Labour laptop theft highlights government insecurity
IT security failings highlighted by theft of laptop packed with secret information on next week's party conference

The theft of a laptop holding top secret security information on next week's Labour Party conference has shown the lack of security awareness in government.
The computer, along with details of the conference schedule and whereabouts of the Cabinet, as well as information on next month's Conservative Party conference in Bournemouth, was stolen on Wednesday from a car belonging to a senior Army officer.
Its disappearance has sparked a huge police operation to ensure that politicians don't face any added risks should the unprotected data fall into the wrong hands.
"Carrying company or organisational data outside of the office is like playing Russian roulette," says Lynton Stewart-Ashley EMEA director with security firm GuardianEdge.
"Simple hard disk encryption removes the bullets from the chamber. This whole incident has highlighted the necessity for laptop users to employ electronic data protection measures, encryption being fundamental for protecting this information."
Once encrypted, stored data is completely inaccessible, he says, protecting drives full of confidential files, such as medical records and competitor and customer data.
Greater Manchester Police say that the matter is being fully investigated. "Security arrangements for the Labour Party conference have been fully reviewed and internal procedures re-examined," said a GMP spokesman.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The spokesman said that the police are fully aware of what information was contained on the laptop, and said the information has been reviewed to see if there are any security implications for the conference.
"We would like to reassure the public that GMP's priority is to ensure that the conference and those attending it are safe and secure and we have implemented a robust policing operation to achieve this, while causing minimum disruption to the public," he added.
This is hardly the first incident of its kind, with security experts warning that cyber-thieves are targetting publically carried laptops and PDAs as the easiest way to bypass the data security measures of high profile organisations. Last year, a drunk MI6 agent had a laptop chock full of classified government data stolen as he sat in a pub.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
ThreatLabz Report: The state of encrypted attacks
Whitepaper What's hiding in your web traffic?
By ITPro
-
How to encrypt files and folders in Windows 10
Tutorials Here’s how to make your sensitive data unreadable to prying eyes
By Dale Walker
-
The government needs to abandon its war on WhatsApp
Opinion Encryption might seem like an easy target, but mess with it at your peril
By Adam Shepherd
-
Watch: Now this is how you securely erase data
In-depth Delete your data properly - by smashing your laptop to pieces
By Adam Shepherd
-
Alan Turing's computer-generated music gets restored after 65 years
News Decades later, you can now hear the true sound of Turing's computer
By Lee Bell
-
Two laptops are lost on the tube every day, says TfL
News Number of lost devices has shot up by almost 80 per cent since 2010
By Adam Shepherd
-
Social networks should report suspicious users, says spy boss
News MI5 director general calls for updated surveillance powers
By Rene Millman
-
Symantec finds Breaking Bad-themed ransomware
News Better call Saul, because these hackers may have encrypted your data
By Adam Shepherd