Feeds

Look out! Here come the cybercops

Jack Straw stumps up £25 million for Net crime detectives

  • alert
  • submit to reddit

Build a business case: developing custom apps

A new team of 80 full-time cybercops are to be recruited and let loose on the UK's Net structure as part of a £25 million plan to stamp on Internet crime, the Home Secretary announced this morning.

According to Jack Straw, this move is "in line with our objective of making the UK the best and safest place in the world to conduct and engage in e-commerce". Forty investigators will be pulled in from the police, customs, the National Crime Squad and the National Criminal Intelligence Service and put into a new National Hi-Tech Crime Unit based in the criminal intelligence HQ in London. Another 46 will be placed in local forces around the country.

John Abbott, Director General of the National Criminal and Intelligence Service said: "Cybercrime ignores borders - be they regional, national or international. Our approach therefore has to be holistic. A national unit must co-exist with comprehensive local strategies and abilities." For this reason, the new force will also have a 24-hour hotline to foreign intelligence agencies. Obvious targets for the new squad will be paedophiles, nazi-type organisations, financial fraudsters and the like.

On top of this, £37 million is to be spent linking the IT systems of police forces in England and Wales together.

It seems Mr Straw is quite serious about tackling Internet crime in the UK and of course with the catch-all RIP legislation, he has the power to do a very good job on it. Just a shame that in his rush to make the Net safer he has trampled all over the rights of your average law-abiding citizen.

A very good description of Jack Straw was given in a national newspaper last week: he's an enforcer, not a reformer. That, sadly, is spot on. Of course, if you've done nothing wrong, you've got nothing to worry about, have you?* ®

*NB. This, to us at least, is one of the most terrifying uses of "fake logic". Please note those people that use it. And warn your friends about them.

Related Stories

Europe to get tough on cybercrime
G8 on cybercrime: jaw jaw or war war?
Europe to investigate legality of RIP

A new approach to endpoint data protection

More from The Register

next story
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Nintend-OH NO! Sorry, Mario – your profits are in another castle
Red-hatted mascot, red-colored logo, red-stained finance books
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
Feel free to BONK on the TUBE, says Transport for London
Plus: Almost NOBODY uses pay-by-bonk on buses - Visa
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?