Feeds

Cameron to spend £1bn+ on cyber security

Operation 'active defence' is go

Build a business case: developing custom apps

David Cameron will next week allocate more than a billion pounds to a cross-government effort to bolster Britain's cyber security, Whitehall sources have told The Register.

The funding will be announced by the Prime Minister as part of the Strategic Defence and Security Review.

The largest share of the three-year budget will be used to acquire what sources call "active defence" capabilities against targeted attacks on critical civilian networks such those that run utilities and the NHS. Security chiefs will be able to order technicians to trace and block attacks.

Methods might include distributed denial of service against attackers, or more sophisticated methods such as taking over command-and-control servers. Senior sources with intimate knowledge of the intelligence services also agree that Britain is one of half a dozen nations with the technical expertise to create Stuxnet-style bespoke malware.

Cabinet Office officials have been examining the legal ramifications of such responses for a year.

Sources said GCHQ, in Cheltenham, will be the hub of the new defences. It has hosted the Cyber Security Operations Centre since November 2009, so far focused on gathering intelligence on online threats rather than directly responding to them.

In a speech this week, GCHQ director Ian Lobban made oblique reference to the coming new "active defence" capabilities when he said 20 per cent of the online threat "is complex and not easily addressed by just building the security walls higher and higher".

The military will also benefit from the spending. Officials in the Ministry of Defence are currently liaising on training with Pentagon counterparts who set up US Cyber Command. A corps of British cyber security personnel will be tasked with defending military networks, and attacking those of battlefield enemies.

As well as dealing with attacks, the new cyber security budget will also be used to bolster Britain's digital defences against espionage. Government and commercial networks are continually probed for weaknesses, Lobban reaffirmed this week.

Chinese infiltrators targeted Rolls Royce in 2007 and stole the full secret blueprints for one of its jet engines, sources said. The raid was publicly played down as a mostly a failure at the time, but its success privately shocked security mandarins.

The decision to allocate more than a billion pounds to cyber security, at a time when other defence and intelligence spending is being squeezed is, in part, Britain's response. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.