Politicians Are Ignorant Of Cyber Security

For many people it feels like Technology has been developing  faster than society can keep up. Using bank cards instead of cash must have seemed highly unusual only a short time ago, but it’s become the new normal in most of the world. Hacking is no longer something that most of us only hear about in movies. It's a weekly occurrence that affects everyone. 

So when elected officials and law enforcement agencies are critical of encryption, insisting that it's an unbreakable tool for criminals and terrorists, they're ignoring the security benefits for individuals and businesses. 

Britain has some of the world’s finest cyber capabilities and GCHQ is a global leader in cyber security and intelligence, along with the National Cyber Security Centre (NCSC), which is making their expertise available to businesses to help with their digital defences. 

Unfortunately, many of the country's political leaders do not seem to properly understand the issues. 

For example, a British government Minster was recently caught on camera in an intimate embrace with a colleague, unaware of the extent of the routine surveillance at his own Departmental office. This was not a hidden device - it was a CCTV camera installed in the ceiling by Hikvision, a Chinese company contracted to the British government.

Around 1.3 million of Hikvision's CCTV cameras are being used in the UK by airports, councils, Health Service facilities and government departments. This is in spite of UK intelligence agencies advising against the use of Chinese ‘smart cities’ technology, which they fear could be used by the Chinese state for espionage, surveillance and collection of sensitive data. 

Other British government ministers have been accused of using private email accounts for government business, but the practice is believed to be widespread, including in No 10, where Prime Minister Johnson has refused to deny that he uses a private account. More than a third of Johnson’s cabinet, including the Prime Minister himself reportedly use messaging apps which allow users to set messages to be wiped automatically after a chosen period of time, in preference to more secure government networks which keep a permanent record.

In November 2019 hackers hit Britain’s two main political parties with back-to-back cyber attacks attempting to force political websites offline with a flood of malicious traffic just weeks ahead of a national election. These events were a reminder of the events of the 2016 US Presidential election, which was conducted in a storm of fake news, stolen private emails and a high level of what is now acknowledged as attempted interference by foreign governments. 

Until those elected to serve in high office and with responsibility for conducting state business are fully aware of the extent and capability of the technology that they are surrounded with, they will find themselves vulnerable to adversaries, both at home and overseas.

Reuters:       Endgadget:       Spectator:     TMB:     ZME Science

You Might Also Read: 

Social Media’s Troublesome Influence On Politics:

 

« Russian National Security Strategy
IBM Watson In Demand »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC - JAMK University of Applied Sciences

JYVSECTEC is a cyber security research and development and training centre

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

HireVergence

HireVergence

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

Cylera

Cylera

Cylera is a Healthcare IoT cybersecurity and intelligence company built in close partnership with healthcare providers.

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

Green Radar

Green Radar

Green Radar is a next generation cybersecurity company which combines technologies and services together to deliver Threat Detection for Emails and Deep Threat Analytics and Response.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.