IPCO Annual Report 2018

communications including internet access, internet telephony (for example, a Skype call),
instant messaging and the use of applications, but also includes communications sent
through postal services such as the Royal Mail.
Case study: how CD can be used
Counter Terrorism Police were engaged in an investigation into the transporting of individuals
into the UK who were believed to be linked to terrorism. A team were tasked with locating a
particularly dangerous individual believed to be at large. He was suspected as having links to
a proscribed organisation and his current address and location were unknown. Work with the
NCA and Interpol showed that this male was wanted for a grievous bodily harm (GBH) with
intent offence (stabbing) overseas.
Internet and intelligence investigations identified online accounts that were suspected of being
used by the suspect. A communications data investigation was then used to identify a number
of means of communication used by the suspect in the UK. As a result of communications data
analysis, used in conjunction with other digital opportunities, a lifestyle pattern was produced
and a number of addresses were identified.
Utilising the data available, the subject was located, arrested and extradited to face trial.
11.55

As the figures in this section demonstrate, the vast majority of CD requests are made in
relation to suspects of an investigation, but there are occasions where an LEA will seek data
relating to a victim, witness or vulnerable person. The highest proportion of CD requests
relate to telephony. The data obtained by law enforcement related to subscriber details and
traffic data in most cases.
Other

28,054

Null

15,270

Associate

70,489

Suspect

452,622

Next of kin

15,460

Vulnerable person
(other than victim)
Witness

56,338
9,967

Complainant

1,802

Victim

40,219
0

100,000

200,000

300,000

400,000

Figure 5: Communications data items by relevant individual, 2018

500,000

77

Select target paragraph3