The UK Government's Response to Cyber Threats
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Annual Report and Accounts 2018-19
National Crime Agency Annual Report and Accounts 2018-19 HC 2397 National Crime Agency Annual Report and Accounts 2018-19 Annual Report presented to Parliament pursuant to paragraph 8(2) of Schedule 2 to the Crime and Courts Act 2013. Accounts presented to the House of Commons pursuant to Section 6(4) of the Government Resources and Accounts Act 2000. Accounts presented to the House of Lords by Command of Her Majesty. Ordered by the House of Commons to be printed on 22 July 2019. HC 2397 © Crown copyright 2019 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at www.gov.uk/official-documents. Any enquiries regarding this publication should be sent to National Crime Agency, Command Suite, Unit 1, Spring Gardens, Tinworth Street, London, SE11 5EN. ISBN 978-1-5286-1296-8 CCS0519221654 07/19 Printed on paper containing 75% recycled fibre content minimum. Printed in the UK by the APS Group on behalf of the Controller of Her Majesty’s Stationery Office. Contents Foreword by the Home Secretary 7 Part Two – Accountability Report Part One – Performance Report Corporate Governance Report 43 Directors’ Report 43 Statement by the Director General 9 Statement of Accounting Officer’s Who we are and what we do 10 responsibilities 44 How -
Serious and Organised Crime Strategy
Serious and Organised Crime Strategy Cm 8715 Serious and Organised Crime Strategy Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty October 2013 Cm 8715 £21.25 © Crown copyright 2013 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www. nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us [email protected] You can download this publication from our website at https://www.gov.uk/government/ publications ISBN: 9780101871525 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID 2593608 10/13 33233 19585 Printed on paper containing 75% recycled fibre content minimum. Contents Home Secretary Foreword 5 Executive Summary 7 Introduction 13 Our Strategic Response 25 PURSUE: Prosecuting and disrupting serious and 27 organised crime PREVENT: Preventing people from engaging 45 in serious and organised crime PROTECT: Increasing protection against 53 serious and organised crime PREPARE: Reducing the impact of serious and 65 organised crime Annex A: Accountability, governance and funding 71 Annex B: Departmental roles and responsibilities for 73 tackling serious and organised crime 4 Serious and Organised Crime Strategy Home Secretary Foreword 5 Home Secretary Foreword The Relentless Disruption of Organised Criminals Serious and organised crime is a threat to our national security and costs the UK more than £24 billion a year. -
Council Decision (Cfsp)
L 246/12 EN Offi cial Jour nal of the European Union 30.7.2020 COUNCIL DECISION (CFSP) 2020/1127 of 30 July 2020 amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States THE COUNCIL OF THE EUROPEAN UNION, Having regard to the Treaty on European Union, and in particular Article 29 thereof, Having regard to the proposal from the High Representative of the Union for Foreign Affairs and Security Policy, Whereas: (1) On 17 May 2019 the Council adopted Decision (CFSP) 2019/797 (1). (2) Targeted restrictive measures against cyber-attacks with a significant effect which constitute an external threat to the Union or its Member States are among the measures included in the Union’s framework for a joint diplomatic response to malicious cyber-activities (the cyber diplomacy toolbox) and are a vital instrument to deter and respond to such activities. Restrictive measures can also be applied in response to cyber-attacks with a significant effect against third States or international organisations, where deemed necessary to achieve common foreign and security policy objectives set out in the relevant provisions of Article 21 of the Treaty on European Union. (3) On 16 April 2018 the Council adopted conclusions in which it firmly condemned the malicious use of information and communications technologies, including in the cyber-attacks publicly known as ‘WannaCry’ and ‘NotPetya’, which caused significant damage and economic loss in the Union and beyond. On 4 October 2018 the Presidents of the European Council and of the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy (the ‘High Representative’) expressed serious concerns in a joint statement about an attempted cyber-attack to undermine the integrity of the Organisation for the Prohibition of Chemical Weapons (OPCW) in the Netherlands, an aggressive act which demonstrated contempt for the solemn purpose of the OPCW. -
Requesting a Defence from the NCA Under POCA and TACT
Requesting a defence from the NCA under POCA and TACT UK Financial Intelligence Unit May 2019 Version 5 1 OFFICIAL OFFICIAL Requesting a defence from the NCA under POCA and TACT This document is intended to inform you of the approach when reporters, through submitting a suspicious activity report (SAR), seek a defence (or ‘consent’) from the National Crime Agency (NCA): to a principal money laundering offence (sections 327-329 Proceeds of Crime Act 2002 [‘POCA’]) under sections 335 and 336 of POCA; and/or a terrorist financing offence (sections 15-18 Terrorism Act 2000 [‘TACT’]) under section 21ZA of TACT. Please ensure you are familiar with: Part 7 of POCA Part 3 of TACT 1 If you are a business in the regulated sector , any guidance issued by your anti-money laundering supervisor, professional body or trade association. If you are unsure, always seek your own independent legal advice and/or consult your supervisor or trade body. If there is a threat of harm or crime in action please ring the police on 999. The UKFIU can be contacted by email: [email protected] 1 If you are unsure if your firm is in the regulated sector consult your regulator, professional body or trade association, or seek independent legal advice 2 OFFICIAL OFFICIAL A note on the term ‘consent’ The term ‘consent’ is frequently misinterpreted. Often it is seen as seeking permission or that where requests are granted that this is a statement that the funds are clean or that there is no criminality involved. This is not the case. -
National Crime Agency a Plan for the Creation of a National Crime-Fighting Capability
THE NATIONAL CRIME AGENCY A PLAN FOR THE CREATION OF A NATIONAL CRIME-FIGHTING CAPABILITY The National Crime Agency A plan for the creation of a national crime-fighting capability Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty June 2011 Cm 8097 £8.50 © Crown copyright 2011 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit www.nationalarchives.gov.uk/doc/ open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us at: National Crime Agency Programme Home Office 6th Floor Peel Building 2 Marsham Street London SW1P 4DF Email: [email protected] This publication is also available for download at www.official-documents.gov.uk ISBN: 9780101809726 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID P002435167 06/11 Printed on paper containing 75% recycled fibre content minimum. Contents FOREWORD 4 EXECUTIVE SUMMARY 5 1 INTRODUCTION 7 2 THE NEED FOR THE NCA 9 • Cutting crime • National threats • Existing response 3 THE VISION FOR THE NCA 12 4 THE SCOPE AND FUNCTIONALITY OF THE NCA 13 • Scope • Resources • Core capabilities - Intelligence, prioritisation and tasking - Investigation -
Mass Surveillance
Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof. -
The Effectiveness of Surveillance Technology: What Intelligence Officials Are Saying
Delft University of Technology The effectiveness of surveillance technology What intelligence officials are saying Cayford, Michelle; Pieters, Wolter DOI 10.1080/01972243.2017.1414721 Publication date 2018 Document Version Final published version Published in Information Society Citation (APA) Cayford, M., & Pieters, W. (2018). The effectiveness of surveillance technology: What intelligence officials are saying. Information Society, 34(2), 88-103. https://doi.org/10.1080/01972243.2017.1414721 Important note To cite this publication, please use the final published version (if applicable). Please check the document version above. Copyright Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons. Takedown policy Please contact us and provide details if you believe this document breaches copyrights. We will remove access to the work immediately and investigate your claim. This work is downloaded from Delft University of Technology. For technical reasons the number of authors shown on this cover page is limited to a maximum of 10. THE INFORMATION SOCIETY 2018, VOL. 34, NO. 2, 88–103 https://doi.org/10.1080/01972243.2017.1414721 The effectiveness of surveillance technology: What intelligence officials are saying Michelle Cayford and Wolter Pieters Faculty of Technology, Policy and Management, Delft University of Technology, Delft, The Netherlands ABSTRACT ARTICLE HISTORY In recent years, Western governments have come under sharp criticism for their use of surveillance Received 5 October 2016 technology. They have been accused of sweeping up massive amounts of information without Accepted 27 November 2017 evidence of the technologies being effective in improving security. -
Cyber Crime Assessment 2016
NCA Strategic Cyber Industry Group Cyber Crime Assessment 2016 Need for a stronger law enforcement and business partnership to fight cyber crime 7 July 2016 Version 1.2 Overview This assessment has been jointly produced by the National Crime Agency (NCA) and the Strategic Cyber Industry Group (SCIG).1 It outlines the real and immediate threat to UK businesses from cyber crime. It argues that the speed of criminal capability development is currently outpacing our response as a community and that only by working together across law enforcement and the private sector can we successfully reduce the threat to the UK from cyber crime. 1 The Strategic Cyber Industry Group provides an overarching forum within which the National Cyber Crime Unit (NCCU) of the NCA and private sector organisations work in partnership to: coordinate joint activity against cyber crime, identify intelligence gaps and improve intelligence sharing, understand the capabilities available in law enforcement and industry, and steer the activities of Virtual Task Forces and ad hoc working groups. We would like to thank Bill Trent of Stroz Friedberg who led the SCIG contributions to this assessment. 2 Executive Summary A cyber attack that poses an existential threat to one or more major UK businesses is a realistic possibility. The long-term impact of such a cyber attack could include substantial loss of revenue and margin, of valuable data, and of other company assets. The impact of litigation costs (and, with the arrival of new regulations, potential fines), the loss of confidence from reputational damage and possible executive-level dismissals could also result in immediate and material loss of shareholder value. -
The Cyber Threat to UK Business 2016/2017 Report Page 1
The cyber threat to UK business 2016/2017 Report Page 1 Contents Foreword (Ciaran Martin - NCSC) ..................................................................................................................................... 2 Foreword (Donald Toon - NCA) ........................................................................................................................................ 3 Executive summary ........................................................................................................................................................... 4 What is the threat? ........................................................................................................................................................... 5 The year in review: pivotal incidents of 2016 ................................................................................................................ 10 Horizon scanning: future threats .................................................................................................................................... 13 Fighting back: what can business do? ............................................................................................................................ 15 Case studies illustrating UK LEA and industry joint protect work ................................................................................. 19 Debate: can we stop the Internet from being used for crime? .................................................................................... 20 Page 2 The -
Report on the Democratic Oversight of Signals Intelligence Agencies
Strasbourg, 15 December 2015 CDL-AD(2015)011 Study No. 719/2013 Or. Engl. EUROPEAN COMMISSION FOR DEMOCRACY THROUGH LAW (VENICE COMMISSION) REPORT ON THE DEMOCRATIC OVERSIGHT OF SIGNALS INTELLIGENCE AGENCIES Adopted by the Venice Commission at its 102nd Plenary Session (Venice, 20-21 March 2015) on the basis of comments by Mr Iain Cameron (Member, Sweden) This document will not be distributed at the meeting. Please bring this copy. www.venice.coe.int CDL-AD(2015)011 - 2 - TABLE OF CONTENTS Executive summary .................................................................................................................... 3 I. Introduction .................................................................................................................. 7 II. The scope of the present study – definitions ................................................................ 7 III. Is there a need for (improved) democratic control? ...................................................... 8 A. What is strategic surveillance? .................................................................................. 8 B. Weaker controls over strategic surveillance? ........................................................... 10 C. Mass surveillance? .................................................................................................. 12 IV. Jurisdiction ................................................................................................................. 15 V. Accountability – constitutional and organisational contexts ....................................... -
Finnish Defence Intelligence Agency - an Actor in National Security?
Journal of Strategic Security Volume 13 Number 2 Article 7 Finnish Defence Intelligence Agency - an Actor in National Security? Mikael Lohse Ministry of the Interior, Finland, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 107-120 Recommended Citation Lohse, Mikael. "Finnish Defence Intelligence Agency - an Actor in National Security?." Journal of Strategic Security 13, no. 2 (2020) : 107-120. DOI: https://doi.org/10.5038/1944-0472.13.2.1799 Available at: https://scholarcommons.usf.edu/jss/vol13/iss2/7 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Finnish Defence Intelligence Agency - an Actor in National Security? Abstract One disparate feature between Finnish civilian and military intelligence is their express relationship to national security. The Finnish Security and Intelligence Service prominently declares to be an expert in national security whereas no corresponding public territorial claim has been made by its counterpart – the Finnish Defence Intelligence Agency (FDIA). This observation leads to the question: are the tasks of the FDIA limited solely to the military defence of Finland or has it any more comprehensive role in safeguarding national security. This article aims to examine this question by comparing the provisions governing the purpose of civilian and military intelligence and analysing the provision on the targets of military intelligence. Legal analysis indicate that military intelligence targets are broadly located in the field on national security, both at the core of military activities and in the outer reaches on non-military activities. -
UK Eyes Alpha by the Same Author UK Eyes Alpha Big Boys' Rules: the SAS and the Secret Struggle Against the IRA Lnside British Lntelligence
UK Eyes Alpha By the same author UK Eyes Alpha Big Boys' Rules: The SAS and the secret struggle against the IRA lnside British lntelligence Mark Urban tr firhrr anr/ fulrr' ft For Ruth and Edwin Contents lntroduction Part One The First published in I996 1 Coming Earthquake 3 and Faber Limited by Faber 2 A Dark and Curious Shadow 13 3 Queen Square London vcrN JAU 3 The Charm Offensive 26 Typeset by Faber and Faber Ltd Printed in England by Clays Ltd, St Ives plc 4 Most Ridiculed Service 42 All rights reserved 5 ZIRCON 56 O Mark Urban, 1996 6 Springtime for Sceptics 70 Mark Urbar-r is hereby identified as author of 7 A Brilliant Intelligence Operation 84 this work in accordance with Section 77 of the Copyright, Designs and Patents Act 1988 8 The \7all Comes Tumbling Down 101 A CIP rccord for this book is available from the Part Two British Library 9 Supergun LL7 tsnN o-57r-r7689-5 10 Black Death on the Nevsky Prospekt L29 ll Assault on Kuwait L43 12 Desert Shield 153 13 Desert Storm 165 14 Moscow Endgame LA2 Part Three l5 An Accidcnt of History L97 l(r Irrlo thc ll:rllirrn 2LO tt),)B / (,1,1 l, I Qulgrnirc 17 Time for Revenge 22L lntroduction 18 Intelligence, Power and Economic Hegemony 232 19 Very Huge Bills 245 How good is British intelligence? What kind of a return do ministers and officials get 20 The Axe Falls 2il for the hundreds of millions of pounds spent on espionage each year? How does this secret establishment find direction and purpose 2l Irish Intrigues 269 in an age when old certainties have evaporated? Very few people, even in Conclusion 286 Whitehall, would feel confident enough to answer these questions.