Tag: Theresa May
They must begin preparing now for the impact of potential legal and regulatory changes on their IT services strategies.To read this article in full or to leave a comment, please click here
The tough line - contained in Wednesday's historic letter triggering Article 50 - has re-focused minds on the possible security implications of Brexit.…
Bringing the Latest and Greatest on Technology Industry Issues from Artificial Intelligence to Cyber Security to the North West, for a Third Successful Year
London, 25 January 2017 – IP EXPO Manchester, part of Europe's number one enterprise IT event series, today launches its 2017 showcase, which promises to be the most insightful and topical yet.
IP EXPO Manchester Be Inspired
2017 is a year of opportunity for Manchester, with Prime Minister Theresa May allocating £130.1 million in investment for the Greater Manchester region. Manchester City Council will also invest an additional £4 million in two new tech hubs to support the Northern cities booming technology, science and digital industries.
With additional focus on development in AI, AR, VR and automation technologies, Manchester is well placed to continue to grow its international technology reputation and be at the forefront of overcoming industry issues and challenges.
Be it Brexit, changes in European legislation such as General Data Protection Regulation (GDPR), or the advancement of artificial intelligence, there is a vast landscape of new issues for IT professionals to navigate.
For its 2017 event, IP EXPO Manchester will address all these changes in the region by providing local organisations with access to an unprecedented group of influential speakers and brands across central themes of Cloud, Cyber Security, Networks and Infrastructure, DevOps, Open Source and a brand new topic combining AI, Analytics and IoT. Now in its third successful year, the two-day event will take place on 26-27 April 2017 at the Manchester Central, Manchester.
“2017 is shaping up to be one of the most transformative years ever with so many disruptive and exciting new technologies now mature and available.
Add to this the growing need for businesses to digitally transform to stay competitive and the continued growth of the cyber threat landscape there is a crucial need for information, expertise and advice. Our mission is to provide our attendees with rare access to the industry leaders and the world class experts that are creating and shaping these technologies.” comments Bradley Maule-ffinch, EMEA Portfolio Director for the IP EXPO Event Series.
He continues, “IP EXPO Manchester is our fastest growing event and easily the largest enterprise IT event in the North.
Artificial Intelligence, going serverless, DevOps and Cloud technologies are just some of the areas we’ll be covering as well as our cyber security content around GDPR, ransomware, social engineering, and threat protection.
IP EXPO Manchester aims to bring together the right people and brands under one roof to help IT professionals discuss, debate and discover more about the challenges and opportunities these issues bring to the region and beyond.”
2017 Programme highlights include:
- Panel debate on the ‘Future of Artificial Intelligence’ featuring Amy Nicholson, Tech Evangelist Microsoft UK
- Live hack demonstration from Ken Munro, Founder of Pen Test Partners
- Industry leading speakers such as:
- David Lewis – Global Security Advocate at Akamai Technologies
- James Akrigg – Head of Technology for Partners at Microsoft
- Paul J Taylor – Detective Constable for Cyber Crime at Greater Manchester Police
- Jenny Radcliffe – ‘The People Hacker’
For further information and to register free for IP EXPO Manchester 2017, please visit: www.ipexpomanchester.com.
Get involved on Twitter using #IPEXPOManchester
About IP EXPO Manchester
IP EXPO Manchester is part of Europe’s number one enterprise IT event series, IP EXPO.
The event series also includes IP EXPO Europe in London and IP EXPO Nordic in Sweden. Launched by organisers Imago Techmedia in 2015, the event now encompasses six events under one roof including Cloud, Cyber Security, Networks and Infrastructure, DevOps, Open Source and a brand new topic combining AI, Analytics and IoT.
Designed for those looking to find out how the latest IT innovations can drive and support their business and transition to a digital future
The event showcases brand new exclusive content and senior level insights from across the industry, as well as unveiling the latest developments in IT.
It covers everything you need to run a successful enterprise or organisation.
Gemma Smith / Vicky Muxlow
020 3176 4700
Speaker or exhibitor enquiries:
Sophie Barry / Keiran Prior
0203 841 8500
The UK increasingly relies on networked technology in all areas of society, business and government.
This means that we could be vulnerable to attacks on parts of networks that are essential for the day-to-day running of the country and the economy. The government goes on to say that it is “working with industry, especially communications service providers, to make it significantly harder to attack UK internet services and users, and to greatly reduce the prospects of successful attacks having a sustained impact on the UK”. The National Cyber Security Centre, which opened for business in October, will have a key role in co-ordinating response and developing best practice. May Day PM Theresa May's administration updated the National Cyber Security Strategy in November 2016.
The updated strategy - which did not contain any new spending pledges - is expected to include an increase in focus on investment in automated defences to combat malware and spam emails as well as a greater emphasis on building skills and research.
The revamped programme also places a greater emphasis on active cyber defence, a broad term that in practice means anything from running honeypot networks to hacking back against adversaries. We continue to invest in cyber detection and response, as attacks against the UK continue to rise. Over the last year, we have developed new technical capabilities to improve our ability to detect and analyse sophisticated cyber threats. Law enforcement continues to work with industry partners to increase specialist capability and expertise, as well as providing additional training in digital forensics. We are also continuing to progress our Active Cyber Defence measures against high-level threats, by strengthening UK networks against high volume/ low sophistication malware. The report unveiled plans, still only at the proof of concept stage, to develop a new secure cross-government network to “enable more efficient handling of national security matters”. No timetable was given for what might be described as the Government Secure Intranet (GSI) 2.0. Skills are always a key problem in the cyber security arena.
The UK government wants to promote cyber security education, starting with teenagers in schools and going all the way up to university programmes. A new Cyber Security Skills Strategy is now under development, which will set out how we will work with industry and academic providers to secure a pipeline of competent cyber security professionals. GCHQ’s CyberFirst scheme was established to identify, support and nurture the young cyber talent the UK will need in the digital age.
In 2016, we announced a major expansion to the scheme, including a programme in secondary schools, with the aim of having up to a thousand students involved by 2020.
The first cohort of 14-17 year olds will begin training under this programme in 2017. We are working with industry to establish specific cyber apprenticeships for three critical national infrastructure sectors: energy, finance and transport.
Acknowledging the key role universities play in skills development, we are also working to identify and support quality cyber graduate and postgraduate education, building on the certification programme for cyber security Masters courses, established by GCHQ. We are working to establish an active body to provide visible leadership and direction to the cyber security profession, and to advise, shape and inform national policy. Moving towards tackling cyber crime, the National Crime Agency (NCA) and the police have increased their numbers of ‘cyber specials’ working alongside law enforcement officers on cyber crime, and are “making good progress towards a target of 80 cyber specials in post by the end of March 2018”.
To tackle criminal use of the 'dark web', a new Dark Web Intelligence Unit has been established within the NCA, the report states. “The upgrade of its capability will continue throughout the 2016-17 financial year and beyond leading to significantly greater technical capability.
This will enable the use of multiple data sources, offer new and different types of analysis, and coordinate with multiple agencies to deal with issues at scale.” Back to more mundane matters, the UK government is also investing in regional cyber crime prevention coordinators, who “engage with SMEs and the public to provide bespoke cyber security advice”. On a related theme, UK.gov promised to promote its Cyber Essentials scheme to help businesses protect against common cyber threats. Although GCHQ and policing agencies are most vested in developing cyber security policies, the cyber arena also enters into the work of other government departments.
For example, the FCO’s £3.5m Cyber Security Capacity Building Programme is delivering a portfolio of 35 projects benefiting 70 countries to support the “openness and security of networks that extend beyond our own borders”. To help promote commercial endeavours in security the government is introducing two new cyber innovation centres based in Cheltenham and London; academic start-ups; a £10m Innovation Fund; a proving ground; and an SME boot camp. “GCHQ has reached out to industry and encouraged firms to invest in cyber security research through the CyberInvest programme which now has 25 industry members committed to investing millions of pounds in cyber security research at UK universities over the next five years,” the government report added. ® Sponsored: Want to know more about PAM? Visit The Register's hub
The 31-year-old—who has Asperger's syndrome—faces up to 99 years in prison and fears for his own life, his lawyers have said. A home office spokesperson told Ars: "On Monday 14 November, the secretary of state, having carefully considered all relevant matters, signed an order for Lauri Love’s extradition to the United States. Mr Love has been charged with various computer hacking offences which included targeting US military and federal government agencies." Rudd considered four so-called legal tests of the Extradition Act 2003: whether Love is at risk of the death penalty; whether specialty arrangements are in place; whether Love has previously been extradited from another country to the UK, thereby requiring consent from that country; and whether Love was previously transferred to the UK by the International Criminal Court. However, the home secretary concluded that none of these issues applied to Love. The extradition comes after more than 100 MPs recently penned a letter to President Barack Obama, urging him to prevent Love's extradition to the US on the grounds that the hacking suspect's case is similar to that of British citizen Gary McKinnon, whose extradition to the US was blocked in 2012 by then Home Secretary Theresa May. At the time, May introduced a forum bar to stop extradition in cases where the defendants' human rights were said to be at risk.
But the prime minister recently noted that the legal position for the forum bar had been changed, adding that it was "now a matter for the courts." In September, District Judge Nina Tempia ruled that Love should be extradited to the US to face trial over the alleged hacking of the US missile defence agency, the FBI, and America's central bank.
At the time, Tempia said that she was satisfied that the decision was "compatible" with Love's Convention rights. On Tuesday, the home office said in its "Lauri Love Fact Sheet": The legislation does not permit the home secretary to consider human rights or health issues in extradition cases, nor would it be appropriate for the home secretary to do so. It is for a judge to decide whether or not extradition breaches an individual's human rights, or whether their health makes it unjust or oppressive to extradite them. Love's lawyers now have 14 days to mount an appeal against his extradition to the US. "We will be appealing," Love's father, Alexander Love told the BBC. "We are talking to our lawyers.
It was going to happen—it was inevitable—but it's still painful. "I cannot begin to express how much sorrow it causes me.
All we are asking for is British justice for a British citizen." This post originated on Ars Technica UK
And waterboarding is your minor form.
Some people say it's not actually torture. Let's assume it is.
But they asked me the question: What do you think of waterboarding? Absolutely fine.
But we should go much stronger than waterboarding.
That's the way I feel.
They're chopping off heads.
Believe me, we should go much stronger, because our country's in trouble. We're in danger. We have people that want to do really bad things! UK-based infosec expert and ex-GCHQ specialist Matt Tait, aka Pwn All The Things on Twitter, told El Reg: Trump's position on torture is a really big deal.
Torture of detainees is directly and unambiguously a violation of the internationally accepted laws of armed conflict – even if used against unlawful enemy belligerents, such as terrorists rather than captured prisoners of war.
Trump's comments on torture are important and a unique deviation for US policy. Previous administrations, even when they have engaged in "enhanced interrogation techniques" such as under George W Bush – and even when these EITs escalate to the point that they are widely called "torture" – the US has gone to lengths to assert that the EITs it did use didn't amount to "torture"; declassified legal memos show lawyers within the Bush administration trying to define the line where interrogation becomes torture and push EITs right up to, but not over, that line. Whether you think the Bush administration was successful or whether it overstepped that line, they did at least know there was a line, and tried not to overstep it. No so with Trump.
Trump actively embraces the idea of torturing detainees. He not only says that torture is ok; he says it's something the US should actively engage in.
And not just to get information.
To "punish" them as well. Even laying aside the enormous domestic law and eighth amendment issues this brings up, this will make it impossible for UK intelligence cooperation with the Trump administration across a range of intelligence programs.
The UK will have to restrict the uses, categories and programs of intelligence sharing with the US if there is any risk the US could use that intelligence to intentionally engage in war crimes. This differs to Trump's position on cybersecurity.
Although his positions are less clear on this topic, it seems that his position largely boils down to a much more substantial active response to cyberattacks on the US.
So long as the response isn't clearly disproportionate, or targeting civilians, this doesn't look especially challenging to international partners; it's certainly not an intentional war crime. On topics such as this, the UK may end up disagreeing with the Trump administration on policy, but ultimately the UK won't be in the same position as with torture where the UK would have to take a firm line of non-cooperation to avoid being complicit in a war crime itself. Jim Killock, executive director of the Open Rights Group (ORG), warned The Register: "If the US openly pursues a policy of torturing those suspected of terrorism, it cannot legally be enabled by the sharing of intelligence from the UK." "However, given the close integration of the UK and US intelligence agencies, it will be difficult to separate our data sharing and technologies," Killock continued. "This presents a huge challenge for oversight, who need to be aware of the possibility that GCHQ might be urged to help with policies that are indefensible." ORG additionally warned that Trump will exert a great deal of control over GCHQ's operations as President, and stressed the integration between the UK and US signals intelligence organizations.
Such integration was today restated by the UK's Prime Minister, Theresa May, who congratulated Trump and applauded how "Britain and the United States have an enduring and special relationship based on the values of freedom, democracy and enterprise." "We are, and will remain, strong and close partners on trade, security and defense," stated May. "I look forward to working with President-elect Donald Trump, building on these ties to ensure the security and prosperity of our nations in the years ahead." ® Sponsored: Customer Identity and Access Management
The 31-year-old faces up to 99 years in prison in the US if convicted.
According to his lawyers, Love has said he fears for his life. Hacking allegations against Love stem from the Anonymous-related #OpLastResort hack in 2013.
The initiative targeted the US Army, the US Federal Reserve, the FBI, NASA, and the Missile Defense Agency in retaliation over the tragic suicide of Aaron Swartz as the hacktivist infamously awaited trial. Love is accused of participating through SQL injection attacks, Love's legal team have argued that their client's case is similar to that of British citizen Gary McKinnon, whose extradition to the US was blocked in 2012 by then home secretary Theresa May.
At the time, May introduced a forum bar to stop extradition in cases where the defendants' human rights were said to be at risk. Hancock, who is the Love family's local MP, signed the letter alongside a cross-party coalition of 104 other politicos.
The missive to Obama asks: The UK has prosecuted at least twelve computer hackers who have hacked US-based computer systems.
Indeed, Mr Love would be the first UK-based computer hacker to be extradited and denied the opportunity to face a full prosecution in the UK.
The UK criminal justice system is equipped to bring justice through sentencing and rehabilitating people who are adjudged to have committed these crimes. Many of these twelve cases did not involve individuals who have significant mental health issues, nor Asperger Syndrome and were not at a high-risk of suicide, yet they were not extradited. We would like to ask, why then is the United States insistent on Mr Love’s extradition despite the UK having a proven track record of appropriately sentencing and rehabilitating individuals who have committed computer hacking offences against the US? The MPs seek an "act of compassion" from the US president by urging him in his final days of office to personally intervene in the case, kill the extradition order, and allow it to be heard in the UK. "You would be acting to prevent this vulnerable and mentally unwell man from being placed in a situation where he will most probably take his own life," the letter states. Prime minister May—when recently quizzed in parliament by McKinnon campaigner and MP David Burrowes—said of the forum bar: "We subsequently changed the legal position on that, so it is now a matter for the courts.
There are certain parameters that the courts look at in terms of the extradition decision and that is then passed to the home secretary.
It is for the courts to determine the human rights aspects of any case that comes forward." She added: "It was right, I think, to introduce the forum bar to make sure there was that challenge for cases here in the United Kingdom, as to whether they should be held here in the United Kingdom, but the legal process is very clear and the home secretary is part of that legal process." This post originated on Ars Technica UK
But Russia is by no means the only nation chancing its arm with government hacks. Last year, the NSA was accused of spying on Angela Merkel and other high-ranking German officials using Reign malware. This isn't the first time Apple Watches have disrupted cabinet meetings.
The Telegraph also reports that when Gove was chief whip he accidentally played a few bars of a Beyonce song while "surreptitiously checking his e-mails." This post originated on Ars Technica UK