A Cyber Attack Could Cripple The UK

A full-scale cyber-attack could cripple a country within minutes, the head of military intelligence has warned. Air Marshal Phil Osborn (pictured) said the UK was in danger of "falling behind" in the face of the growing threat of cyber-attack and information warfare.

In a rare public address, the Chief of Defence Intelligence said the ability for an attack to be mounted without it being immediately clear who was responsible, increased the risk of confrontation though "miscalculation". Speaking at the Royal United Services Institute military think tank in London, he urged politicians and military commanders to be prepared to "act first" in the face of potential threats before it was too late.

"Depending on opposition capability and intent and, critically, our resilience, a full-scale cyber confrontation could have the nationally strategic crippling effects in minutes and hours," he said.

"We need to compete, sometimes pro-actively, and certainly just not observe. To wait for risks to mature before action is to contemplate strategic failure.

"Our aim should be to understand first, to decide first and then, if necessary, to act first across the physical and the virtual."

Air Marshal Osborn said the military application of new technology action was having a transformative effect on the way wars were fought.

"The aggressive application of machine-learning, artificial intelligence and quantum computing to full-spectrum operations is likely to be as disruptive to modern warfare as air power was some 100 years ago," he said.

He warned that the ability to launch "hidden" attacks in cyberspace and elsewhere could embolden some potential adversaries to become more aggressive, heightening the risks of an actual conflict.

In a reference to the Salisbury nerve agent attack on former Russian spy Sergei Skripal, he said that as recently as three months ago, the possibility of a state-sponsored chemical weapons attack in an English city would have seemed "inconceivable".

"For some, this ability to wage hidden and difficult-to-attribute warfare in cyberspace and elsewhere brings the opportunity for them to be much more aggressive and to take risks," he said.

"We can see numerous examples: unprecedented industrial espionage activity against the UK and allies, private security contractors being used in high-end capability warfare in Syria, cyber-attacks against national infrastructure and reputation across Europe, information operations that attempt to pervert political process and frustrate the rule of law, and attempted assassinations.

Air Marshal Osborn said "deception and counter-deception" operations would be "critical" in dealing with such threats.

"We need to have a convincing justification and narrative for our actions while countering opposition disinformation and lies with the truth," he said.

Forces.net:    Photo By: Adam Hartman

You Might Also Read:

British IT Bosses Fear Sophisticated Cyber Threats:

UK To Increase National Cyber Defences:

 

« Mexican Bank Hack Led To A Cash Flight
Denmark Under Attack »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Information & eGovernment Authority (iGA) - Bahrain

Information & eGovernment Authority (iGA) - Bahrain

The Information & eGovernment Authority facilitates many services catering to different parts of the community within the IT sector in Bahrain including information security.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Viettel Cyber Security

Viettel Cyber Security

Viettel Cyber Security is an organization under the Military Telecommunication Industry Group, conducting research and developing information security solutions for domestic and foreign customers.

HolistiCyber

HolistiCyber

HolistiCyber provide state-of-the art consulting, services, and solutions to help proactively and holistically defend against a new era of constantly evolving cyber threats.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

Piiano

Piiano

Piiano offers developer-friendly privacy and security products. Reduce risk and protect your data by using our specialized security and privacy SaaS tools.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.

Qwiet AI

Qwiet AI

At Qwiet AI we enable you to prevent cyberattacks by securing code from the start. Secure code in three steps.