Politicians Are Ignorant Of Cyber Security

For many people it feels like Technology has been developing  faster than society can keep up. Using bank cards instead of cash must have seemed highly unusual only a short time ago, but it’s become the new normal in most of the world. Hacking is no longer something that most of us only hear about in movies. It's a weekly occurrence that affects everyone. 

So when elected officials and law enforcement agencies are critical of encryption, insisting that it's an unbreakable tool for criminals and terrorists, they're ignoring the security benefits for individuals and businesses. 

Britain has some of the world’s finest cyber capabilities and GCHQ is a global leader in cyber security and intelligence, along with the National Cyber Security Centre (NCSC), which is making their expertise available to businesses to help with their digital defences. 

Unfortunately, many of the country's political leaders do not seem to properly understand the issues. 

For example, a British government Minster was recently caught on camera in an intimate embrace with a colleague, unaware of the extent of the routine surveillance at his own Departmental office. This was not a hidden device - it was a CCTV camera installed in the ceiling by Hikvision, a Chinese company contracted to the British government.

Around 1.3 million of Hikvision's CCTV cameras are being used in the UK by airports, councils, Health Service facilities and government departments. This is in spite of UK intelligence agencies advising against the use of Chinese ‘smart cities’ technology, which they fear could be used by the Chinese state for espionage, surveillance and collection of sensitive data. 

Other British government ministers have been accused of using private email accounts for government business, but the practice is believed to be widespread, including in No 10, where Prime Minister Johnson has refused to deny that he uses a private account. More than a third of Johnson’s cabinet, including the Prime Minister himself reportedly use messaging apps which allow users to set messages to be wiped automatically after a chosen period of time, in preference to more secure government networks which keep a permanent record.

In November 2019 hackers hit Britain’s two main political parties with back-to-back cyber attacks attempting to force political websites offline with a flood of malicious traffic just weeks ahead of a national election. These events were a reminder of the events of the 2016 US Presidential election, which was conducted in a storm of fake news, stolen private emails and a high level of what is now acknowledged as attempted interference by foreign governments. 

Until those elected to serve in high office and with responsibility for conducting state business are fully aware of the extent and capability of the technology that they are surrounded with, they will find themselves vulnerable to adversaries, both at home and overseas.

Reuters:       Endgadget:       Spectator:     TMB:     ZME Science

You Might Also Read: 

Social Media’s Troublesome Influence On Politics:

 

« Russian National Security Strategy
IBM Watson In Demand »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

General Dynamics Information Technology

General Dynamics Information Technology

General Dynamics IT delivers cyber security services to defend critical information and infrastructure.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

Ascent Cyber

Ascent Cyber

Ascent Cyber provide simple and stress-free solutions to protect your business and its customers from the worries and costs of cybercrime.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

Technoware Solutions

Technoware Solutions

Technoware Solutions is a global company committed to helping entities navigate the digital waters of modernizing their system processes in an ever changing cybersecurity landscape.