UK Gov says cloud computing aiding terrorism

Powered by SC Magazine
 

Cloud computing can be used by terrorists as a way of transmitting data without being caught, the UK Government warns.

Terrorists are using cloud computing to plan attacks and remain undetected - and the UK Government needs to keep up with such technological advances.

This was the message of Home Secretary Theresa May, who today outlined the Government’s updated counter-terrorism strategy, known as CONTEST.

Cloud, one of the hot topics in the IT world right now, is one example of how terrorists are using modern technologies for their own ends.

“Cloud computing offers new means for storing, sharing and distributing material online," May warned.

"It can be encrypted and configured to work with mobile devices, leaving little or no trace of the data behind."

Cloud-based companies such as Google are also unwittingly helping terrorists, the Home Secretary explained.

“Terrorists are increasingly using online technology, including Google Earth and Street View for attack planning," she said.

"Ahead of its attempted aviation attacks, AQ-AP used commercial systems to allow air mail to be tracked in real time – we can speculate that this was to detonate a device over a particular city, to maximise casualties, or perhaps over a particular country, to maximise the political fallout.”

May also noted how extremists could use peer-to-peer networks to “distribute files and information rapidly and securely.” Furthermore, software to encrypt mobile calls and texts is now widely available and improving, the Home Secretary said.

“To tackle these new and emerging threats our own technology must constantly evolve and adapt. That’s why we are investing in new systems and new capabilities,” May added.

“Our Communications Capabilities Development Programme will ensure that our investigative capabilities are maintained in the face of rapid changes in digital technology. Legislation will be brought forward to put in place the necessary regulations and safeguards to ensure that the response to this technological challenge is both proportionate and appropriate.”

The updated CONTEST strategy also focused on the need to strengthen border security, using technology such as that involved in e-Borders.

The Government will be announcing its own updated cloud computing strategy before September.

Earlier this week, the UK terror threat level was reduced from “severe” to “substantial.”

This article originally appeared at itpro.co.uk

Copyright © ITPro, Dennis Publishing


UK Gov says cloud computing aiding terrorism
 
 
 
Top Stories
Beyond ACORN: Cracking the infosec skills nut
[Blog post] Could the Government's cybercrime focus be a catalyst for change?
 
The iTnews Benchmark Awards
Meet the best of the best.
 
Telstra hands over copper, HFC in new $11bn NBN deal
Value of 2011 deal remains intact.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  39%
 
Your insurance company
  4%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  3%
 
A Federal Government agency (ATO, Centrelink etc)
  19%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1849

Vote
Do you support the abolition of the Office of the Information Commissioner?