Feeds

Intelligence documents left on a train

Laptop ban no barrier to government's data giveaway

Mobile application security vulnerability report

Updated: A senior civil servant has been suspended for leaving top secret intelligence documents on a Waterloo to Surrey train.

The commuting spook left an orange envelope on a seat when he got off the train. It contained two documents prepared for the Joint Intelligence Committee - one on the capabilities of Iraqi security forces and one on al-Qaeda's vulnerabilities marked "UK Top Secret" and "for US/UK/Canadian and Australian eyes only".

The documents were handed in to the BBC, which passed them to the police.

A spokesman for the Cabinet Office told the Beeb: "Two documents which are marked as 'secret' were left on a train and have subsequently been handed to the BBC.

"There has been a security breach, the Metropolitan Police are carrying out an investigation."

The unnamed male civil servant worked for the Cabinet Office. Police were already searching for the documents which he had reported missing.

Keith Vaz, chair of the Home Affairs committee, called for an official inquiry, as did the Tories.

Civil servants can face disciplinary action for leaving such documents on their desks within Whitehall. Strict procedures are supposed to mean these documents are only considered safe when properly locked up.

The government's review of data security did mean civil servants were carrying copies of documents to work on at home because they were no longer allowed to take insecure and unencrypted laptop computers out of the office. But we kind of hoped the security services took this stuff a bit more seriously.

The government last night won the right to intern terrorism suspects for 42 days without charge. Brown won by nine votes provided by the Democratic Unionist Party. The DUP has denied it did any deal with Brown in exchange for votes.

Update: The government is to launch an official inquiry into how the documents were left on a train. It will be headed by Sir David Omand.

Cabinet Secretary Ed Miliband told the Commons the civil servant was not entitled to remove the files from Whitehall.

He said there had been:"a clear breach of well established security rules which forbid the removal of documents of this kind outside secure government premises without clear authorisation and compliance with special security procedures". But he claimed national security had not been compromised.®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.