed service provider with access to the UK's Police National Computer, dumping data on its dark web leaks site – but officials deny that police data was compromised.
Dacoll, a Scotland-based MSP, was attacked in October by the notorious criminal crew. Reports surfaced in the Mail on Sunday newspaper over the weekend that the criminals had published information from the Police National Computer on their leaks site.
The paper claimed that data was harvested through illicit access to Dacoll's systems when the company was subject to a ransomware attack back in October. A Dacoll subsidiary, NDI Technologies, advertises itself as "the leader for all things related to the Police National Computer."
Ukrainian police have arrested five people on suspicion of operating a ransomware gang, including a husband-and-wife team, following tipoffs from UK law enforcement.
"The organizer of the group, a 36-year-old resident of Kyiv, together with his wife and three acquaintances carried out cyberattacks on foreign companies," cops alleged in a characteristically blunt statement (in Ukrainian).
They claimed "more than 50" companies were targeted by the alleged gang, causing damage estimated at "more than one million US dollars."
The European Data Protection Supervisor (EDPS) has ordered European Union law enforcement agency Europol to delete any data it has on individuals that's over six months old, provided there's no link to criminal activity.
EDPS says it probed Europol's collection of large datasets for strategic and operational analysis from April 2019 until September 2020. The investigation concluded the law enforcement agency needed to up its game when it came to data minimisation and retention and encouraged Europol to make necessary changes and then let the EDPS know of its action plan.
According to regulations, "personal data should be adequate, relevant, and limited to what is necessary in relation to the purposes for which this data is processed," and "personal data processed by Europol shall be kept in a form which permits identification of data subjects for no longer than necessary for the purposes for which the personal data are processed."
A Canadian man is accused of masterminding ransomware attacks that caused "damage" to systems belonging to the US state of Alaska.
A federal indictment against Matthew Philbert, 31, of Ottawa, was unsealed yesterday, and he was also concurrently charged by the Canadian authorities with a number of other criminal offences at the same time. US prosecutors [PDF] claimed he carried out "cyber related offences" – including a specific 2018 attack on a computer in Alaska.
The Canadian Broadcasting Corporation reported that Philbert was charged after a 23 month investigation "that also involved the [Royal Canadian Mounted Police, federal enforcers], the FBI and Europol."
A critical report by the UK's public sector spending watchdog has blamed the Home Office for delays to a new crime-fighting IT platform designed to replace two systems on the verge of obsolescence.
The National Law Enforcement Data Service (NLEDS), which was supposed to be up and running last year, is designed to replace both the Police National Computer (PNC) and the intelligence-sharing Police National Database (PND).
But delays – including a failure to agree on exactly what the system should do – have cast further doubt on the project, with delivery pushed back to 2025 at the earliest.
Biting the hand that feeds IT © 1998–2022