A Cyber Attack On The UK From China Can Now Be Expected

Five years ago, then British Prime Minister David Cameron was celebrating a "golden era" in UK-China relations, bonding with President Xi Jinping and signing off on trade deals worth billions, but now Prime Minister Boris Johnson and his government are concerned about the effects of their decision to cancel Huawei's access  to the UK national 5G network..

Discussions between Beijing and London over Hong Kong have become more acrimonious. Britain’s National Cyber Security Centre (NCSC) is about has finally recommended the removal of Huawei equipment from the national telecoms network. Shockwaves over the Chinese origins of the coronavirus are spreading around the world. 

There is now a real concern this may result in China launching a full-fledged hacking attack on the UK.

In the worst-case scenario of a cyber attack, hackers may damage the UK's computer networks, which would lead to phone and power blackouts and bring hospitals and businesses to a standstill, according to the sources. These events in Hong Kong have significant consequences for international relations.

China has been flexing its muscles for a long time, but the West has been slow to realise it. China is the new imperial power in Africa. It has in large parts taken over the continent, raping it for its natural resources and embedding itself in all sorts of different countries. It has only one aim; the furtherance of Chinese power and influence on the continent.

Consider how China is behaving towards India over the disputed border region. It continues to threaten Taiwan. It treats its minority Uighur Muslim population in a manner reminiscent of how the Jews were treated in Nazi Germany and now it has imposed a new security law on Hong Kong in defiance of the terms of the 1985 Joint Declaration. Laughably, China justifies it on the basis that it was a ‘declaration’ and not a ‘Treaty’. 

There will be consequences of the U turn over Huawei and one of them will be that UK universities will be targeted by the Chinese government. Many university courses are now totally reliant on Chinese students and their fees for their existence. China will probably stop its students from coming to the UK and that gap in funding for UK universities will be impossible to fill. In 2014-15 there were 89,500 Chinese students at UK universities. Since then, the number has got up by a third to 120,000.

There are numerous danger signs of China's malicious intent to engage in cyberwar against its opponents, not least Australia which has suffered a wave of 'unattributed attacks' only a few weeks ago. In February, the government had announced that the UK would, with conditions, allow Huawei to assist in building the 5G network in Britain, now all that is changing.  

Iain Dale:       Nation:     Economic Times

You Might Also Read:

US Ban On Semiconductor Exports To China Hits Huawei:

 

« Facebook: Hate Speech, Fake News & Bias
Huawei 5G Ordered Out Of UK Networks »

Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Covenco

Covenco

Covenco specialises in delivering data recovery and business continuity solutions and services.

Granite

Granite

Granite is a software company specialized in information security online training and Governance, Risk management and Compliance (GRC).

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

Windscribe

Windscribe

Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.

Enigmasec

Enigmasec

Enigmasec is specialized in providing products and services aimed at protecting the ICT systems of medium and large companies.

Red Canari

Red Canari

Red Canari are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Sevatec

Sevatec

Sevatec’s Active Cyber Defense (ACD) methodology proactively defends against adversarial kills chain, addressing active and emerging threats while reducing program vulnerabilities and risks.

PreEmptive Solutions

PreEmptive Solutions

PreEmptive Protection hit the sweet spot between cost, convenience and functionality by helping you protect and secure your apps in a smarter way.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

build.security

build.security

build.security are committed to building great security so that developers are free to build remarkable applications.