Feeds

UK.gov open to hiring EX-CON hackers for cyber reserves

Justice League or Rogues Gallery?

Remote control for virtualized desktops

Agents of SHIELD

Ross Brewer, vice president at security tools firm LogRhythm, said the openness to hire hackers could be based on the previously stated intention for the UK to have a cyber offensive capability, a move he reckons is going in the wrong direction.

“Previous warnings about the dangers of blindly attacking the networks of 'enemy' states still stand, and employing convicted hackers to carry out such pre-emptive strikes could lead the government, and the country, into dangerous waters if not managed correctly," Brewer said.

“Modern cyber criminals are experts in their own right, so it makes sense to build an army of highly specialist reserves to combat them. While we know that there is a dangerous dearth of skilled individuals in the cyber arena, the government needs to tread very carefully if looking to employ convicted criminals and ensure no blurring of the lines of morality. Ask yourself, for instance, whether it would be logical to hire ex-bank robbers as security guards for the banks that they robbed!"

Despite these criticisms, Brewer did see some potential benefits in hiring ex-hackers.

"That said, convicted hackers are likely to be some of the best in the business and therefore employing them would allow the government to tap into skills it may otherwise not have access to."

"While White has stated that each applicant will be assessed on a case-by-case basis, taking into account the severity of convictions, the unit will need to ensure it does not become a body of outlaws deployed to attack others. What’s more, it will be absolutely critical to ensure that powers are not abused and citizens’ information is safeguarded against rogue hackers permitted into this privileged position."

Brewer concluded: “Giving convicted hackers a chance is one thing, trusting them implicitly is quite another,” he concluded. ®

Intelligent flash storage arrays

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.