A Cyber Attack Could Cripple The UK

A full-scale cyber-attack could cripple a country within minutes, the head of military intelligence has warned. Air Marshal Phil Osborn (pictured) said the UK was in danger of "falling behind" in the face of the growing threat of cyber-attack and information warfare.

In a rare public address, the Chief of Defence Intelligence said the ability for an attack to be mounted without it being immediately clear who was responsible, increased the risk of confrontation though "miscalculation". Speaking at the Royal United Services Institute military think tank in London, he urged politicians and military commanders to be prepared to "act first" in the face of potential threats before it was too late.

"Depending on opposition capability and intent and, critically, our resilience, a full-scale cyber confrontation could have the nationally strategic crippling effects in minutes and hours," he said.

"We need to compete, sometimes pro-actively, and certainly just not observe. To wait for risks to mature before action is to contemplate strategic failure.

"Our aim should be to understand first, to decide first and then, if necessary, to act first across the physical and the virtual."

Air Marshal Osborn said the military application of new technology action was having a transformative effect on the way wars were fought.

"The aggressive application of machine-learning, artificial intelligence and quantum computing to full-spectrum operations is likely to be as disruptive to modern warfare as air power was some 100 years ago," he said.

He warned that the ability to launch "hidden" attacks in cyberspace and elsewhere could embolden some potential adversaries to become more aggressive, heightening the risks of an actual conflict.

In a reference to the Salisbury nerve agent attack on former Russian spy Sergei Skripal, he said that as recently as three months ago, the possibility of a state-sponsored chemical weapons attack in an English city would have seemed "inconceivable".

"For some, this ability to wage hidden and difficult-to-attribute warfare in cyberspace and elsewhere brings the opportunity for them to be much more aggressive and to take risks," he said.

"We can see numerous examples: unprecedented industrial espionage activity against the UK and allies, private security contractors being used in high-end capability warfare in Syria, cyber-attacks against national infrastructure and reputation across Europe, information operations that attempt to pervert political process and frustrate the rule of law, and attempted assassinations.

Air Marshal Osborn said "deception and counter-deception" operations would be "critical" in dealing with such threats.

"We need to have a convincing justification and narrative for our actions while countering opposition disinformation and lies with the truth," he said.

Forces.net:    Photo By: Adam Hartman

You Might Also Read:

British IT Bosses Fear Sophisticated Cyber Threats:

UK To Increase National Cyber Defences:

 

« Mexican Bank Hack Led To A Cash Flight
Denmark Under Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Redscan Cyber Security

Redscan Cyber Security

Redscan Cyber Security is a Managed Security Services Provider (MSSP) that enables businesses to effectively manage their information security risks.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

ABB

ABB

ABB is a pioneering technology leader in industrial digitalization. Services include cyber security for industrial control systems IoT.

S2 Grupo

S2 Grupo

S2 Grupo is the benchmark company in Europe and Latin America, for Cyber Intelligence and mission critical systems operations.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

Blockchains LLC

Blockchains LLC

Blockchains is committed to changing the world for the better. Using blockchain and other innovative technologies, we’ll build new systems, new security, and new interactions.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

Modern Networks

Modern Networks

Modern Networks is a leading provider of IT managed services to the UK’s commercial property sector and medium sized enterprises.