Feeds

Look out! Here come the cybercops

Jack Straw stumps up £25 million for Net crime detectives

  • alert
  • submit to reddit

High performance access to file storage

A new team of 80 full-time cybercops are to be recruited and let loose on the UK's Net structure as part of a £25 million plan to stamp on Internet crime, the Home Secretary announced this morning.

According to Jack Straw, this move is "in line with our objective of making the UK the best and safest place in the world to conduct and engage in e-commerce". Forty investigators will be pulled in from the police, customs, the National Crime Squad and the National Criminal Intelligence Service and put into a new National Hi-Tech Crime Unit based in the criminal intelligence HQ in London. Another 46 will be placed in local forces around the country.

John Abbott, Director General of the National Criminal and Intelligence Service said: "Cybercrime ignores borders - be they regional, national or international. Our approach therefore has to be holistic. A national unit must co-exist with comprehensive local strategies and abilities." For this reason, the new force will also have a 24-hour hotline to foreign intelligence agencies. Obvious targets for the new squad will be paedophiles, nazi-type organisations, financial fraudsters and the like.

On top of this, £37 million is to be spent linking the IT systems of police forces in England and Wales together.

It seems Mr Straw is quite serious about tackling Internet crime in the UK and of course with the catch-all RIP legislation, he has the power to do a very good job on it. Just a shame that in his rush to make the Net safer he has trampled all over the rights of your average law-abiding citizen.

A very good description of Jack Straw was given in a national newspaper last week: he's an enforcer, not a reformer. That, sadly, is spot on. Of course, if you've done nothing wrong, you've got nothing to worry about, have you?* ®

*NB. This, to us at least, is one of the most terrifying uses of "fake logic". Please note those people that use it. And warn your friends about them.

Related Stories

Europe to get tough on cybercrime
G8 on cybercrime: jaw jaw or war war?
Europe to investigate legality of RIP

High performance access to file storage

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.