{"id":27525,"date":"2019-06-27T13:40:30","date_gmt":"2019-06-27T13:40:30","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/"},"modified":"2019-06-27T13:40:30","modified_gmt":"2019-06-27T13:40:30","slug":"uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/","title":{"rendered":"UK&#8217;s MoD is helping itself to cops&#8217; fingerprint database &#8216;unlawfully&#8217;, rules biometrics chief"},"content":{"rendered":"<p>The Ministry of Defence has been searching the police national fingerprint database without a \u201cclearly defined lawful basis,\u201d the UK&#8217;s biometrics commissioner has said.<\/p>\n<p>In his <a target=\"_blank\" href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/812352\/Biometrics_Commissioner_AR_2018_Web_Accessible.pdf\" rel=\"noopener noreferrer\">annual report (PDF)<\/a> filed today, Paul Wiles warned that inter-government searching of databases should be properly regulated.<\/p>\n<p>\u201cI continue to be very concerned about the searching by the Ministry of Defence into the police national fingerprint database without an agreed, clearly defined lawful basis.\u201d<\/p>\n<p>The MoD has been using the database to check whether fingerprints taken or found during military operations abroad matched to persons known to the UK police or immigration authorities or matched crime scene fingerprints held by the police.<\/p>\n<p>Wiles said he has repeatedly challenged the MoD as to the legal basis on which the Defence Science and Technology Laboratory has gained direct access to and is searching the police\u2019s fingerprint collections.<\/p>\n<p>&#8220;I also wrote last year to the Permanent Secretary of the MoD seeking clarification on this issue. Over the last eighteen months the MoD has come up with a series of claims as to the legal basis of carrying out their searching through Dstl, none of which I have found convincing. &#8220;<\/p>\n<p>He said: \u201cThere is nothing inherently wrong with hosting a number of databases on a common data platform with logical separation to control and audit access but unless the governance rules underlying these separations are developed soon then there are clear risks of abuse.\u201d<\/p>\n<p>The commissioner also referred to the controversy around the police matching of facial images in public spaces.<\/p>\n<p>The Metropolitan Police have trialled biometrics technology at the Champions League Final and <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/05\/24\/met_police_wont_use_facial_recognition_tech_at_notting_hill_this_year\/\" rel=\"noopener noreferrer\">Notting Hill Carnival<\/a> and <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/06\/13\/cardiff_man_legal_challenge_south_wales_police_facial_recognition\/\" rel=\"noopener noreferrer\">South Wales Police<\/a> have also more than dabbled with the tech.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/05\/24\/shutterstock_notting_hill_carnival.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Parade of dancers in costume at London's Notting Hill carnival. \"><\/p>\n<h2 title=\"But cops' trial of controversial tech will continue\">London&#8217;s Met Police: We won&#8217;t use facial recognition at Notting Hill Carnival<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2018\/05\/24\/met_police_wont_use_facial_recognition_tech_at_notting_hill_this_year\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>\u201cAt its extreme it is raising the spectre of using facial scanning for mass police surveillance. That may be unlikely but one that some countries are reported as developing.<\/p>\n<p>\u201cThe sober point is that unless there are clear and publicly accepted rules governing the police use of new biometrics then damage could be done to public trust in policing and at a time when regard for some other public institutions is declining.\u201d<\/p>\n<p>He said: \u201cIn summary, we are seeing the rapid exploration and deployment by the police of new biometric technologies and new data analytics. Some of these will improve the quality of policing and will do so in a way that is in the public interest.<\/p>\n<p>\u201cHowever, some could be used in ways that risks damaging the public interest, for example by re-enforcing biases of which reinforcement is not in the public interest.<\/p>\n<p>&#8220;If the benefits of these new technologies are to be achieved there needs to be a process that provides assurance that the balance between benefits and risks and between benefits and loss of privacy are being properly managed.\u201d \u00ae<\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/06\/27\/mod_helping_self_to_fingerprint_dna_database_unlawfully\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Paul Wiles: &#8216;Clear and publicly accepted rules&#8217; needed for common data platform The Ministry of Defence has been searching the police national fingerprint database without a \u201cclearly defined lawful basis,\u201d the UK&#8217;s biometrics commissioner has said.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":27526,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-27525","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UK&#039;s MoD is helping itself to cops&#039; fingerprint database &#039;unlawfully&#039;, rules biometrics chief 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UK&#039;s MoD is helping itself to cops&#039; fingerprint database &#039;unlawfully&#039;, rules biometrics chief 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-27T13:40:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"UK&#8217;s MoD is helping itself to cops&#8217; fingerprint database &#8216;unlawfully&#8217;, rules biometrics chief\",\"datePublished\":\"2019-06-27T13:40:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/\",\"name\":\"UK's MoD is helping itself to cops' fingerprint database 'unlawfully', rules biometrics chief 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief.jpg\",\"datePublished\":\"2019-06-27T13:40:30+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"UK&#8217;s MoD is helping itself to cops&#8217; fingerprint database &#8216;unlawfully&#8217;, rules biometrics chief\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UK's MoD is helping itself to cops' fingerprint database 'unlawfully', rules biometrics chief 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/","og_locale":"en_US","og_type":"article","og_title":"UK's MoD is helping itself to cops' fingerprint database 'unlawfully', rules biometrics chief 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-06-27T13:40:30+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"UK&#8217;s MoD is helping itself to cops&#8217; fingerprint database &#8216;unlawfully&#8217;, rules biometrics chief","datePublished":"2019-06-27T13:40:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/"},"wordCount":498,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/","url":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/","name":"UK's MoD is helping itself to cops' fingerprint database 'unlawfully', rules biometrics chief 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief.jpg","datePublished":"2019-06-27T13:40:30+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/06\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/uks-mod-is-helping-itself-to-cops-fingerprint-database-unlawfully-rules-biometrics-chief\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"UK&#8217;s MoD is helping itself to cops&#8217; fingerprint database &#8216;unlawfully&#8217;, rules biometrics chief"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=27525"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/27525\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/27526"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=27525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=27525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=27525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}