A Cyber Attack Could Cripple The UK

A full-scale cyber-attack could cripple a country within minutes, the head of military intelligence has warned. Air Marshal Phil Osborn (pictured) said the UK was in danger of "falling behind" in the face of the growing threat of cyber-attack and information warfare.

In a rare public address, the Chief of Defence Intelligence said the ability for an attack to be mounted without it being immediately clear who was responsible, increased the risk of confrontation though "miscalculation". Speaking at the Royal United Services Institute military think tank in London, he urged politicians and military commanders to be prepared to "act first" in the face of potential threats before it was too late.

"Depending on opposition capability and intent and, critically, our resilience, a full-scale cyber confrontation could have the nationally strategic crippling effects in minutes and hours," he said.

"We need to compete, sometimes pro-actively, and certainly just not observe. To wait for risks to mature before action is to contemplate strategic failure.

"Our aim should be to understand first, to decide first and then, if necessary, to act first across the physical and the virtual."

Air Marshal Osborn said the military application of new technology action was having a transformative effect on the way wars were fought.

"The aggressive application of machine-learning, artificial intelligence and quantum computing to full-spectrum operations is likely to be as disruptive to modern warfare as air power was some 100 years ago," he said.

He warned that the ability to launch "hidden" attacks in cyberspace and elsewhere could embolden some potential adversaries to become more aggressive, heightening the risks of an actual conflict.

In a reference to the Salisbury nerve agent attack on former Russian spy Sergei Skripal, he said that as recently as three months ago, the possibility of a state-sponsored chemical weapons attack in an English city would have seemed "inconceivable".

"For some, this ability to wage hidden and difficult-to-attribute warfare in cyberspace and elsewhere brings the opportunity for them to be much more aggressive and to take risks," he said.

"We can see numerous examples: unprecedented industrial espionage activity against the UK and allies, private security contractors being used in high-end capability warfare in Syria, cyber-attacks against national infrastructure and reputation across Europe, information operations that attempt to pervert political process and frustrate the rule of law, and attempted assassinations.

Air Marshal Osborn said "deception and counter-deception" operations would be "critical" in dealing with such threats.

"We need to have a convincing justification and narrative for our actions while countering opposition disinformation and lies with the truth," he said.

Forces.net:    Photo By: Adam Hartman

You Might Also Read:

British IT Bosses Fear Sophisticated Cyber Threats:

UK To Increase National Cyber Defences:

 

« Mexican Bank Hack Led To A Cash Flight
Denmark Under Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

Nullcon

Nullcon

Nullcon provides an integrated platform for exchanging information on the latest attack vectors, zero-day vulnerabilities and unknown threats.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

IOTA Foundation

IOTA Foundation

The IOTA Foundation is a non-profit R&D organisation focused on developing the next generation of protocols for the connected world.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

e-Careers

e-Careers

e-Careers is an edtech institution that provides industry recognised courses and up-skilling solutions to individuals and organisations.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

inWebo

inWebo

inWebo is the specialist in multi-factor strong authentication (MFA). We guarantee the security of data and identities in a digital world with increasingly important economic and political stakes.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.