IPCO Annual Report 2018
communications including internet access, internet telephony (for example, a Skype call),
instant messaging and the use of applications, but also includes communications sent
through postal services such as the Royal Mail.
Case study: how CD can be used
Counter Terrorism Police were engaged in an investigation into the transporting of individuals
into the UK who were believed to be linked to terrorism. A team were tasked with locating a
particularly dangerous individual believed to be at large. He was suspected as having links to
a proscribed organisation and his current address and location were unknown. Work with the
NCA and Interpol showed that this male was wanted for a grievous bodily harm (GBH) with
intent offence (stabbing) overseas.
Internet and intelligence investigations identified online accounts that were suspected of being
used by the suspect. A communications data investigation was then used to identify a number
of means of communication used by the suspect in the UK. As a result of communications data
analysis, used in conjunction with other digital opportunities, a lifestyle pattern was produced
and a number of addresses were identified.
Utilising the data available, the subject was located, arrested and extradited to face trial.
11.55
As the figures in this section demonstrate, the vast majority of CD requests are made in
relation to suspects of an investigation, but there are occasions where an LEA will seek data
relating to a victim, witness or vulnerable person. The highest proportion of CD requests
relate to telephony. The data obtained by law enforcement related to subscriber details and
traffic data in most cases.
Other
28,054
Null
15,270
Associate
70,489
Suspect
452,622
Next of kin
15,460
Vulnerable person
(other than victim)
Witness
56,338
9,967
Complainant
1,802
Victim
40,219
0
100,000
200,000
300,000
400,000
Figure 5: Communications data items by relevant individual, 2018
500,000
77