Feeds

Spooks take the wheel in UK's £650m cyber-war operations

GCHQ to lead info sharing with govt and biz

Securing Web Applications Made Simple and Scalable

Cyber-weapons to defend the nation

The government is also investing in not just defence but "proactive measures to disrupt threats to information security". The strategy appears to call for the development of offensive as well as defensive capability without outlining the circumstances in which these offensive capabilities might be used or what form they might take.

A new Cyber Defence Operations Group at the Ministry of Defence, overseen by Air Marshall Sir Stuart Peach, head of the new Joint Forces Command, will develop "new tactics, techniques and plans to develop military cyber capabilities", including offensive as well as defensive capabilities, from April 2012.

The MoD's new Defence Cyber Operations Group - which will include a joint cyber unit hosted by GCHQ - will "develop new tactics, techniques and plans to deliver military cyber capabilities".

Flying a secure kite

Improving consumer awareness about internet threats is seen as a key area by ministers. The government wants to establish kitemarks for cyber-security software to help punters and bosses understand the capabilities of products and allow them to make more informed choices. The idea is that kitemarks will help consumers distinguish between genuine and fake anti-virus products, for example. Several security firms have questioned whether this tactic will prove effective.

"It's easy to predict that scammers will simply put bogus kitemarks on their sites and fake anti-virus products to fool products into believing that they are legitimate. After all, they already use the names of legitimate anti-virus products and award logos," Cluley notes.

The government also wants to boost the Get Safe Online website: "Get Safe Online is a terrific website with superb material, but without more money being sent promoting the site to a wider audience, it will continue to suffer from a lack of awareness and most people will simply not know that it exists," Cluley adds.

Rik Ferguson, director of security research and communication at Trend Micro, was more upbeat about the efforts to bolster Get Safe Online. He was also positive about proposals for ISPs to become more pro-active about warning consumers if their PCs are infected with malware.

"Security companies have been saying for some time now that Internet Service Providers have a greater role to play in informing and assisting their customers who have fallen victim to cybercrime and this report promises to explore that capability although without a concrete timeline,” Ferguson said.

Cybercrime re-organisation and iPlods

Over the next two years the government plans to create new cybercrime unit within the new National Crime Agency that will take the lead in dealing with the "most serious national-level cybercrime and to be part of the response to major national incidents". Scotland Yard's Police Central eCrime Unit will be subsumed into this task force in a move that recalls what happened with the National Hi-Tech Crime Unit was swallowed up by the Serious and Organised Crime Agency back in 2006.

Ferguson welcomed the move: "The report finally promises a unified body at the heart of British law enforcement as well as extensive lobbying and support for cross border cooperation on prosecuting cybercrime, something which is key to successfully closing down criminal operations, as was seen in the Esthosts takedown this month."

However he warned that after several changes over recent years in the structure of policing cybercrime the government needs to stick by its latest re-organisation. "There have been too many changes in the recent past," Ferguson said. "We need stability or else confidence will be lost."

"There needs to be strong links between existing and proposed agencies," he added.

Police forces will be encouraged to recruit more so-called cyber-specialists, part-time officers who are experts in computing, already named iPlods by some wags.

The government hopes to make it easier to report financially motivated cybercrime by establishing a single reporting system for businesses and the public, Action Fraud. Meanwhile courts will be given powers to impose internet restriction orders, a type of cyber-ASBO discussed in an earlier story here.

On the diplomatic front, the government wants to push for wider adoption of the Budapest convention on cybercrime, as a move designed to ensure that their a fewer territories where internet fraudsters can operate with impunity.

Second edition

The overall strategy - which succeeds policies developed by the Brown government and published in 2009 - follows extensive consultation with industry, law enforcement and internet bodies that began while the Conservatives were in opposition. Ferguson commented: "If the UK manages to deliver on all the promises of this report it will put us in a leading position in Europe and globally to prevent online crime in the first instance and take action where it does arise.”

ESET's Harley said that while the Brown government's strategy focused on protecting critical infrastructure firms - banks, utilities and telecommunication carriers - the Coalition's strategy focused on helping a wider range of public and private sector organisations, something he described as a positive development.

“I welcome the fact that the government seems to be aware that the nation’s security is not restricted to those organisations formally recognised as part of the critical national infrastructure. It’s a good thing, on the whole, that more generalised cybercrime will be getting some attention as well as the more glamorous but very fluffy topic of cyber-warfare, as in practice it’s not always easy to separate the two.

"My gut feeling is that the proportion of targeted attacks to run-of-the-mill non-targeted attacks is probably overestimated."

The UK's Cyber Security Strategy can be downloaded from the Cabinet Office website here. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.