Feeds

Fragrant tech thief stalks Whitehall

Public servants' purses exposed

Top 5 reasons to deploy VMware with Tegile

Civil servants at the Department for Communities and Local Government are living in fear of a sweet smelling mobile technology thief who carries a ladies' purse.

That is the inescapable conclusion after a minister in the department detailed the terrifying catalogue of thefts within the department in a commons answer.

Pete Wishart MP had asked: "What property has been recorded as (a) lost and (b) stolen from the Department in the last 12 months; and what estimate has been made of the cost of the replacement of that property?"

Robert O'Neill revealed that in the last 12 months under the previous government, stolen swag at the department amounted to:

  • Five BlackBerrys valued at approximately £1,000 (£200 each)
  • Six laptop computers valued at approximately £6,000
  • Two mobile phones valued at approximately £250 in total
  • One mobile phone charger valued at approximately £10
  • One laptop login key (stolen from staff home address) valued at approximately £70
  • One memory stick valued at approximately £20

While the new law and order Tory brooms might have been expected to come down hard on the Sim-hungry thief, the reverse appears to have been true. The tide of lawlessness has built even higher.

Since the coalition came to power, another six laptops valued at a grand a pop have disappeared, while an Apple iPhone has been "lost".

Even scarier, civil servants' personal property has been targeted, to wit:

  • One bottle of aftershave
  • One purse
  • Two mobile phones
  • One mobile phone charger
  • One laptop
  • Two memory sticks
  • Two power leads

O'Neill assured Wishart that none of the stolen devices contained classified data, and the laptops and Blackberries were all password protected. Sadly, O'Neill does not detail exactly what kind of aftershave was purloined, meaning public watchdogs have no scent to follow. ®

Beginner's guide to SSL certificates

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.