UK Airports & Nuclear Power Stations On Cybersecurity Alert

Britain’s airports and nuclear power stations have been told to tighten their defences against terrorist attacks in the face of increased threats to electronic security systems.

UK security services have issued a series of alerts recently, warning that terrorists may have developed ways of bypassing safety checks.

Intelligence agencies believe that Islamic State and other terrorist groups have developed ways to plant explosives in laptops and mobile phones that can evade airport security screening methods.

It is this intelligence which is understood in the past fortnight to have led the US and Britain to ban travellers from a number of countries carrying laptops and large electronic devices on board.

Now there are concerns that terrorists will use the techniques to bypass screening devices at European and US airports.

There were also fears that computer hackers were trying to bypass nuclear power station security measures. Government officials have warned that terrorists, foreign spies and “hacktivists” are looking to exploit “vulnerabilities” in the nuclear industry’s internet defences.

Jesse Norman, the energy minister, said that nuclear plants must make sure that they “remain resilient to evolving cyber threats”.

Mr Norman said: “The Government is fully committed to defending the UK against cyber threats, with a £1.9 billion investment designed to transform this country’s cyber security.”

He said the civil nuclear strategy published in February sets out ways to ensure that the civil nuclear sector “can defend against, recover from, and remain resilient to evolving cyber threats”.

Prof Malcolm Chalmers, deputy director-general of the Royal United Services Institute, an independent think tank for defence and security, said: “It is important for the Government to respond rapidly to evolving cyber security threats.  “The potential threats are wide-ranging and are coming from government and non-government sources.  “Crucially there has to be clear co-operation with the private sector to tackle this, especially as airports are usually in private hands.”

US intelligence officials have warned that groups including Islamic State and al-Qaeda may have developed ways to build bombs in laptops and other electronic devices that can fool airport security. There are fears that terrorists made the breakthrough after obtaining airport screening equipment to allow them to experiment.

FBI experts have tested how the explosives can be hidden inside laptop battery compartments in a way that allows a computer still to be turned on. They were said to have found that the technique would be achievable using everyday equipment.

The US Department of Homeland Security said in a statement: “Evaluated intelligence indicates that terrorist groups continue to target commercial aviation, to include smuggling explosive devices in electronics.

“The US government continually reassesses existing intelligence and collects new intelligence. This allows us to constantly evaluate our aviation security processes and policies and make enhancements when they are deemed necessary to keep passengers safe.”

Manny Gomez, a former FBI special agent, said: “We had the shoe bomber, cartridge attempt, now this is the next level. We need to be several steps ahead of them.”

Last year al-Shabaab, an al-Qaeda affiliate group in Somalia, detonated a bomb on a flight from Mogadishu to Djibouti. The explosives were hidden in a part of a laptop where bomb-makers had removed a DVD drive. The bomber was blown out of the window but the plane survived.

However, experts have said the bomb would have been far more devastating had the plane reached cruising altitude. The warnings come as Britain remains on a “severe” state of alert following last month’s attack at Westminster, in which four people were killed and more than 50 injured.

Warnings that the nuclear industry has to do more to protect itself were contained in the five-year Civil Nuclear Cyber Security Strategy.

It says: “The volume and complexity of cyber-attacks against the UK are growing and the range of actors is widening.” Government officials say that the threat from cyber-attacks is “growing” and add: “These attacks could disrupt supply, damage facilities, delay hazard and risk reduction, and risk adverse impacts to workers, the public or the environment.”

Telegraph

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

Ageing Energy Systems Hold Huge Potential For Cyber Attack:

Britain Bombarded With High Level Cyber Attacks:

Could Hackers Turn the Lights Out?:
 

« Google’s Fact Checking News
The New Face of Cybersecurity »

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Action Fraud

Action Fraud

Action Fraud is the UK’s national reporting centre for fraud and cyber crime

Alert Logic

Alert Logic

Alert Logic has more than a decade of experience pioneering and refining cloud solutions that are secure, flexible and designed to work with hosting and cloud service providers.

Sword GRC

Sword GRC

Sword GRC provides an award-winning platform for Governance, Risk and Compliance, made up of best-of-breed solutions that address the requirements of all enterprise market sectors.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

nCipher Security

nCipher Security

nCipher Security cryptographic solutions secure emerging technologies – cloud, IoT, blockchain, digital payments – and help meet new compliance mandates.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Com Laude

Com Laude

Com Laude is a domain name management company that provides strategic consulting to help companies strengthen digital brand, safeguard customers & protect brand IP.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.