A Cyber Attack Could Cripple The UK

A full-scale cyber-attack could cripple a country within minutes, the head of military intelligence has warned. Air Marshal Phil Osborn (pictured) said the UK was in danger of "falling behind" in the face of the growing threat of cyber-attack and information warfare.

In a rare public address, the Chief of Defence Intelligence said the ability for an attack to be mounted without it being immediately clear who was responsible, increased the risk of confrontation though "miscalculation". Speaking at the Royal United Services Institute military think tank in London, he urged politicians and military commanders to be prepared to "act first" in the face of potential threats before it was too late.

"Depending on opposition capability and intent and, critically, our resilience, a full-scale cyber confrontation could have the nationally strategic crippling effects in minutes and hours," he said.

"We need to compete, sometimes pro-actively, and certainly just not observe. To wait for risks to mature before action is to contemplate strategic failure.

"Our aim should be to understand first, to decide first and then, if necessary, to act first across the physical and the virtual."

Air Marshal Osborn said the military application of new technology action was having a transformative effect on the way wars were fought.

"The aggressive application of machine-learning, artificial intelligence and quantum computing to full-spectrum operations is likely to be as disruptive to modern warfare as air power was some 100 years ago," he said.

He warned that the ability to launch "hidden" attacks in cyberspace and elsewhere could embolden some potential adversaries to become more aggressive, heightening the risks of an actual conflict.

In a reference to the Salisbury nerve agent attack on former Russian spy Sergei Skripal, he said that as recently as three months ago, the possibility of a state-sponsored chemical weapons attack in an English city would have seemed "inconceivable".

"For some, this ability to wage hidden and difficult-to-attribute warfare in cyberspace and elsewhere brings the opportunity for them to be much more aggressive and to take risks," he said.

"We can see numerous examples: unprecedented industrial espionage activity against the UK and allies, private security contractors being used in high-end capability warfare in Syria, cyber-attacks against national infrastructure and reputation across Europe, information operations that attempt to pervert political process and frustrate the rule of law, and attempted assassinations.

Air Marshal Osborn said "deception and counter-deception" operations would be "critical" in dealing with such threats.

"We need to have a convincing justification and narrative for our actions while countering opposition disinformation and lies with the truth," he said.

Forces.net:    Photo By: Adam Hartman

You Might Also Read:

British IT Bosses Fear Sophisticated Cyber Threats:

UK To Increase National Cyber Defences:

 

« Mexican Bank Hack Led To A Cash Flight
Denmark Under Attack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

RSA Security

RSA Security

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, and Fraud Prevention.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

Digital Resolve

Digital Resolve

Digital Resolve delivers solutions that help companies maintain trust and confidence through proven and cost-effective fraud-protection and identity intelligence technology.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.

TerraZone

TerraZone

TerraZone is a global cyber security and privacy solutions provider to governments and enterprises.

Roundsec

Roundsec

Roundsec provide information security services including risk assessment and pentesting of sites and apps.