Politicians Are Ignorant Of Cyber Security

For many people it feels like Technology has been developing  faster than society can keep up. Using bank cards instead of cash must have seemed highly unusual only a short time ago, but it’s become the new normal in most of the world. Hacking is no longer something that most of us only hear about in movies. It's a weekly occurrence that affects everyone. 

So when elected officials and law enforcement agencies are critical of encryption, insisting that it's an unbreakable tool for criminals and terrorists, they're ignoring the security benefits for individuals and businesses. 

Britain has some of the world’s finest cyber capabilities and GCHQ is a global leader in cyber security and intelligence, along with the National Cyber Security Centre (NCSC), which is making their expertise available to businesses to help with their digital defences. 

Unfortunately, many of the country's political leaders do not seem to properly understand the issues. 

For example, a British government Minster was recently caught on camera in an intimate embrace with a colleague, unaware of the extent of the routine surveillance at his own Departmental office. This was not a hidden device - it was a CCTV camera installed in the ceiling by Hikvision, a Chinese company contracted to the British government.

Around 1.3 million of Hikvision's CCTV cameras are being used in the UK by airports, councils, Health Service facilities and government departments. This is in spite of UK intelligence agencies advising against the use of Chinese ‘smart cities’ technology, which they fear could be used by the Chinese state for espionage, surveillance and collection of sensitive data. 

Other British government ministers have been accused of using private email accounts for government business, but the practice is believed to be widespread, including in No 10, where Prime Minister Johnson has refused to deny that he uses a private account. More than a third of Johnson’s cabinet, including the Prime Minister himself reportedly use messaging apps which allow users to set messages to be wiped automatically after a chosen period of time, in preference to more secure government networks which keep a permanent record.

In November 2019 hackers hit Britain’s two main political parties with back-to-back cyber attacks attempting to force political websites offline with a flood of malicious traffic just weeks ahead of a national election. These events were a reminder of the events of the 2016 US Presidential election, which was conducted in a storm of fake news, stolen private emails and a high level of what is now acknowledged as attempted interference by foreign governments. 

Until those elected to serve in high office and with responsibility for conducting state business are fully aware of the extent and capability of the technology that they are surrounded with, they will find themselves vulnerable to adversaries, both at home and overseas.

Reuters:       Endgadget:       Spectator:     TMB:     ZME Science

You Might Also Read: 

Social Media’s Troublesome Influence On Politics:

 

« Russian National Security Strategy
IBM Watson In Demand »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

Viakoo

Viakoo

Viakoo is an Enterprise IoT Applications Management company providing performance, security, and compliance. Viakoo enables you to be proactive in maintaining cyber hygiene and protecting your network

Redsquid

Redsquid

At Redsquid we are all about making a difference to our customers with the use of technology, as an innovative provider of solutions within IoT, Cyber security, ICT, Data Connectivity & Voice.

Eastern Cyber Resilience Centre (ECRC)

Eastern Cyber Resilience Centre (ECRC)

The Eastern Cyber Resilience Centre is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Vantage Point Security

Vantage Point Security

Vantage Point are specialists in penetration testing and application security with a focus on the industries undergoing rapid digital transformation.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

iomart Group

iomart Group

iomart is a cloud computing and IT managed services business providing secure hybrid cloud, network connectivity, data management, and digital workplace capability.

CyberMass

CyberMass

CyberMass provides Cyber Advisory/Consulting, Professional and Managed Services offering complete cybersecurity as a service protection to businesses.

SysGroup

SysGroup

SysGroup is an award-winning managed IT services, cloud hosting, and IT consultancy provider.