A Cyber Attack On The UK From China Can Now Be Expected

Five years ago, then British Prime Minister David Cameron was celebrating a "golden era" in UK-China relations, bonding with President Xi Jinping and signing off on trade deals worth billions, but now Prime Minister Boris Johnson and his government are concerned about the effects of their decision to cancel Huawei's access  to the UK national 5G network..

Discussions between Beijing and London over Hong Kong have become more acrimonious. Britain’s National Cyber Security Centre (NCSC) is about has finally recommended the removal of Huawei equipment from the national telecoms network. Shockwaves over the Chinese origins of the coronavirus are spreading around the world. 

There is now a real concern this may result in China launching a full-fledged hacking attack on the UK.

In the worst-case scenario of a cyber attack, hackers may damage the UK's computer networks, which would lead to phone and power blackouts and bring hospitals and businesses to a standstill, according to the sources. These events in Hong Kong have significant consequences for international relations.

China has been flexing its muscles for a long time, but the West has been slow to realise it. China is the new imperial power in Africa. It has in large parts taken over the continent, raping it for its natural resources and embedding itself in all sorts of different countries. It has only one aim; the furtherance of Chinese power and influence on the continent.

Consider how China is behaving towards India over the disputed border region. It continues to threaten Taiwan. It treats its minority Uighur Muslim population in a manner reminiscent of how the Jews were treated in Nazi Germany and now it has imposed a new security law on Hong Kong in defiance of the terms of the 1985 Joint Declaration. Laughably, China justifies it on the basis that it was a ‘declaration’ and not a ‘Treaty’. 

There will be consequences of the U turn over Huawei and one of them will be that UK universities will be targeted by the Chinese government. Many university courses are now totally reliant on Chinese students and their fees for their existence. China will probably stop its students from coming to the UK and that gap in funding for UK universities will be impossible to fill. In 2014-15 there were 89,500 Chinese students at UK universities. Since then, the number has got up by a third to 120,000.

There are numerous danger signs of China's malicious intent to engage in cyberwar against its opponents, not least Australia which has suffered a wave of 'unattributed attacks' only a few weeks ago. In February, the government had announced that the UK would, with conditions, allow Huawei to assist in building the 5G network in Britain, now all that is changing.  

Iain Dale:       Nation:     Economic Times

You Might Also Read:

US Ban On Semiconductor Exports To China Hits Huawei:

 

« Facebook: Hate Speech, Fake News & Bias
Huawei 5G Ordered Out Of UK Networks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

CyberFortress

CyberFortress

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

FoxPointe Solutions

FoxPointe Solutions

FoxPointe Solutions is a full-service cyber risk management and compliance firm.