Feeds

Tories: We will set up a permanent 'War Cabinet'

Cyber, security, defence rebranding policy unveiled

Beginner's guide to SSL certificates

Analysis Today the Conservative Party - the bookies' favourite to be the next government of old Blighty - sets out as much of its plans on national-security matters as it is willing to share before this year's election.

PM-in-waiting David Cameron, in a speech delivered today at Chatham House, promised "one of the most radical departures in security policy we’ve seen in decades" and assured the nation that "this isn’t some rebranding exercise, a nod towards new thinking, an attempt to paper over the cracks while time slips away".

Detail is provided in a paper (but not the sort you put over cracks), which can be found here. Curiously, the pic* chosen to head the Tory webpage shows two servicemen - presumably foreigners, as they aren't wearing British issue kit - staring moodily at some parked Canadian jets.

Here are a few highlights, touching on the issues which matter to Reg readers.

First up, the Tories make the now-obligatory nod to national cyber security, speaking of "the reliance of developed societies and economies on networks and computer systems for the effective functioning of all aspects of daily life". They say that "the threat of cyber attack is widely disregarded" and that "the West, which has become so dependent on technology, will also find that its current technological superiority will decline".

But the Tories will sort this out:

A Conservative government will set up a Cyber Threat and Assessment Centre (CTAC), by building on the existing Cyber Security Operations Centre to provide a common operating picture, threat assessment and situational awareness to users. It will act as the single reporting point for all cyber-related incidents. This will lay the foundation for the development of a National Operations Centre able to respond to cyber events.

The Conservatives also promise that everyone in law enforcement will become "cyber literate" under their rule, and further that "the gap in national digital forensics capability will be addressed".

There's some crowdpleasing stuff, though, for those who feel that the British security community is already a damn sight too keen on new surveillance and forensic technology and databases in which to keep the resulting files. Cameron and Co promise that they will:

...review relevant national databases and systems to develop a clear statement of purpose for each in line with the principles of proportionality and necessity, and to develop adequate governance regimes including strengthening and adequately resourcing the Information Commissioner’s Office.

There's a repeat of earlier pledges to scrap Labour's national ID card scheme and to shift the main police DNA database onto the same rules as in Scotland (signatures can only be held for those awaiting trial on prison-worthy offences, and retained only on conviction or for those charged with violent or sex crimes).

However, the Tories don't offer even a hint of a promise on existing plans by the spook community for mass trawling of almost all electronic communications, the so-called Intercept Modernisation Programme (IMP). They merely say that the IMP will "be reviewed".

*Changed since we filed this story, funnily enough.

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.