Spooks take the wheel in UK's £650m cyber-war operations

GCHQ to lead info sharing with govt and biz

Beginner's guide to SSL certificates

Cyber-weapons to defend the nation

The government is also investing in not just defence but "proactive measures to disrupt threats to information security". The strategy appears to call for the development of offensive as well as defensive capability without outlining the circumstances in which these offensive capabilities might be used or what form they might take.

A new Cyber Defence Operations Group at the Ministry of Defence, overseen by Air Marshall Sir Stuart Peach, head of the new Joint Forces Command, will develop "new tactics, techniques and plans to develop military cyber capabilities", including offensive as well as defensive capabilities, from April 2012.

The MoD's new Defence Cyber Operations Group - which will include a joint cyber unit hosted by GCHQ - will "develop new tactics, techniques and plans to deliver military cyber capabilities".

Flying a secure kite

Improving consumer awareness about internet threats is seen as a key area by ministers. The government wants to establish kitemarks for cyber-security software to help punters and bosses understand the capabilities of products and allow them to make more informed choices. The idea is that kitemarks will help consumers distinguish between genuine and fake anti-virus products, for example. Several security firms have questioned whether this tactic will prove effective.

"It's easy to predict that scammers will simply put bogus kitemarks on their sites and fake anti-virus products to fool products into believing that they are legitimate. After all, they already use the names of legitimate anti-virus products and award logos," Cluley notes.

The government also wants to boost the Get Safe Online website: "Get Safe Online is a terrific website with superb material, but without more money being sent promoting the site to a wider audience, it will continue to suffer from a lack of awareness and most people will simply not know that it exists," Cluley adds.

Rik Ferguson, director of security research and communication at Trend Micro, was more upbeat about the efforts to bolster Get Safe Online. He was also positive about proposals for ISPs to become more pro-active about warning consumers if their PCs are infected with malware.

"Security companies have been saying for some time now that Internet Service Providers have a greater role to play in informing and assisting their customers who have fallen victim to cybercrime and this report promises to explore that capability although without a concrete timeline,” Ferguson said.

Cybercrime re-organisation and iPlods

Over the next two years the government plans to create new cybercrime unit within the new National Crime Agency that will take the lead in dealing with the "most serious national-level cybercrime and to be part of the response to major national incidents". Scotland Yard's Police Central eCrime Unit will be subsumed into this task force in a move that recalls what happened with the National Hi-Tech Crime Unit was swallowed up by the Serious and Organised Crime Agency back in 2006.

Ferguson welcomed the move: "The report finally promises a unified body at the heart of British law enforcement as well as extensive lobbying and support for cross border cooperation on prosecuting cybercrime, something which is key to successfully closing down criminal operations, as was seen in the Esthosts takedown this month."

However he warned that after several changes over recent years in the structure of policing cybercrime the government needs to stick by its latest re-organisation. "There have been too many changes in the recent past," Ferguson said. "We need stability or else confidence will be lost."

"There needs to be strong links between existing and proposed agencies," he added.

Police forces will be encouraged to recruit more so-called cyber-specialists, part-time officers who are experts in computing, already named iPlods by some wags.

The government hopes to make it easier to report financially motivated cybercrime by establishing a single reporting system for businesses and the public, Action Fraud. Meanwhile courts will be given powers to impose internet restriction orders, a type of cyber-ASBO discussed in an earlier story here.

On the diplomatic front, the government wants to push for wider adoption of the Budapest convention on cybercrime, as a move designed to ensure that their a fewer territories where internet fraudsters can operate with impunity.

Second edition

The overall strategy - which succeeds policies developed by the Brown government and published in 2009 - follows extensive consultation with industry, law enforcement and internet bodies that began while the Conservatives were in opposition. Ferguson commented: "If the UK manages to deliver on all the promises of this report it will put us in a leading position in Europe and globally to prevent online crime in the first instance and take action where it does arise.”

ESET's Harley said that while the Brown government's strategy focused on protecting critical infrastructure firms - banks, utilities and telecommunication carriers - the Coalition's strategy focused on helping a wider range of public and private sector organisations, something he described as a positive development.

“I welcome the fact that the government seems to be aware that the nation’s security is not restricted to those organisations formally recognised as part of the critical national infrastructure. It’s a good thing, on the whole, that more generalised cybercrime will be getting some attention as well as the more glamorous but very fluffy topic of cyber-warfare, as in practice it’s not always easy to separate the two.

"My gut feeling is that the proportion of targeted attacks to run-of-the-mill non-targeted attacks is probably overestimated."

The UK's Cyber Security Strategy can be downloaded from the Cabinet Office website here. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story


Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.