UK Airports & Nuclear Power Stations On Cybersecurity Alert

Britain’s airports and nuclear power stations have been told to tighten their defences against terrorist attacks in the face of increased threats to electronic security systems.

UK security services have issued a series of alerts recently, warning that terrorists may have developed ways of bypassing safety checks.

Intelligence agencies believe that Islamic State and other terrorist groups have developed ways to plant explosives in laptops and mobile phones that can evade airport security screening methods.

It is this intelligence which is understood in the past fortnight to have led the US and Britain to ban travellers from a number of countries carrying laptops and large electronic devices on board.

Now there are concerns that terrorists will use the techniques to bypass screening devices at European and US airports.

There were also fears that computer hackers were trying to bypass nuclear power station security measures. Government officials have warned that terrorists, foreign spies and “hacktivists” are looking to exploit “vulnerabilities” in the nuclear industry’s internet defences.

Jesse Norman, the energy minister, said that nuclear plants must make sure that they “remain resilient to evolving cyber threats”.

Mr Norman said: “The Government is fully committed to defending the UK against cyber threats, with a £1.9 billion investment designed to transform this country’s cyber security.”

He said the civil nuclear strategy published in February sets out ways to ensure that the civil nuclear sector “can defend against, recover from, and remain resilient to evolving cyber threats”.

Prof Malcolm Chalmers, deputy director-general of the Royal United Services Institute, an independent think tank for defence and security, said: “It is important for the Government to respond rapidly to evolving cyber security threats.  “The potential threats are wide-ranging and are coming from government and non-government sources.  “Crucially there has to be clear co-operation with the private sector to tackle this, especially as airports are usually in private hands.”

US intelligence officials have warned that groups including Islamic State and al-Qaeda may have developed ways to build bombs in laptops and other electronic devices that can fool airport security. There are fears that terrorists made the breakthrough after obtaining airport screening equipment to allow them to experiment.

FBI experts have tested how the explosives can be hidden inside laptop battery compartments in a way that allows a computer still to be turned on. They were said to have found that the technique would be achievable using everyday equipment.

The US Department of Homeland Security said in a statement: “Evaluated intelligence indicates that terrorist groups continue to target commercial aviation, to include smuggling explosive devices in electronics.

“The US government continually reassesses existing intelligence and collects new intelligence. This allows us to constantly evaluate our aviation security processes and policies and make enhancements when they are deemed necessary to keep passengers safe.”

Manny Gomez, a former FBI special agent, said: “We had the shoe bomber, cartridge attempt, now this is the next level. We need to be several steps ahead of them.”

Last year al-Shabaab, an al-Qaeda affiliate group in Somalia, detonated a bomb on a flight from Mogadishu to Djibouti. The explosives were hidden in a part of a laptop where bomb-makers had removed a DVD drive. The bomber was blown out of the window but the plane survived.

However, experts have said the bomb would have been far more devastating had the plane reached cruising altitude. The warnings come as Britain remains on a “severe” state of alert following last month’s attack at Westminster, in which four people were killed and more than 50 injured.

Warnings that the nuclear industry has to do more to protect itself were contained in the five-year Civil Nuclear Cyber Security Strategy.

It says: “The volume and complexity of cyber-attacks against the UK are growing and the range of actors is widening.” Government officials say that the threat from cyber-attacks is “growing” and add: “These attacks could disrupt supply, damage facilities, delay hazard and risk reduction, and risk adverse impacts to workers, the public or the environment.”

Telegraph

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

Ageing Energy Systems Hold Huge Potential For Cyber Attack:

Britain Bombarded With High Level Cyber Attacks:

Could Hackers Turn the Lights Out?:
 

« Google’s Fact Checking News
The New Face of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Splunk

Splunk

Splunk provide real-time Security Information & Event Management solutions for Enterprise Networks, Cloud and small-scale IT environments

Scale Computing

Scale Computing

Scale Computing is an industry leading application platform for EDGE computing environments covering retail, manufacturing, financial services and government.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

APrivacy

APrivacy

APrivacy provides information and communication security products for the financial services industry.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Wib

Wib

Wib is an API security leader. We are the only company providing a solution for the entire API development lifecycle.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

RightSec

RightSec

RightSec is an emerging market leader and solution provider for cybersecurity and digital resiliency. We provide end to end solutions to suit your specific business lifecycle.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.