A Cyber Attack Could Cripple The UK

A full-scale cyber-attack could cripple a country within minutes, the head of military intelligence has warned. Air Marshal Phil Osborn (pictured) said the UK was in danger of "falling behind" in the face of the growing threat of cyber-attack and information warfare.

In a rare public address, the Chief of Defence Intelligence said the ability for an attack to be mounted without it being immediately clear who was responsible, increased the risk of confrontation though "miscalculation". Speaking at the Royal United Services Institute military think tank in London, he urged politicians and military commanders to be prepared to "act first" in the face of potential threats before it was too late.

"Depending on opposition capability and intent and, critically, our resilience, a full-scale cyber confrontation could have the nationally strategic crippling effects in minutes and hours," he said.

"We need to compete, sometimes pro-actively, and certainly just not observe. To wait for risks to mature before action is to contemplate strategic failure.

"Our aim should be to understand first, to decide first and then, if necessary, to act first across the physical and the virtual."

Air Marshal Osborn said the military application of new technology action was having a transformative effect on the way wars were fought.

"The aggressive application of machine-learning, artificial intelligence and quantum computing to full-spectrum operations is likely to be as disruptive to modern warfare as air power was some 100 years ago," he said.

He warned that the ability to launch "hidden" attacks in cyberspace and elsewhere could embolden some potential adversaries to become more aggressive, heightening the risks of an actual conflict.

In a reference to the Salisbury nerve agent attack on former Russian spy Sergei Skripal, he said that as recently as three months ago, the possibility of a state-sponsored chemical weapons attack in an English city would have seemed "inconceivable".

"For some, this ability to wage hidden and difficult-to-attribute warfare in cyberspace and elsewhere brings the opportunity for them to be much more aggressive and to take risks," he said.

"We can see numerous examples: unprecedented industrial espionage activity against the UK and allies, private security contractors being used in high-end capability warfare in Syria, cyber-attacks against national infrastructure and reputation across Europe, information operations that attempt to pervert political process and frustrate the rule of law, and attempted assassinations.

Air Marshal Osborn said "deception and counter-deception" operations would be "critical" in dealing with such threats.

"We need to have a convincing justification and narrative for our actions while countering opposition disinformation and lies with the truth," he said.

Forces.net:    Photo By: Adam Hartman

You Might Also Read:

British IT Bosses Fear Sophisticated Cyber Threats:

UK To Increase National Cyber Defences:

 

« Mexican Bank Hack Led To A Cash Flight
Denmark Under Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Solarflare

Solarflare

Solarflare is a leading provider of intelligent networking I/O software and hardware platforms that accelerate, monitor and secure network data.

Homeland Security Advanced Research Projects Agency (HSARPA)

Homeland Security Advanced Research Projects Agency (HSARPA)

HSARPA's Cyber Security Division (CSD) was set up to address DHS cyber operational and critical infrastructure protection requirements.

Recorded Future

Recorded Future

Recorded Future arms security teams with threat intelligence powered by patented machine learning to lower risk.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Global Security Network (GSN)

Global Security Network (GSN)

GSN focuses on specialized IT Security solutions & services for the military, law enforcement, critical infrastructure and oil & gas sectors in the Middle East.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Global Cybersecurity Association (GCA)

Global Cybersecurity Association (GCA)

GCA’s Symposium and conferences featuring global thought leaders and CISOs provide a global best practice perspective on cybersecurity.

TatvaSoft

TatvaSoft

TatvaSoft is a custom software development company delivering business IT solutions and related services to customers across the globe.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?