UK Airports & Nuclear Power Stations On Cybersecurity Alert

Britain’s airports and nuclear power stations have been told to tighten their defences against terrorist attacks in the face of increased threats to electronic security systems.

UK security services have issued a series of alerts recently, warning that terrorists may have developed ways of bypassing safety checks.

Intelligence agencies believe that Islamic State and other terrorist groups have developed ways to plant explosives in laptops and mobile phones that can evade airport security screening methods.

It is this intelligence which is understood in the past fortnight to have led the US and Britain to ban travellers from a number of countries carrying laptops and large electronic devices on board.

Now there are concerns that terrorists will use the techniques to bypass screening devices at European and US airports.

There were also fears that computer hackers were trying to bypass nuclear power station security measures. Government officials have warned that terrorists, foreign spies and “hacktivists” are looking to exploit “vulnerabilities” in the nuclear industry’s internet defences.

Jesse Norman, the energy minister, said that nuclear plants must make sure that they “remain resilient to evolving cyber threats”.

Mr Norman said: “The Government is fully committed to defending the UK against cyber threats, with a £1.9 billion investment designed to transform this country’s cyber security.”

He said the civil nuclear strategy published in February sets out ways to ensure that the civil nuclear sector “can defend against, recover from, and remain resilient to evolving cyber threats”.

Prof Malcolm Chalmers, deputy director-general of the Royal United Services Institute, an independent think tank for defence and security, said: “It is important for the Government to respond rapidly to evolving cyber security threats.  “The potential threats are wide-ranging and are coming from government and non-government sources.  “Crucially there has to be clear co-operation with the private sector to tackle this, especially as airports are usually in private hands.”

US intelligence officials have warned that groups including Islamic State and al-Qaeda may have developed ways to build bombs in laptops and other electronic devices that can fool airport security. There are fears that terrorists made the breakthrough after obtaining airport screening equipment to allow them to experiment.

FBI experts have tested how the explosives can be hidden inside laptop battery compartments in a way that allows a computer still to be turned on. They were said to have found that the technique would be achievable using everyday equipment.

The US Department of Homeland Security said in a statement: “Evaluated intelligence indicates that terrorist groups continue to target commercial aviation, to include smuggling explosive devices in electronics.

“The US government continually reassesses existing intelligence and collects new intelligence. This allows us to constantly evaluate our aviation security processes and policies and make enhancements when they are deemed necessary to keep passengers safe.”

Manny Gomez, a former FBI special agent, said: “We had the shoe bomber, cartridge attempt, now this is the next level. We need to be several steps ahead of them.”

Last year al-Shabaab, an al-Qaeda affiliate group in Somalia, detonated a bomb on a flight from Mogadishu to Djibouti. The explosives were hidden in a part of a laptop where bomb-makers had removed a DVD drive. The bomber was blown out of the window but the plane survived.

However, experts have said the bomb would have been far more devastating had the plane reached cruising altitude. The warnings come as Britain remains on a “severe” state of alert following last month’s attack at Westminster, in which four people were killed and more than 50 injured.

Warnings that the nuclear industry has to do more to protect itself were contained in the five-year Civil Nuclear Cyber Security Strategy.

It says: “The volume and complexity of cyber-attacks against the UK are growing and the range of actors is widening.” Government officials say that the threat from cyber-attacks is “growing” and add: “These attacks could disrupt supply, damage facilities, delay hazard and risk reduction, and risk adverse impacts to workers, the public or the environment.”

Telegraph

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

Ageing Energy Systems Hold Huge Potential For Cyber Attack:

Britain Bombarded With High Level Cyber Attacks:

Could Hackers Turn the Lights Out?:
 

« Google’s Fact Checking News
The New Face of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Early Warning Services

Early Warning Services

Early Warning Services identity, authentication and payment solutions empower financial institutions to make confident decisions, enable payments and mitigate fraud.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

Secberus

Secberus

SECBERUS creates cloud security technology to help organizations stay secure & compliant in the public cloud.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

Tutanota

Tutanota

Tutanota is the world’s first end-to-end encrypted mail service that encrypts the entire mailbox.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.