Friday, December 24, 2010

New solar fuel machine unveiled

A prototype solar device has been unveiled which mimics plant life, turning the Sun's energy into fuel.

The machine uses the Sun's rays and a metal oxide called ceria to break down carbon dioxide or water into fuels which can be stored and transported.

Conventional photovoltaic panels must use the electricity they generate in situ, and cannot deliver power at night.

Details are published in the journal Science.

The prototype, which was devised by researchers in the US and Switzerland, uses a quartz window and cavity to concentrate sunlight into a cylinder lined with cerium oxide, also known as ceria.

Ceria has a natural propensity to exhale oxygen as it heats up and inhale it as it cools down.

If as in the prototype, carbon dioxide and/or water are pumped into the vessel, the ceria will rapidly strip the oxygen from them as it cools, creating hydrogen and/or carbon monoxide.

Hydrogen produced could be used to fuel hydrogen fuel cells in cars, for example, while a combination of hydrogen and carbon monoxide can be used to create "syngas" for fuel.

It is this harnessing of ceria's properties in the solar reactor which represents the major breakthrough, say the inventors of the device. They also say the metal is readily available, being the most abundant of the "rare-earth" metals.

Methane can be produced using the same machine, they say.

Refinements needed

The prototype is grossly inefficient, the fuel created harnessing only between 0.7% and 0.8% of the solar energy taken into the vessel.

Most of the energy is lost through heat loss through the reactor's wall or through the re-radiation of sunlight back through the device's aperture.

But the researchers are confident that efficiency rates of up to 19% can be achieved through better insulation and smaller apertures. Such efficiency rates, they say, could make for a viable commercial device.

"The chemistry of the material is really well suited to this process," says Professor Sossina Haile of the California Institute of Technology (Caltech). "This is the first demonstration of doing the full shebang, running it under (light) photons in a reactor."

She says the reactor could be used to create transportation fuels or be adopted in large-scale energy plants, where solar-sourced power could be available throughout the day and night.

However, she admits the fate of this and other devices in development is tied to whether states adopt a low-carbon policy.

"It's very much tied to policy. If we had a carbon policy, something like this would move forward a lot more quickly," she told the BBC.

It has been suggested that the device mimics plants, which also use carbon dioxide, water and sunlight to create energy as part of the process of photosynthesis. But Professor Haile thinks the analogy is over-simplistic.

"Yes, the reactor takes in sunlight, we take in carbon dioxide and water and we produce a chemical compound, so in the most generic sense there are these similarities, but I think that's pretty much where the analogy ends."

Daniel Davies, chief technology officer at the British photovoltaic company Solar Century, said the research was "very exciting".

"I guess the question is where you locate it - would you put your solar collector on a roof or would it be better off as a big industrial concern in the Sahara and then shipping the liquid fuel?" he said.

Solar technology is moving forward apace but the overriding challenges remain ones of efficiency, economy and storage.

New-generation "solar tower" plants have been built in Spain and the United States which use an array of mirrors to concentrate sunlight onto tower-mounted receivers which drive steam turbines.

A new Spanish project will use molten salts to store heat from the Sun for up to 15 hours, so that the plant could potentially operate through the night.



Powered by WizardRSS | Work At Home Jobs

Thursday, December 23, 2010

Microsoft warns on IE browser bug

Microsoft has issued a warning about a serious vulnerability in all versions of its Internet Explorer (IE) browser.

If exploited by a booby-trapped webpage the bug would allow attackers to take control of an unprotected computer.

Code to exploit the bug has already been published though Microsoft said it had no evidence it was currently being used by hi-tech criminals.

A workaround for the bug has been produced while Microsoft works on a permanent fix.

Code injection

The bug revolves around the way that IE manages a computer's memory when processing Cascading Style Sheets - a widely used technology that defines the look and feel of pages on a website.

Hi-tech criminals have long known that they can exploit IE's memory management to inject their own malicious code into the stream of instructions a computer processes as a browser is being used. In this way the criminals can get their own code running and hijack a PC.

Microsoft has produced updates that improves memory management but security researchers discovered that these protection systems are not used when some older parts of Windows are called upon.

In a statement Microsoft said it was "investigating" the bug and working on a permanent fix. In the meantime it recommended those concerned use a protection system known as the Enhanced Mitigation Experience Toolkit.

Installing and applying the toolkit may require Windows XP users to update the version of the operating system they are using. But even if they do that some of the protection it bestows on Windows 7 and Vista users will not be available.

"We're currently unaware of any attacks trying to use the claimed vulnerability or of customer impact," said Dave Forstrom, the director of Microsoft's Trustworthy Computing group, in a statement.

"As vulnerabilities go, this kind is the most serious as it allows remote execution of code," said Rik Ferguson, senior security analyst at Trend Micro, "This means the attacker can run programs, such as malware, directly on the victim's computer."

He added: "It is highly reminiscent of a vulnerability at the same time two years ago which prompted several national governments to warn against using IE and to switch to an alternative browser."



Powered by WizardRSS | Work At Home Jobs

Wednesday, December 22, 2010

Skype apology for global blackout

Millions of people around the globe have been hit by an outage at the popular internet phone service Skype.

Users as far afield as Japan, Europe and the US have all reported problems.

The company which prides itself on providing relatively reliable service last suffered a major outage in 2007.

"We take outages like this really seriously and apologise for the inconvenience users are having," Tony Bates, Skype chief executive officer told BBC News.

"Right now it looks like clients are coming on and offline and sometimes they are crashing in the middle of calls. We are deep in the middle of investigating the cause of the problem and have teams working hard to remedy the situation," Mr Bates said.

On Skype's Twitter account, the company said their "engineers and site operations team are working non-stop to get things back to normal".

The news blog ReadWriteWeb said they have monitored complaints from users who reported that they are unable to log into the service and that the programme is crashing across all platforms, whether on their mobile device or PC.

Mr Bates did not rule in or rule out the possibility of a malicious attack and said "all avenues" were being explored.

He estimated that as a result of the outage, Skype has lost around 10 million calls.

Mr Bates told the BBC that normal call volume for the time of day would be 20m.

Om Malik, an industry commentator and editor of the Gigaom.com website, is not impressed.

"Skype is one of the key applications of the modern web," he said.

"It is already a hit with consumers, and over the past few years it has become part of the economic fabric for startups and small businesses around the world. I am not sure we can comprehend the productivity cost of this outage.

"The outage comes at a time when Skype is starting to ask larger corporations for their business. If I am a big business, I would be extremely cautious about adopting Skype for business, especially in light of this current outage," added Mr Malik.



Powered by WizardRSS | Work At Home Jobs

Web attacks plague rights sites

Human rights groups and campaigners are being hit hard by huge web attacks launched by those opposed to their views, finds research.

Many web-based campaigning groups are being knocked offline for weeks by the attacks, it found.

The researchers expect the tempo of attacks to increase as the tools and techniques become more widespread.

It urged human rights groups and independent media groups to beef up their defences to avoid falling victim.

Flash flood

The research by the Berkman Center for Internet and Society at Harvard University tried to get a sense of how often human rights groups and independent media organisations are hit by what is known as Distributed Denial of Service (DDoS) attacks.

DDoS attacks try to knock a site offline by overwhelming it with data.

In the 12 months between August 2009 and September 2010 the research found evidence of 140 attacks against more than 280 different sites. The report acknowledged that these were likely to be the most high profile attacks and that many more had probably gone unreported.

"These attacks do seem to be increasingly common," said Ethan Zuckerman, one of the authors of the report.

While some attacks were triggered by specific incidents such as elections others had no obvious cause, he said.

The report cites a sustained DDoS attack on Novaya Gazeta, the website of Russia's most liberal indepedent newspaper.

Deputy executive editor Sergey Sokolov isn't sure who attacked his website but suspects government-sponsored Kremlin Youth organisations.

The report finds that DDoS is increasingly being used as a political tool.

Attacks that recruit participants in so-called volunteer DDoS are proving popular

The report gives the example of the organisation 'Help Israel Win' which recently invited individuals to install a software package, dubbed Patriot DDos, on their computers so the machine could be used to launch attacks, on what the authors assume would be Palestinian targets.

The most recent example of a volunteer DDoS comes from Anonymous, a loose-knit group of activisits, who used the method to launch attacks on the websites of firms it perceived to be anti-Wikileaks.

DDoS attacks could hit small media groups and campaigners hard because the organisations have such limited resources, said Mr Zuckerman.

"If you are a human rights organisation or independent media organisation you might be using an account you are paying �20 a month for and its very hard at that level of hosting to fend off DDoS," he told the BBC.

The attacks did not have to be prolonged, he said, to cause real problems for small campaigning groups.

"Start Quote

There are certain attacks that seem to work if you have only one or two machines"

End Quote Ethan Zuckerman

"They just have to do it long enough to annoy their ISP and they will kick them off and then they have to find another place to host," said Mr Zuckerman.

Easy tools

The work of some groups only appears on the web, said Mr Zuckerman, so knocking them offline effectively silences the campaigners. It can take a long time for some to find a new host, upload content and re-build a site.

He said: "We see sites that do not come back online for two to three weeks."

The report also found that DDoS attacks are often only the most visible element of a much broader attack against a site or group.

"There's a very good chance that if you are experiencing DDoS you are being filtered, sent targeted e-mail to get access to your system or to snatch your passwords," he said.

Mr Zuckerman said some DDoS attacks logged in the report used hundreds or thousands of PCs in a botnet - networks of hijacked home computers - but others had just as big an effect with far fewer resources.

"There are certain attacks that seem to work if you have only one or two machines," he said.

What might cause problems in the future, he suggested, would be easy-to-use tools like those employed by Anonymous activists in support of Wikileaks.

"It seems like DDoS has become easier for more people to engage in," he said. "The threats do seem to be increasing."

In response, he said, rights groups needed to work hard to understand the threats and prepare in case they were hit.

"This community needs to get much, much smarter and much more knowledgeable," he said.



Powered by WizardRSS | Work At Home Jobs

Tuesday, December 21, 2010

US backs net traffic regulations

US regulators have approved new rules meant to prohibit broadband companies from interfering with internet traffic.

The Federal Communications Commission (FCC) voted 3-2 on the principle known as net neutrality; a tenet that ensures all web traffic is treated equally.

The rules have been criticised for setting different standards for fixed line broadband and mobile operators.

Officials said the regulations are "the first time the commission has adopted enforceable rules" to govern the web.

The FCC's three Democrats voted to pass the regulations, while the agency's two Republicans opposed them, arguing that they were unnecessary.

Tuesday's vote is the culmination of five years of fighting over how best to ensure the free flow of information in all its forms over the internet.

The FCC vote also comes at a time when consumers are increasingly accessing the web via smart phones and turning to the internet to watch TV shows.

'Rules of the road'

The commission's ability to regulate the internet was thrown into doubt following an appeals court decision earlier this year that said the agency lacked the authority to stop cable firm ComCast from blocking bandwidth-hogging applications.

The FCC said the vote addressed "basic rules of the road to preserve the open internet as a platform for innovation, investment, competition and free expression".

That is a view backed by chairman Julius Genachowski.

"We're adopting a framework that will increase certainty for businesses, investors and entrepreneurs," Mr Genachowski said in remarks prior to the vote.

"We're taking an approach that will help foster a cycle of massive investment, innovation and consumer demand both at the edge and in the core of our broadband networks."

Michael Copps, a Democrat, said in a written statement ahead of the vote that rules represented "an important milestone in the ongoing struggle to safeguard the awesome opportunity-creating power of the open internet".

The regulations are expected to be challenged in court.

'Squandered'

A number of interested parties including internet providers, developers and companies like Google have said the rules could provide some regulatory certainty going forward. Many have acknowledged that the regulations could have been much worse.

"Start Quote

I think today is a tremendously important day in the fight to preserve a free and open internet"

End Quote Aparna Sridhar Free Press

The new rules prohibit telecommunications companies that provide high-speed internet service from blocking access by customers to any legal content, applications or service.

But, for the first time, there is now a policy that will allow for what has been termed "paid-prioritisation", where companies will be able to pay for a faster service.

The FCC regulations place tougher restrictions on wired services from cable and phone companies than on wireless carriers, which have more limited bandwidth.

The vote comes amid increases in the amount of smart phones and tablet devices that are being used to access the web and watch TV shows.

The rules allow mobile firms to block access to sites or applications that specifically compete with a carrier's voice or video services.

Supporters of net neutrality feel the new regulations should have gone further and have slammed them as "fake net neutrality".

"I think today is a tremendously important day in the fight to preserve a free and open internet," Aparna Sridhar of advocacy group the Free Press, told BBC News.

"Chairman Genachowski has completely squandered a golden opportunity to make this vote meaningful. Until now we have had a certain amount of regulatory uncertainty, and the carriers have had an incentive to stay on their best behaviour.

Ms Sridhar added that the rules endorse "bad practices in the wireless space".

In an opinion piece for the Huffington Post, Al Franken, US Senator for Minnesota, earlier called the FCC vote "the most important free speech issue of our time".



Powered by WizardRSS | Work At Home Jobs

Patent spat threatens photo sites

The fallout from a patent dispute between Kodak and web photo site Shutterfly could embroil many online image sites, says patent experts.

Kodak claimed it owns patents regarding the display of online images that is being infringed by Shutterfly.

The photo-sharing site disputes these claims and has launched a counter suit.

But the landmark case could have ramifications for other popular online photo sites such as Yahoo's Flickr and Google's Picassa.

The past two years have seen a number of cases launched that claim online photo sites have breached patents.

But this is the first time such a large, established technology company has sought to assert its rights over online images, said Deborah Bould, a specialist in intellectual property at law firm Pinsent Masons.

Genuine innovation

Kodak's decision to start legal proceedings against Shutterfly will have put scores of web-based photo companies such as Flickr and Google, on high alert, she told BBC News.

"The patents Kodak holds are incredibly broad, effectively covering images that are stored centrally and can be ordered online," she said.

That's likely to mean Kodak will go after other online image sites it believes also infringe its patents, she added.

Kodak said it has over 400 similar patents.

"We are committed to protecting these assets from unauthorised use," it said in a statement.

Given the expense of patent cases, many smaller firms may choose to licence Kodak's technology rather than fight claims, said Theo Savvides, head of intellectual property at Osborne Clarke.

But firms such as Google and Yahoo "have deep pockets" that would allow them to challenge Kodak's claims, he added.

Such challenges would likely focus on the validity of Kodak's patents, said Ms Bould.

The case may hinge on Kodak's ability to show that when it filed the patents they covered technology that was genuinely innovative, she added.

Kodak has been hit hard by the shift towards digital photography, but has recently shown a greater willingness to assert its rights for technology it believes impinge on its patents.

Earlier this year Kodak said it would sue Apple and BlackBerry maker, Research in Motion, over technology used in their handsets.



Powered by WizardRSS | Work At Home Jobs

Monday, December 20, 2010

Porn blocking plan 'not possible'

Government plans to block pornography "at source" are unlikely to prove effective, say ISPs.

The proposal to cut off access to pornographic material was floated by Culture Minister Ed Vaizey in an interview with the Sunday Times.

The government is talking to ISPs to set up a meeting at which the proposal will be discussed.

But, say experts, technical challenges mean any large scale filtering system is doomed to failure.

Legal issues

A spokesman for the Department of Business, Innovation and Skills, confirmed Mr Vaizey's plan to talk to ISPs about setting up an age verification scheme to govern access to pornographic sites.

"This is a very serious matter," said Mr Vaizey. "I think it's very important that it's the ISPs that come up with solutions to protect children."

"I'm hoping they will get their acts together so we don't have to legislate, but we are keeping an eye on the situation and we will have a new communications bill in the next couple of years."

<!-- Embedding the audio player --> <!-- This is the embedded player component -->
<!-- embedding script -->
<!-- end of the embedded player component --> <!-- Player embedded -->

In response to the government proposal, Nicholas Lansman, secretary general of the Ispa industry body, said: "Ispa firmly believes that controls on children's access to the internet should be managed by parents and carers with the tools ISPs provide, rather than being imposed top-down."

Mr Lansman said its members provided parents with many different means of controlling what is accessible via the computers in their homes.

"Online safety is a priority issue for the internet industry and ISPA will be discussing the options available to protect children with Government," he said.

"ISPs currently block child abuse content which is illegal and widely regarded as abhorrent," said Mr Lansman. "Blocking lawful pornography content is less clear cut, will lead to the blocking of access to legitimate content and is only effective in preventing inadvertent access."

BT, the UK's largest ISP, said it would be "happy" to take part in any discussion of the issues, but added: "There are many legal, consumer rights and technical issues that would need to be considered before any new web blocking policy was developed."

Filter failure

"Unfortunately, It's technically not possible to completely block this stuff," said Trefor Davies, chief technology officer at ISP Timico.

"Start Quote

If we take this step it will not take very long to end up with an internet that's a walled garden of sites the governments is happy for you to see"

End Quote Trefor Davies Timico

He said the sheer volume of pornographic material online and the number of ways that people access it, via the web, file-sharing networks, news groups, discussion boards and the like, made the job impossible.

While some proponents of a national pornographic filtering scheme cite the Internet Watch Foundation (IWF) as an example of how such a scheme might work, Mr Davies said it was not a good guide.

The IWF circulates a list to ISPs of sites found to be hosting illegal images of child sexual abuse.

However, said Mr Davies, the IWF draws up its list largely using information passed to it by the public. In addition it only tackles illegal content found on websites.

Such a system would not work if it was used to deal with millions of porn sites, chat rooms and bulletin boards, he said.

Experience with filtering systems, he said, shows that they are a very blunt tool that often blocks access to sites that could be useful.

"You end up with a system that's either hugely expensive and a losing battle because there are millions of these sites or it's just not effective," he said.

"The cost of putting these systems in place outweigh the benefits, to my mind," he said.

"Start Quote

What we are talking about is censorship to protect our children"

End Quote Miranda Suit Safer Media

Mr Davies also feared that any wide-scale attempt to police pornographic content would soon be expanded to include pirated pop songs, films and TV shows.

"If we take this step it will not take very long to end up with an internet that's a walled garden of sites the governments is happy for you to see," he said.

'Child protection'

His comment was echoed by Jim Killock, chair of the Open Rights Group which campaigns on digital liberties issues.

"This is not about pornography, it is about generalised censorship through the back door," said Mr Killock.

"This is the wrong way to go," he said. "If the government controlled a web blacklist, you can bet that Wikileaks would be on it."

Miranda Suit, co-chair of Safer Media, which campaigns to make media safe for children, told the BBC that the pornography available on the internet was "qualitatively and quantitatively" different from any that has gone before.

Ms Suit cited a report compiled by the US conservative think tank The Witherspoon Institute which suggested that easy access to pornography was damaging some young people.

"Children are becoming addicted in their teens to internet pornography," she said. "They are being mentally damaged so they cannot engage in intimate relationships."

Safer Media backed the government call to block pornography "at source", said Ms Suit.

"What we are talking about is censorship to protect our children," she said.



Powered by WizardRSS | Work At Home Jobs

Anti-Islamist group&#39;s site hacked

A controversial anti-Islamist group has told its members to be "vigilant" after their details leaked online.

Hundreds of names and addresses linked to the English Defence League have been circulated on the web after hackers broke in to one of the organisation's websites.

In a warning to members, the group said it feared the potential for reprisals.

Those affected should "remain extra vigilant where their home and personal safety is concerned," it said.

The security breach began last weekend, when a clothing website linked to the organisation was accessed by hackers.

The attackers, who claimed to be part of a group called the "Mujahideen Hacking Unit", obtained lists of those who had recently bought items from the site or donated money to the group.

The EDL has risen to prominence in the last year by staging a number of protests against what it calls the "Islamification" of Britain. While it says it is not racist or anti-Muslim, opponents such as United Against Fascism say the group's agenda is blatantly Islamophobic.

The case has been referred to the police, but in a statement the EDL apologised to members concerned about their safety.

"We don't anticipate any problems as these types of data theft are usually committed to cause annoyance rather than having any other ulterior motive," the group said.

"If, however, anyone does feel threatened or in any way unsafe we would urge you to contact the police immediately and explain the situation."

Despite such assurances, some members remain concerned that the leak could expose them - or their families - to actions by those who dispute the group's claims.

'Vulnerable'

On the EDL's web forum, one poster suggested that the breach had exposed "vulnerable people", while another said that there was serious cause for concern.

"It's not a case of just being scared for yourself," they wrote. "What about our families? People could lose their jobs because of this."

The EDL hit the headlines earlier this month after suggestions that a controversial American minister would be invited to speak at a rally in Luton.

Pastor Terry Jones, who runs the Dove World Outreach Center in Florida, threatened to burn the Koran on the anniversary of 9/11.

Home Secretary Theresa May came under pressure to ban Jones from entering the UK - but eventually the EDL said he would not be attending because the group held "some reservations" about his activities.

It is not the first time that controversial groups have been targeted by hackers online. Last summer, a number of EDL sites were hacked by pro-Palestinian protesters. In 2008, meanwhile, a membership list belonging to the British National Party was leaked online.



Powered by WizardRSS | Work At Home Jobs

Google&#39;s UK wi-fi data &#39;deleted&#39;

Personal data collected by Google's UK Street View cars has been deleted.

The UK Information Commissioner's Office (ICO), which has been criticised for not taking a more hardline stance against Google, confirmed the deletion.

The first batch of wi-fi data, which included snippets of e-mails, URLs and passwords, was deleted in November.

But legal wrangles in other countries meant that the remaining data, all of which the firm said was collected in error, took more time to erase.

"We can confirm that the UK data has now been deleted, and that this has been independently certified," said Google.

The deletion was carried out by US forensics firm Stroz Friedberg.

The ICO welcomed the announcement and said that it had been sent a copy of the report confirming the deletion.

"This is inline with the requirements of the undertaking issued by the ICO and signed by Google last month," said a spokesperson.

The ICO has come under fire for not taking action against the firm, which first admitted to collecting information from unsecured wireless networks in more than 30 countries in May 2010.

But deputy information commissioner David Smith told the BBC in November that it had no grounds for fining Google.

He also admitted that the the UK had conducted a much more basic investigation than other countries, such as Canada, which concluded that the search giant "seriously violated" its privacy laws.

"We spent less time searching than others did. If we had searched for days and days we would have found more," Mr Smith said at the time.

A spokesperson said that the ICO would not change any of its procedures, despite the condemnation.

'Data disturbance'

A Freedom of Information request submitted to the ICO, and published on 17 December, details the correspondence between the firm and the watchdog.

It also explains why, despite the bulk of the data being deleted by 26 November, it has taken until now to delete the rest.

"There is some data from the UK which we haven't been able to delete yet," wrote Google's global privacy counsel Peter Fleischer in November, describing the obstacle as a "wrinkle to the process".

"This relates to data that was still on Street View car disks at the time we discovered our mistake in May. Because these disks could contain data from countries where we have received preservation requests from the authorities, we must make sure that in deleting the UK data we don't disturb the surrounding data.

"In the meantime, the data on these disks was never uploaded to our servers, and these disks have been and will remain securely stored as we work to complete the task."

The firm has faced a series of global investigations into how it came to collect the data, some of which are ongoing.

Last week Google told Connecticut's attorney general's office, which is leading a multi-state US probe, that it would not comply with requests to hand over the data it collected.

"I am disappointed by Google's failure to comply with my information demands," Attorney General Richard Blumenthal said in a statement.

"We will review any information we receive and consider whether additional enforcement steps - including possible legal action - are warranted."



Powered by WizardRSS | Work At Home Jobs

Older teenagers &#39;unsafe&#39; online

Teenager using PC Laws targeting grooming only cover people up until the age of 16. <!-- Empty - Wide embedded hyper -->

The mother of a murdered teenager who was groomed online by a stranger, says not enough is being done to protect older teens on the web.

Ashleigh Hall was 17 when she was killed by Peter Chapman, who was dubbed the Facebook Murderer, in 2009.

He had used a fake photo to pose as a teenage boy online.

Her mum Andrea says there's not enough help for teenagers once they turn 16.

"There isn't enough safety online," she said.

"If there is any it's just there for people who are under 16. What about keeping over 16s safe?" she said.

Potential offenders

"Grooming doesn't just happen to young people, it happens to older teenagers and adults as well," she added.

Laws targeting grooming were first brought in under the 2003 Sexual Offences Act but they only cover people up until the age of 16.

Once children reach that age the level of protection and deterrent for potential offenders is not the same.

Ashleigh Hall Ashleigh Hall, 17, was murdered by a man posing as a teenage boy

John Carr, who advises the government about how to keep children safe online, thinks the law needs changing.

"We tend to think as soon as a child is 16 and they can consent to have sex they're old enough to make their own decisions about this thing," he said.

"But, as we know, not all young people can detect some of the really bad guys there on the internet looking for them.

"I think the police need new powers to cover 16 and 17 year olds.

"We shouldn't just cut them off at the age of 16 and leave them to swim in that dark sea of the internet all on their own".

His comments come as a new storyline in teen soap Hollyoaks looks at how older teenager stay safe online.

The character of 19-year-old India gets into online dating, arranges to meet a stranger and ends up being killed.

'Simple message'

Series producer Paul Marquess says: "It's a dark and intense, long running story.

"But at the heart of it is the most simple message which is be really, really careful.

<!-- Embedding the video player --> <!-- This is the embedded player component -->
<!-- embedding script -->
<!-- caption -->

Hollyoaks' India on 'shocking' plotline

<!-- END - caption -->
<!-- end of the embedded player component --> <!-- Player embedded -->

"It seems to be particularly relevant for people once they're past the age of 16 where there doesn't seem to be the same level of protection".

A government spokesperson said it was committed to making the internet a safer place.

He added that police and law enforcement agencies already have a broad range of tools and powers available to help them investigate sexually motivated crimes, whatever the age of the victim.

Follow our technology reporter Dan Whitworth on Twitter



Powered by WizardRSS | Work At Home Jobs