Feeds

Cruel new punishment for hackers: Twitter, Facebook bans

Nooooo, anything but that!

Seven Steps to Software Security

Fraudsters and hackers could soon get slapped with social media bans as the government plans to encourage judges to dish out online punishments for online crime. The online tagging system is one of several recommendations announced today in the 2011 Cyber Security Strategy.

Intended to protect Britain and Britain's web business from the effects of cyber-crime, other plans in the report include getting spooks to warn UK consumers to update their anti-virus software on Facebook, and a focus on giving IT training to police.

Outlining the opportunities and also the dangers of the internet – particularly for UK online retail – the report advocates a programme of education and training to make everyone safer online. The government intends to leverage the cybersecurity knowledge it has in spy and intelligence central, GCHQ. It is not telling us about the other stuff it's doing as it's a secret.

Crim-slapping

Criminals who commit online crimes will be more likely to receive online sentences – as well as meatspace ones – as judges are encouraged to make use of laws that allow them to restrict or monitor the use of computers by convicted criminals outside prison. Internet fraudsters could be prevented from selling things online, the document suggests. People convicted of sexual offences, harassment or anti-social behaviour could have their internet access restricted to protect the public.

The idea will work like a cyber-version of the tags that criminals are given in the physical world. They explain:

The Ministry of Justice and the Home Office will consider and scope the development of a new way of enforcing these orders, using ‘cyber-tags’, which are triggered by the offender breaching the conditions that have been put on their internet use, and which will automatically inform the police or probation service. If the approach shows promise we will look at expanding cyber-sanctions to a wider group of offenders

Cyber-hygiene tips from the government

The document suggests that new routines of "cyber hygiene" could prevent 80 per cent of the current cyber crimes that affect businesses and the general public. And they'd like to deliver the new hygiene tips to us over social media.

"By 2015 we want a UK where [..] individuals are wary of email attachments or links from unrecognised senders," says the document. The government wants people to know that they need to update their operating systems and virus software. Specialists from GCHQ – the UK's intelligence and spy service – as well as private companies such as Microsoft and HSBC, will collaborate on the advice, which they then hope to spread to the general public via the medium of Facebook.

The report says that social media is one of the best ways to warn people about scams. One of their aims is to "help consumers respond to the cyber threats that will be the ‘new normal’ by using social media to warn people about scams or other online threats."

PC Plods get an e-makeover

And, finally, police constables will have to up their game too and get to grips with this new world of technology. Embedded "cyber-specials" will be providing training. A cross-departmental body – the new National Crime Agency (NCA) – will pool existing specialists in cybercrime and farm them out across other government departments as needed. The government plans to create a public-private cybersecurity hub leveraging the knowledge of their spooks in GCHQ for the benefit of the wider economy.

In general, the government wants to grow the number of IT security people – or the "cadre of cyber security professionals" as they like to call them – and plan to introduce a new certificate scheme to to accredit the sector and maintain standards.

Both Minister for Cyber Security Francis Maude and Prime Minister David Cameron affirmed that they were committed to the freedom of the internet and welcomed the boom it had brought to UK business. Maude said:

"The growth of the internet has revolutionised our everyday lives and promises untold economic and social opportunities in years to come. This strategy sets out how we will realise the full benefits of a networked world by building a more trusted and resilient digital environment, from protecting the public from online fraud to securing critical infrastructure against cyber attacks." ®

Read 2011's Cyber Security Strategy (PDF)

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.