Intelligence and security services warn of cloud-borne threats

Cloud computing being used to clandestinely store, share and distribute material online

Intelligence and security service plans to seek further powers to deal with terrorist use of the internet and cloud services have been outlined by Home Secretary Theresa May.

She also raised concerns about the increasing use of software to encrypt mobile phone voice and text, the distribution of files through peer-to-peer networks and the way cloud computing offers new means to clandestinely store, share and distribute material online.

Some details are contained in a new Counter Terrorism Strategy published by the Home Office, which ranged far wider than the use of IT, including activity to identify and discourage potential terrorists in the further and higher education system.

Delivering a speech to the Royal United Services Institute, May warned that, in the cloud, information "can be encrypted and configured to work with mobile devices, leaving little or no trace of the data behind".

She said terrorists "are making more and more use of new technologies to communicate their propaganda" and claimed: "Estimates of the number of terrorism-related web sites, made by experts in the field, range from several hundred to several thousand.

"It is clear that a few dozen are highly influential and frequented by active terrorists."

She said: "To tackle these new and emerging threats our own technology must constantly evolve and adapt. That's why we are investing in new systems and capabilities."

She added: "Legislation will be brought forward to set up the necessary regulations and safeguards to ensure that the response to this technological challenge is both proportionate and appropriate."

It was not clear what the proposed new law would include or the extent to which the Tories' Liberal Democrat coalition allies will support anything seen as a further infringement of civil liberties.