Feeds

Hong Kong cops open £700k cyber security centre

27-man centre will try to spot and combat CNI attacks

The Power of One Infographic

The Hong Kong government has thrown HK$9 million (£730,000) at a new Cyber Security Centre in a bid to tackle the growing threat to critical infrastructure in the Special Administrative Region of China.

Police commissioner Tsang Wai-hung said at the opening ceremony last Friday that the 27-man centre would be staffed by officers from the small Technology Crime Division and heralded it as the first step towards working more closely with public and private sector organisations.

“Extensive research indicates that the global community continues to suffer from increasingly sophisticated and elusive cyber attacks and if such attacks were successful on critical infrastructure systems the consequences to society would be serious and far reaching,” he said.

“So in recognising this global threat as well as drawing references from overseas experience, the force has decided that the setting up of this centre will - in collaboration with the stakeholders – strengthen our resilience against such threats.”

The centre will be used to support the division’s efforts at spotting and preventing hi-tech crime; analyse and respond to cyber attacks in real-time; and strengthen industry collaboration domestically and internationally.

However, the force was immediately put on the back foot over its plans to monitor data traffic over critical infrastructure systems, despite giving assurances it would only be looking at general data flows and not inspecting specific content.

Lawmaker and founder Charles Mok told the local South China Morning Post that independent experts should be called in to audit the technology and report back on whether web users’ privacy rights will be respected.

"Now, the law enforcers and banks have agreed to monitor certain data. The banks may not find this a problem, but its clients may be worried," he said.

While Hong Kong has had a CERT for over a decade, there have been mutterings that it is under-resourced to deal with the growing online threat to businesses.

Roy Ko, manager of the HKCERT, told The Reg that it will work closely with the Centre to share info on compromised machines and other intelligence.

"Our work will focus on cleaning up compromised machines in Hong Kong as these compromised machines may launch attacks on others. The police focus mainly on attacks targeting HK organisations and to warn or protect these organisations," he explained.

"A mechanism to analyse cyber threat-related traffic is necessary to provide early warning and quick response to attacks, in particular DDoS attacks. HKCERT proposed a similar system a few years back and I am glad that the HK police force finally got the funding and resource to do that. But there is still a lot to be done."

Financial losses due to “technology crime cases” in the SAR have jumped from HK$45m (£3.6m) in 2009 to HK$148.5m (£12m) last year, with online fraud, DDoS-related blackmail and hacktivism among the most common threats. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.