TESTIMONIALS

“Received the latest edition of Professional Security Magazine, once again a very enjoyable magazine to read, interesting content keeps me reading from front to back. Keep up the good work on such an informative magazine.”

Graham Penn
ALL TESTIMONIALS
FIND A BUSINESS

Would you like your business to be added to this list?

ADD LISTING
FEATURED COMPANY
News Archive

Cyber Law Reform Call

by Msecadm4921

See also article ‘info-sec’ forum – same date.

A group of MPs has suggested some reforms to the UK cyber laws, to take account of 21st century computer crime.

The All-Party Internet Group chaired by Labour MP for Sittingbourne Derek Wyatt wants to see changes to what it sees as an "outdated" Computer Misuse Act. Derek Wyatt said: "The 1990 CMA understandably needs reforming. We hope that our suggestions will see a Bill in the Queen’s Speech in November and that the Home Office and the National Office of Statistics will start to include all cyber crime activities in their Monthly and quarterly figures for without them we are still guessing at the extent of the crimes committed."

The group calls on the Government to consider the recent EURIM (The European Information Society Group) report on ‘Supplying the Skills for Justice’, featured last issue, ‘to inform the effective policing of crime’.

The group heard from among others Andrew Cormack, Chief Security Adviser, UKERNA; Tom Mullen, Manager, Detective Operations, BT; Colin Whittaker, Head of Security, Association for Payment Clearing Services (drawing attention to the huge rise in “ phishing” attacks where users were conned into visiting fake web sites and disclosing security credentials); Tim Wright, Head of Hi Tech Crime Team, Home Office; Leslie Fraser, Security Development Consultant, British Computer Society; and Jim Cottrell, Head of Security Management, Energis. The group reported complaints that the police are not giving sufficient priority to the investigation and prosecution of cybercrime; and that cybercrime was not one of the target measures by which police performance was assessed. BT told the group that it finds it simpler to use section 42 of the Telecommunications Act 1984, covering fraudulent use of telecommunications systems: “The normal result was a caution for the miscreant where they voluntarily signed over their computer equipment.”

The MPs called on ISPs (internet service providers) to develop ‘best practice procedures for proactive monitoring of the security of their customers’ machines’.