Feeds

MoD 'How to stop leaks' guide leaks

Secret security manual no longer secret

Intelligent flash storage arrays

A Ministry of Defence guide to preventing information leaking into the public domain has leaked into the public domain.

The three volume, 2,300 page book includes information on dealing with investigative journalists, foreign agents and computer hackers as well as how to deal with typical approaches from Chinese and Russian secret services.

The Defence Manual of Security was issued in October 2001 and is marked "Restricted". The three volumes, which appear in their entirety on Wikileaks, cover: protective security, personnel security and IT security.

The section on IT security warns: "The main threat to the compromise of protectively marked information on IT systems comes from authorized users who may, for whatever motive, disrupt the system or gain access to protectively marked information which they have no 'need to know'.

"There is also a threat from FIS [foreign intelligence services], which are likely to try to exploit any security weakness of which they become aware."

The manual also refers to Tempest certified equipment - hardware which is cleared for dealing with the most sensitive information.

The guide also explains the difference between threats from Chinese and Russian intelligence services: "Chinese intelligence activity is very different to the portrayal of `Moscow Rules' in the novels of John Le Carre."

The Chinese have "a voracious appetite for all kinds of information: political, military, commercial, scientific and technical".

Companies which employ local staff are warned that Chinese security services are likely to have briefed them and told them to copy all documents they have access to.

Wikileaks was last in the headlines for posting a copy of the UK's postcode directory.

There's more on the manual here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.