To match an exact phrase, use quotation marks around the search term. eg. "Parliamentary Estate". Use "OR" or "AND" as link words to form more complex queries.


View sample alert

Keep yourself up-to-date with the latest developments by exploring our subscription options to receive notifications direct to your inbox

Written Question
Cybercrime: Public Sector
Tuesday 30th April 2024

Asked by: Dan Jarvis (Labour - Barnsley Central)

Question to the Home Office:

To ask the Secretary of State for the Home Department, whether he has made an assessment of the potential merits of introducing a ban on public sector bodies paying a ransom to criminal groups in exchange for decryption.

Answered by Tom Tugendhat - Minister of State (Home Office) (Security)

Cyber crime is a significant threat to the security and prosperity of the UK. The most recent Crime Survey for England and Wales (CSEW) estimated that there were 984,000 ‘computer misuse’ offences against individuals in England and Wales in the year ending December 2023. The Government recognises ransomware as the most significant national security cyber threat.

The National Cyber Security Centre (NCSC) discourages paying ransoms, noting that such payments rarely ensure data recovery. The UK Government neither pays ransoms nor condones the payment of ransoms to criminals, always advising against such substantial concessions to hostage-takers or extortionists.

At the Counter Ransomware Initiative (CRI) summit in Washington last year, we led a joint statement signed by 46 countries and Interpol, which pledged that “relevant institutions under the authority of our national government” should not be used to pay a ransomware demand. This was the first international statement of its kind. Our joint statement was a major milestone in achieving international consensus around the non-payment of ransoms.


Written Question
Cybercrime
Monday 29th April 2024

Asked by: Tanmanjeet Singh Dhesi (Labour - Slough)

Question to the Home Office:

To ask the Secretary of State for the Home Department, whether he is considering legislative proposals to strengthen the ability to tackle (a) phishing, (b) online payment fraud and (c) other cybercrime.

Answered by Tom Tugendhat - Minister of State (Home Office) (Security)

Crimes such as phishing and online payment fraud are already criminalised under the Fraud Act [2006] and the Computer Misuse Act 1990 (CMA). To ensure that online platforms are doing all they can to further protect the public the Government passed the Online Safety Act (OSA) in November 2023. Fraud is included as a priority offence under the Act, which means tech companies are now required to tackle fraudulent content on their platform that is ‘user-generated’ or face the possibility of significant fines. The Act’s fraudulent advertising duty will also require certain categories of companies to stop fraudulent advertising appearing on their platforms.

The Government published the Online Fraud Charter in November 2023; a voluntary agreement with the largest companies in the tech sector, designed to raise best practice across the sector and deliver a much quicker and more targeted response than regulation. As part of the Charter, signatories have committed to supporting the Government’s Stop! Think Fraud campaign. This was a major campaign – across TV, radio, social media and billboards – that aim’s to improve public awareness by streamlining and amplifying messaging. The campaign, and supporting website, will make it easier for the public to recognise fraud and take steps to protect themselves, their family and friends.

Furthermore, the Government is committed to ensuring that the CMA, the UK’s key piece of cybercrime legislation which criminalises unauthorised access to computer systems and data remains up to date and effective to tackle criminality. We are currently reviewing the CMA, and the Home Office will provide an update to Parliament on any proposals that we will take forward in due course.


Written Question
NHS Trusts: Cybercrime
Monday 29th April 2024

Asked by: Greg Knight (Conservative - East Yorkshire)

Question to the Department of Health and Social Care:

To ask the Secretary of State for Health and Social Care, how many times NHS trusts have been victims of ransomware attacks in the last 12 months; and whether (a) data has been (i) lost and (ii) made public and (b) a ransom has been paid in each case.

Answered by Andrew Stephenson - Minister of State (Department of Health and Social Care)

A small number of cyber-attacks against National Health Service hospitals have been made public, but the specific details on the number, nature, and subsectors of NHS organisations that have been victims of a ransomware attack in the last twelve months cannot be released, as it may prejudice the prevention or detection of cyber-attacks against the NHS.

Our around-the-clock cyber monitoring across over 1.5 million NHS computers allows us to identify that ransomware is the most significant cyber security threat currently facing the health and social care sector. Automated cyber defences and monitoring by NHS England’s Cyber Operations teams continuously deter, prevent, and disrupt attempts to break into the NHS’ IT systems. The NHS implements the Government’s policy of not condoning ransom payment.


Written Question
Public Sector: Cybercrime
Monday 29th April 2024

Asked by: Greg Knight (Conservative - East Yorkshire)

Question to the Cabinet Office:

To ask the Minister for the Cabinet Office, what guidance his Department issues on how (a) schools, (b) NHS trusts and (c) other public bodies should respond to ransomware attacks.

Answered by Alex Burghart - Parliamentary Secretary (Cabinet Office)

The world leading National Cyber Security Centre provides comprehensive guidance to all UK public bodies on how to respond to ransomware attacks, which can be found. The guidance is clear that central Government funds will not be used by Government departments or Arms Length Bodies (ALBs) to pay ransomware demands and this stance was publicly reiterated in November 2023 when the UK, along with other members of the Counter Ransomware Initiative, signed a joint statement discouraging anyone from paying a ransomware demand.

NHS England and the Department for Education provide bespoke guidance for their respective sectors which is consistent with the wider government’s approach. The Department is committed to harnessing expertise on this subject, including recently hosting a roundtable discussion on academic security with the support of the NCSC, to ensure that guidance continues to be appropriate for the developing threat.


Written Question
Cybercrime
Monday 22nd April 2024

Asked by: Gregory Campbell (Democratic Unionist Party - East Londonderry)

Question to the Home Office:

To ask the Secretary of State for the Home Department, how many major cyber crime incidents have been reported since the National Cyber Strategy was introduced.

Answered by Tom Tugendhat - Minister of State (Home Office) (Security)

Since the announcement of the National Cyber Strategy on 15 December 2021, the National Cyber Security Centre (NCSC) has received 71 reports associated with cyber crime activity, considered to be significant.

The NCSC categorise incidents based on numerous contemporaneous factors, including but not limited to, the technical impact of the incident, the nature of the affected organisation, and contextual considerations at the time of the incident report being received.

NCSC and law enforcement take action against cyber criminals by taking down their malicious URLs used to defraud people.


Written Question
Cybercrime
Thursday 14th March 2024

Asked by: Andrew Rosindell (Conservative - Romford)

Question to the Home Office:

To ask the Secretary of State for the Home Department, what steps he has taken to tackle (a) online scams and (b) other cyber crime.

Answered by Tom Tugendhat - Minister of State (Home Office) (Security)

Fraud is designated a priority offence under the Online Safety Act (OSA), meaning companies will be held to account if they fail to remove illegal content on their platforms. This is expected to have a strong impact on some of the highest harm fraud types, such as online purchase, investment and romance scams, as well as key fraud enablers such as the recruitment and use of money mules.

However, the OSA will take time to come into force. Therefore, the Government has also created the Online Fraud Charter: a voluntary agreement bringing together the largest companies in the tech sector, who have committed to a series of actions aimed at reducing fraud on their platforms and services. The Charter was signed on 30 November, and will deliver a much quicker and more targeted response than regulation: Online Fraud Charter - GOV.UK (www.gov.uk).

Tackling cyber crime is at the heart of the Government’s National Cyber Strategy 2022-25, which is supported by £2.6 billion of investment through the National Cyber Fund.

As part of the Criminal Justice Bill, we are also introducing a new power for law enforcement and other investigative agencies to act to suspend IP addresses and domain names where they are being used for a criminal activity with a link to the UK.


Written Question
Education: Cybercrime
Tuesday 5th March 2024

Asked by: Andrew Rosindell (Conservative - Romford)

Question to the Department for Education:

To ask the Secretary of State for Education, whether she has had discussions with Cabinet colleagues on cyber security threats to educational institutions.

Answered by Damian Hinds - Minister of State (Education)

The UK government takes cyber threats to our public institutions very seriously and this threat has been highlighted in both the published Integrated Review and the Government Cyber Security Strategy, which show the cross-government approach the department has to tackling these threats. The Integrated Review is accessible at: https://www.gov.uk/government/collections/the-integrated-review-2021. The Government Cyber Security Strategy is accessible at: https://www.gov.uk/government/publications/government-cyber-security-strategy-2022-to-2030.

The department cyber team continues to work closely with colleagues across government, including those at the National Cyber Security Centre, to manage its cyber risk across educational institutions.


Written Question
Cybercrime: Greater London
Tuesday 27th February 2024

Asked by: Feryal Clark (Labour - Enfield North)

Question to the Home Office:

To ask the Secretary of State for the Home Department, what steps he is taking to help tackle cyber-related crime in (a) Enfield North constituency, (b) the London Borough of Enfield and (c) London.

Answered by Tom Tugendhat - Minister of State (Home Office) (Security)

Tackling cyber crime is at the heart of the Government’s National Cyber Strategy 2022-25, which is supported by £2.6 billion of investment through the National Cyber Fund.

Key to delivery is ensuring that local policing has the resources needed to deal with the cyber threats we face. In 2023/24, the Home Office is receiving £18 million from the National Cyber Fund to provide a range of capabilities and resource to tackle and respond to cyber crime. This funding is supplemented by a further £16 million of Home Office funding through the Police Settlement Programme.

This funding continues to build law enforcement capabilities at the national, regional, and local levels to ensure they have the capacity and expertise to deal with the perpetrators and victims of cyber crime.

There are a wide range of law enforcement and community outreach programmes addressing cyber crime in Greater London and Enfield, which include:

  • The Metropolitan Police Service (MPS) take part in a Junior Citizens Scheme across various boroughs in London. This includes information and presentations to young people around cyber crime.
  • The MPS have been delivering presentations at Designated Safeguarding Lead (DSL) forums across London to raise awareness of how to refer individuals into the Cyber Choices programme, which aims to deter them from committing cyber crime in the first place. The MPS aims to deliver these presentations to all 32 boroughs. The presentation in Enfield took place on the 23rd January 2024.
  • In May 2023, officers from the MPS Protect Team attended Enfield School for Girls and carried out their Cyber Escape Room with 38 students.
  • The MPS Cyber Crime Unit targets Organised Crime Networks (OCN) that utilise Dark Web marketplaces to supply large amounts of drugs. In the last 18 month period, three unconnected OCNs that were operating in the Enfield area were dismantled and convicted.

We continue to work with all of society to tackle cyber crime as we recognise it is an issue that requires collaboration from citizens, businesses and the public sector, keenly working with communities in Enfield to educate and inform as to the harms cyber crime can cause.


Written Question
Cybercrime: Wales
Tuesday 27th February 2024

Asked by: Jo Stevens (Labour - Cardiff Central)

Question to the Home Office:

To ask the Secretary of State for the Home Department, what steps he is taking to help tackle cyber-related crime in (a) Cardiff Central constituency, (b) Cardiff local authority area and (c) Wales.

Answered by Tom Tugendhat - Minister of State (Home Office) (Security)

Tacking cyber crime is at the heart of the Government’s National Cyber Strategy 2022-25, which is supported by £2.6 billion of investment through the National Cyber Fund.

Key to delivery is ensuring that local policing has the resources needed to deal with the cyber threats we face. In 2023/24, the Home Office is receiving £18 million from the National Cyber Fund to provide a range of capabilities and resource to tackle and respond to cyber crime. This funding is supplemented by a further £16 million of Home Office funding through the Police Settlement Programme.

This funding continues to build law enforcement capabilities at the national, regional, and local levels to ensure they have the capacity and expertise to deal with the perpetrators and victims of cyber crime. We directly fund a specialist Cyber Crime Unit at South Wales Police, and more specialist teams at the TARIAN Regional Organised Crime Unit (ROCU). This ROCU team is integral to our response to high-harm, high-impact crimes like cyber extortion, and is a multi-disciplinary team of police officers and police staff seconded from the three forces of South Wales, Gwent and Dyfed-Powys.

TARIAN ROCU works closely with South Wales Police Cyber Crime Unit and work to intervene if people are deemed at risk of becoming involved in cyber offending. This includes working with young and vulnerable individuals offering other intervention and diversion opportunities to young people outside of cyber education, such as life skills, and job interview skills. South Wales Police Cyber Crime Unit engage with all local authorities within the area to ensure effective delivery.

Businesses and organisations based in Wales work closely with ROCUs across the private and public sectors, and at community level. Additionally working collaboratively with the Welsh Government to support the offer of funding to Small and Medium Sized Enterprises (SMEs) for Cyber Essential training, which is a government backed scheme that helps protect organisations against a range of cyber attacks.

We have also rolled out Regional Cyber Resilience Centres in Wales and in each of the other nine policing regions. The Centres are a collaboration between the police, public, private sector and academic partners to provide cyber security advice to SME’s so that they can protect themselves better in a digital age. Details of the Cyber Resilience Centre for Wales can be found at www.wcrcentre.co.uk

All vulnerable victims of fraud and cyber crime in Wales receive contact and PROTECT advice from law enforcement, specifically aimed at helping them to protect themselves in future from revictimization.


Written Question
British Library: Cybercrime
Thursday 18th January 2024

Asked by: Lilian Greenwood (Labour - Nottingham South)

Question to the Department for Digital, Culture, Media & Sport:

To ask the Secretary of State for Culture, Media and Sport, pursuant to the Answer of 27 November 2023 to Question 2570 on British Library: Cybercrime, which services have already been restored; and what is the planned timetable for the remaining services to be restored.

Answered by Julia Lopez - Minister of State (Department for Science, Innovation and Technology)

The final costs of recovery from the recent cyber-attack on the British Library are not yet confirmed. As it has from the outset, the British Library remains in close and regular contact with the Department on the ongoing work to investigate and assess the impact of the attack and to recover services.

Despite the cyber attack, the British Library’s buildings have remained open and well-used throughout, and it has maintained some key services including reading room access for personal study and some limited collection item ordering, exhibitions, learning events, business support, and onsite retail. In the immediate aftermath essential services such as WiFi and event ticket sales were quickly re-established.

On 15 January, the British Library restored a searchable online version of its main catalogue, comprising records of printed books, journals, maps, music scores and rare books. This will enable a manual process of checking availability and ordering to the Reading Rooms. In addition, it will offer access to an increased range of special collection material such as manuscripts and archives. Taken together, these improvements mean that from this date the majority of physical books and special collections held at its St Pancras site will once again be available for use.

Further updates will be provided as the Library continues to recover from the attack.