Feeds

Confidential Home Office data turns up in laptop on eBay

But encrypted this time

Top 5 reasons to deploy VMware with Tegile

Yet more confidential UK government files may have been mislaid by public servants. However, in a sign that Whitehall may be raising its game slightly, this time the data was encrypted - and the copies originally lost have been recovered.

The Guardian reports today that a small IT-repair firm near Bolton received a laptop on Tuesday from a customer who said it had been bought on eBay. When the laptop was opened up by an engineer, an optical disk marked "Home Office" and "Confidential" was discovered under the keyboard.

Lee Bevan of Leapfrog computers told the Graun: "This seemed like just another IT repair... the customer said he had bought it on eBay and seemed quite innocent. It was just an ordinary laptop and it was only when we opened up the keyboard that we found the disk - it had the words Home Office and Confidential written on it.

"The disk appeared to be hidden deliberately underneath the keyboard. We put the disk in the drive to see what it was, but it was encrypted.

"As soon as I saw it belonged to the Home Office I placed it in the company safe and called the police. Luckily, it has ended up in the right hands. The police were here most of the day examining the laptop and the disk."

According to the Home Office, both the optical disk and the laptop hard drive were encrypted, though it was not confirmed that the laptop was definitely government property. It is not yet known how the machine and disk had wound up on eBay.

The Home Office said the fact the data was encrypted "safeguarded" it, which is broadly true. Assuming properly-implemented modern encryption, it would be practically impossible to read the files on a laptop or disk without possession of the relevant keys.

However, in certain unusual circumstances a savvy attacker can lift the keys from computer memory. More plausibly, keys are often written down and carried about together with laptops, are easily guessed, or otherwise discovered.

The possibility also exists of the encrypted government files having been copied, which is much easier than decrypting them - although not as trivially easy as copying normal unprotected files.

Another thing to bear in mind, of course, is that all the data may have already been lost in other massive governmant data blunders of recent times; which would make this incident rather irrelevant. It may be that someone pinched a Home Office laptop and thought "chuh, another laptop and disk with everyone's personal data. I've got the whole UK on file already, I'll just sell the gear on eBay". ®

Beginner's guide to SSL certificates

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.