Feeds

GCHQ losing its 'internet whizzes' to Microsoft, Google

'Mission Fantastic' tech-spooks lured away by triple pay

Choosing a cloud hosting partner with confidence

British spooks, who are increasingly being tasked with wading into the so-called cybersecurity threat, have been fretting about the dearth of internet experts at GCHQ because the intelligence agency can't compete for expertise with the likes of Microsoft and Google.

The agency's director told the Intelligence and Security Committee in an annual report published yesterday that GCHQ was struggling to match the private sector's pay scale for such talent.

"I need some real internet whizzes in order to do cyber and I am not even sure they are even on the contractor market, so I need to work on that. They will be working for Microsoft or Google or Amazon or whoever. And I can't compete with their salaries; I can offer them a fantastic mission, but I can't compete with their salaries," the cash-strapped director told the committee.

"But I probably have to do better than I am doing at the moment, or else my internet whizzes are not going to stay ... and we do have a steady drip, I am afraid.

"Month‑on‑month, we are losing whizzes who'll basically say: 'I'm sorry, I am going to take three times the salary and the car and whatever else'."

The committee said it was worried about the spook agency's "inability to retain a suitable cadre of internet specialists to respond to the threat".

It called on GCHQ to look at current pay constraints within the agency to see if could "improve the situation" and recommended that the Cabinet Office should consider the introduction of bonuses for specialist skills.

Earlier this week, the Coalition rebranded GCHQ's internet spook-tech plans by resurrecting Labour's Interception Modernisation Programme (IMP) under the Communications Capabilities Development Programme (CCDP) moniker.

Under that plan, Home Secretary Theresa May wants to tackle P2P threats, encryption technology for voice and text mobile communication, and the thorny topic of e-borders.

All of which probably demands a top-bracket geeky gaggle of internet gurus on the case. So good luck with that one, lads. ®

Internet Security Threat Report 2014

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
NATO declares WAR on Google Glass, mounts attack alongside MPAA
Yes, the National Association of Theater Owners is quite upset
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.