Feeds

MI5 security alert finally runs on secure server

Rush job patched up

Application security programs and practises

MI5's terror status mailing list has been made a little more secure even though the service has still not been moved onto a fully secure UK government-run infrastructure.

The service, launched by MI5 last Tuesday, is designed to allow subscribers to receive email notification of changing national security threat levels by email.

But an investigation by privacy website Spyblog showed it was sending web subscription forms to the US without encryption. Initially, data submitted to the list was wide open to snoopers.

The subscription system has been changed so it no longer uses the WhatCounts.com services in the USA and so it uses SSL links to submit data to web servers based in the UK. These servers are being run by a private firm called MailTrack and not the UK government. The mailing list was modified late on Friday from its "shambolic" early version, SpyBlog reports.

"The email list subscription service no longer seems to send your personal data to the USA in an unencrypted format, but it is still not being hosted entirely on secure UK Government IT infrastructure. However, signing up this way no longer gets you an email confirmation immediately, you will now have to wait 'a few days'," SpyBlog told El Reg.

The set-up of the system, even ignoring the delay in processing data, is far from ideal, however. Submitted web forms are processed at a site called https://mi5.h0st.biz/xdata.html, which looks suspiciously like a phishing site, but was legitimately registered by MailTrack.

SpyBlog's assessment that the service was established as a "rush job" is supported by emails received by El Reg suggesting that British defence technology company QinetiQ was only informed about plans to launch the service on Monday, 8 January - only a day before the email alert service went live in an insecure format.

Even though changes have been made to improve this somewhat, the affair leaves a number of questions unanswered, as SpyBlog notes, not least who authorised the list to go live without rudimentary security precautions.

More on the aftermath of this web security shambles can be found here. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Adam Afriyie MP: Smart meters are NOT so smart
Mega-costly gas 'n' 'leccy totting-up tech not worth it - Tory MP
Just TWO climate committee MPs contradict IPCC: The two with SCIENCE degrees
'Greenhouse effect is real, but as for the rest of it ...'
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.