Lost in cyberspace


What do industry experts see as the biggest threat to cyber space?

It is a conference that has attracted some high profile speakers - from the EU Commissioner Neelie Kroes to the President of Estonia to the Wikipedia founder Jimmy Wales.

Delegates from 60 countries and 17 international organisations have converged on Westminster's QE2 Centre for two days of debate. But what is the London Conference on Cyberspace (and what a delightfully retro term that is) designed to achieve?

After spending a few hours in the company of the delegates I am still slightly bemused. At the launch party in the Science Museum last night, the Foreign Secretary William Hague told us the conference would launch an important dialogue on the threats and opportunities of cyberspace - what he called the big Issues, "the Vision, the Hopes, the Fears". He told us we would be putting together the London Agenda, which would shape national and international discussions of cyberspace for years to come.

But in the run-up to the conference, with the boss of GCHQ issuing dire warnings about the mounting dangers from cyber-attacks, it seemed the focus would be on the fears rather than the hopes. The conference itself is a very dark-suited middle-aged male affair, with many of the delegates coming from the security industry.

The programme features a UK cyber industry showcase, with "the latest technologies and services that UK cyber companies are developing." The list of companies displaying their wares is dominated by big defence and security firms - BAE Systems, Lockheed Martin, Qinetiq, Raytheon - and many of them have been promoting the message that cyberspace is a dangerous territory which they can help tame.

So perhaps the conference is designed to come up with some new international measures to combat cybercrime or a new Geneva convention to agree some rules of engagement for cyber war fare?

That was indeed the fear of a blogger who rang me at the weekend to warn that "world governments are going to get together in London to shut down freedom on the internet!" I tried to calm his fears, pointing out that if governments cannot even get together to sort out the euro, they will struggle to control the internet.

And indeed the Foreign Office has been keen to play down expectations of real outcomes from the conference, stressing that this is just a starting-point.

But this morning's opening session did offer some wider perspectives on the future of the internet. A discussion on Internet Freedom featured a Yemeni online activist, Google's head of Freedom of Expression, and John Kampfner from Index on Censorship.

Mr Kampfner got straight into the dilemma facing policy makers, describing how David Cameron had been keen to shut down Blackberry during the summer riots until William Hague had pointed out just how that would play after Britain's support for the Arab Spring activist.

A couple of other panel members were keen to stress the positive side of the internet, and the power it gave to individuals - and pointed out that it was often governments hacking their own people, not the other way round.

So far though the overall impression at this conference is that cyberspace is a frightening and dangerous place and we need to act together to do something about it. But, apart from handing over large sums to security companies, nobody seems that clear about what concerted action would look like.

Update 17:35: The diplomat who's worked long and hard to make this conference happen, John Duncan, of the Foreign Office, came up to me this afternoon to explain why he felt this blog post was a little wide of the mark. He believes that bringing so many different countries and policy-makers together to discuss the future of cyberspace has been really important. And here's a conversation I recorded with him.

Rory Cellan-Jones Article written by Rory Cellan-Jones Rory Cellan-Jones Technology correspondent

Samsung tries to get an edge on its rivals

Samsung's good looking new smartphone should restore some of its lost confidence.

Read full article

More on This Story

More from Rory


This entry is now closed for comments

Jump to comments pagination
  • rate this

    Comment number 12.

    Trusted Computing is being adopted by the USA with advocates including National Security Agency (NSA) users including General Motors, the NHS (UK!), BASF (Germany) and PriceWaterhouseCooper (PWC). Read up on what TCG is by googling TCG. This "hardware" security approach (enabling TPM's) is part of Windows 8 which will be launched in 2012. Check out Microsoft blogs on same!

  • rate this

    Comment number 11.

    They don't really see the potential do they? Just the fear. Faced with the Great Unknown that is the internet, they fear loss of control/power, and so their first reaction is to arrange all the wagons in a circle. They don't actually like the idea that we can swap data/info unregulated and privately. Make no mistake, they are working hard to ensure that an 'Arab Spring' can never happen here...

  • rate this

    Comment number 10.

    John Duncan's (lengthy) clarification has a LOT of mentions of regulation...

  • rate this

    Comment number 9.

    Interesting that all those people who moaned about the Jobs biography blog (many of whom were asking for a blog about UK cyber-security) have not seen fit to comment here, either to take part in this discussion, or to thank Rory for making their dreams come true. Just goes to show they don't really care about anything other than complaining.

    Interesting article and video report Rory - thank-you.

  • rate this

    Comment number 8.

    There are 500 million computers each with TPM's (Trusted Platform Modules) in Govt/Industry/Society which can be enabled NOW to bring "hardware" security to computers. Please read the work of the Trusted Computing Group (TCG) and google TPM (it's a microprocessor which sits on the motherboard of a PCs to protect computer information)


Comments 5 of 12



Copyright © 2015 BBC. The BBC is not responsible for the content of external sites. Read more.

This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.