Politicians Are Ignorant Of Cyber Security

For many people it feels like Technology has been developing  faster than society can keep up. Using bank cards instead of cash must have seemed highly unusual only a short time ago, but it’s become the new normal in most of the world. Hacking is no longer something that most of us only hear about in movies. It's a weekly occurrence that affects everyone. 

So when elected officials and law enforcement agencies are critical of encryption, insisting that it's an unbreakable tool for criminals and terrorists, they're ignoring the security benefits for individuals and businesses. 

Britain has some of the world’s finest cyber capabilities and GCHQ is a global leader in cyber security and intelligence, along with the National Cyber Security Centre (NCSC), which is making their expertise available to businesses to help with their digital defences. 

Unfortunately, many of the country's political leaders do not seem to properly understand the issues. 

For example, a British government Minster was recently caught on camera in an intimate embrace with a colleague, unaware of the extent of the routine surveillance at his own Departmental office. This was not a hidden device - it was a CCTV camera installed in the ceiling by Hikvision, a Chinese company contracted to the British government.

Around 1.3 million of Hikvision's CCTV cameras are being used in the UK by airports, councils, Health Service facilities and government departments. This is in spite of UK intelligence agencies advising against the use of Chinese ‘smart cities’ technology, which they fear could be used by the Chinese state for espionage, surveillance and collection of sensitive data. 

Other British government ministers have been accused of using private email accounts for government business, but the practice is believed to be widespread, including in No 10, where Prime Minister Johnson has refused to deny that he uses a private account. More than a third of Johnson’s cabinet, including the Prime Minister himself reportedly use messaging apps which allow users to set messages to be wiped automatically after a chosen period of time, in preference to more secure government networks which keep a permanent record.

In November 2019 hackers hit Britain’s two main political parties with back-to-back cyber attacks attempting to force political websites offline with a flood of malicious traffic just weeks ahead of a national election. These events were a reminder of the events of the 2016 US Presidential election, which was conducted in a storm of fake news, stolen private emails and a high level of what is now acknowledged as attempted interference by foreign governments. 

Until those elected to serve in high office and with responsibility for conducting state business are fully aware of the extent and capability of the technology that they are surrounded with, they will find themselves vulnerable to adversaries, both at home and overseas.

Reuters:       Endgadget:       Spectator:     TMB:     ZME Science

You Might Also Read: 

Social Media’s Troublesome Influence On Politics:

 

« Russian National Security Strategy
IBM Watson In Demand »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

Center for Cyber Safety and Education

Center for Cyber Safety and Education

The Center for Cyber Safety and Education works to ensure that people across the globe have a positive and safe experience online through our educational programs, scholarships, and research.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

Sevatec

Sevatec

Sevatec’s Active Cyber Defense (ACD) methodology proactively defends against adversarial kills chain, addressing active and emerging threats while reducing program vulnerabilities and risks.

General Informatics

General Informatics

General Informatics is a team of technology enthusiasts with one mission: to make our clients even more successful through the best use of technology.

GetHacked.ca

GetHacked.ca

GetHackded.ca is a certified company offering penetration testing and specialized cybersecurity services.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.