Former MI5 Chief Wants Retaliatory Attacks On Russia

One of Britain's most senior former security officials has urged the government to meet Russian "aggression with aggression", by launching retaliatory cyber-attacks against Moscow. Dame Stella Rimington (pictured), who was Director General of MI5 from 1992 to 1996, said that the UK must respond to the growing threat of cyber warfare by meeting “aggression with a certain degree of aggression”.

The former head of the UK’s domestic security service warned a cybersecurity conference in London on Thursday 20th September that “the technology which the Russian intelligence services deploy is just as good as ours.”

Dame Stella said that the UK should carry out so-called offensive cyber-attacks against Russia, rather than defending itself and not retaliating. “Part of our defence is aggression”, she said.

In April, the National Cyber Security Centre warned in a joint statement with the FBI and the Department for Homeland Security in the US that Russia has been probing the UK’s critical infrastructure in order to carry out reconnaissance ahead of a possible cyber-attack.

The organisations warned that Russian hackers had been probing for weaknesses in government and corporate computer systems in order to “lay a foundation for future offensive operations". The UK’s security services are reported to have considered the use of offensive cyber-attacks against Russia if the country were to take similar action against the UK.

Dame Stella, MI5’s first female chief, also warned that Russia has become “very adept” at using the Internet for disruption of other countries.

However, she also cautioned that there was evidence of “some dysfunction” within Russia’s security services following the attempted murder of Sergei Skripal and his daughter Yulia in Salisbury by agents of its GRU security service.

“Why had it not occurred to these people that we have technology in this country and if they come wandering around here, we're going to know”, Dame Stella said. “We're going to see them on our cameras, which are everywhere.”

Telegraph

You Might Aso Read: 

Britain Plots Cyber Revenge On Russia For Novichok Poisonings:

 

« Manufacturing Industry: A Key Target For Cyber Attackers
Europol Warning: 15 Ways To Become A Cybercrime Victim »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

EverC

EverC

EverC (previously EverCompliant) is a leading provider of cyber intelligence that allows acquiring banks and payment service providers (PSP) to manage cyber risk.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

Kape Technologies

Kape Technologies

Kape Technologies is a cybersecurity company focused on helping consumers around the world have a better digital experience with greater privacy and protection.