Politicians Are Ignorant Of Cyber Security

For many people it feels like Technology has been developing  faster than society can keep up. Using bank cards instead of cash must have seemed highly unusual only a short time ago, but it’s become the new normal in most of the world. Hacking is no longer something that most of us only hear about in movies. It's a weekly occurrence that affects everyone. 

So when elected officials and law enforcement agencies are critical of encryption, insisting that it's an unbreakable tool for criminals and terrorists, they're ignoring the security benefits for individuals and businesses. 

Britain has some of the world’s finest cyber capabilities and GCHQ is a global leader in cyber security and intelligence, along with the National Cyber Security Centre (NCSC), which is making their expertise available to businesses to help with their digital defences. 

Unfortunately, many of the country's political leaders do not seem to properly understand the issues. 

For example, a British government Minster was recently caught on camera in an intimate embrace with a colleague, unaware of the extent of the routine surveillance at his own Departmental office. This was not a hidden device - it was a CCTV camera installed in the ceiling by Hikvision, a Chinese company contracted to the British government.

Around 1.3 million of Hikvision's CCTV cameras are being used in the UK by airports, councils, Health Service facilities and government departments. This is in spite of UK intelligence agencies advising against the use of Chinese ‘smart cities’ technology, which they fear could be used by the Chinese state for espionage, surveillance and collection of sensitive data. 

Other British government ministers have been accused of using private email accounts for government business, but the practice is believed to be widespread, including in No 10, where Prime Minister Johnson has refused to deny that he uses a private account. More than a third of Johnson’s cabinet, including the Prime Minister himself reportedly use messaging apps which allow users to set messages to be wiped automatically after a chosen period of time, in preference to more secure government networks which keep a permanent record.

In November 2019 hackers hit Britain’s two main political parties with back-to-back cyber attacks attempting to force political websites offline with a flood of malicious traffic just weeks ahead of a national election. These events were a reminder of the events of the 2016 US Presidential election, which was conducted in a storm of fake news, stolen private emails and a high level of what is now acknowledged as attempted interference by foreign governments. 

Until those elected to serve in high office and with responsibility for conducting state business are fully aware of the extent and capability of the technology that they are surrounded with, they will find themselves vulnerable to adversaries, both at home and overseas.

Reuters:       Endgadget:       Spectator:     TMB:     ZME Science

You Might Also Read: 

Social Media’s Troublesome Influence On Politics:

 

« Russian National Security Strategy
IBM Watson In Demand »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Clifford Chance

Clifford Chance

Clifford Chance are one of the world's pre-eminent law firms with resources across five continents. Practice areas include Cyber Security & Information Protection

Bugcrowd

Bugcrowd

As leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of tens of thousands of security researchers to identify critical software vulnerabilities.

United Nations Office on Drugs & Crime (UNODC)

United Nations Office on Drugs & Crime (UNODC)

UNODC promotes long-term and sustainable capacity building in the fight against cybercrime through supporting national structures and action.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

RiskXchange

RiskXchange

RiskXchange's cybersecurity risk rating solution helps businesses solve complex cybersecurity and compliance challenges by providing a 360-degree view of your cybersecurity posture.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.

Anjolen

Anjolen

Anjolen provides expertise in cybersecurity, compliance and cyber forensic services.