UK Airports & Nuclear Power Stations On Cybersecurity Alert

Britain’s airports and nuclear power stations have been told to tighten their defences against terrorist attacks in the face of increased threats to electronic security systems.

UK security services have issued a series of alerts recently, warning that terrorists may have developed ways of bypassing safety checks.

Intelligence agencies believe that Islamic State and other terrorist groups have developed ways to plant explosives in laptops and mobile phones that can evade airport security screening methods.

It is this intelligence which is understood in the past fortnight to have led the US and Britain to ban travellers from a number of countries carrying laptops and large electronic devices on board.

Now there are concerns that terrorists will use the techniques to bypass screening devices at European and US airports.

There were also fears that computer hackers were trying to bypass nuclear power station security measures. Government officials have warned that terrorists, foreign spies and “hacktivists” are looking to exploit “vulnerabilities” in the nuclear industry’s internet defences.

Jesse Norman, the energy minister, said that nuclear plants must make sure that they “remain resilient to evolving cyber threats”.

Mr Norman said: “The Government is fully committed to defending the UK against cyber threats, with a £1.9 billion investment designed to transform this country’s cyber security.”

He said the civil nuclear strategy published in February sets out ways to ensure that the civil nuclear sector “can defend against, recover from, and remain resilient to evolving cyber threats”.

Prof Malcolm Chalmers, deputy director-general of the Royal United Services Institute, an independent think tank for defence and security, said: “It is important for the Government to respond rapidly to evolving cyber security threats.  “The potential threats are wide-ranging and are coming from government and non-government sources.  “Crucially there has to be clear co-operation with the private sector to tackle this, especially as airports are usually in private hands.”

US intelligence officials have warned that groups including Islamic State and al-Qaeda may have developed ways to build bombs in laptops and other electronic devices that can fool airport security. There are fears that terrorists made the breakthrough after obtaining airport screening equipment to allow them to experiment.

FBI experts have tested how the explosives can be hidden inside laptop battery compartments in a way that allows a computer still to be turned on. They were said to have found that the technique would be achievable using everyday equipment.

The US Department of Homeland Security said in a statement: “Evaluated intelligence indicates that terrorist groups continue to target commercial aviation, to include smuggling explosive devices in electronics.

“The US government continually reassesses existing intelligence and collects new intelligence. This allows us to constantly evaluate our aviation security processes and policies and make enhancements when they are deemed necessary to keep passengers safe.”

Manny Gomez, a former FBI special agent, said: “We had the shoe bomber, cartridge attempt, now this is the next level. We need to be several steps ahead of them.”

Last year al-Shabaab, an al-Qaeda affiliate group in Somalia, detonated a bomb on a flight from Mogadishu to Djibouti. The explosives were hidden in a part of a laptop where bomb-makers had removed a DVD drive. The bomber was blown out of the window but the plane survived.

However, experts have said the bomb would have been far more devastating had the plane reached cruising altitude. The warnings come as Britain remains on a “severe” state of alert following last month’s attack at Westminster, in which four people were killed and more than 50 injured.

Warnings that the nuclear industry has to do more to protect itself were contained in the five-year Civil Nuclear Cyber Security Strategy.

It says: “The volume and complexity of cyber-attacks against the UK are growing and the range of actors is widening.” Government officials say that the threat from cyber-attacks is “growing” and add: “These attacks could disrupt supply, damage facilities, delay hazard and risk reduction, and risk adverse impacts to workers, the public or the environment.”

Telegraph

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

Ageing Energy Systems Hold Huge Potential For Cyber Attack:

Britain Bombarded With High Level Cyber Attacks:

Could Hackers Turn the Lights Out?:
 

« Google’s Fact Checking News
The New Face of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

vArmour

vArmour

vArmour is the industry’s first distributed security system that provides insight and control for multi-cloud environments.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

BCS Financial

BCS Financial

BCS Financial delivers financial and insurance solutions. Specialty risk products include Cyber and Privacy Liability insurance.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

NSIDE Attack Logic

NSIDE Attack Logic

NSIDE Attack Logic simulates real-world cyber attacks to detect vulnerabilities in corporate networks and systems.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

BlastWave

BlastWave

BlastWave deliver Operational Technology Cybersecurity solutions that minimize the available attack surface and protect against the rising tide of AI-powered cyber attacks.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

Parablu

Parablu

Parablu is a leading provider of data security and resiliency solutions for the digital enterprise.

SecureClaw

SecureClaw

SecureClaw offers specialized cybersecurity consultation, various products, and a range of services to meet your company's business domain needs.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Pvotal Technologies

Pvotal Technologies

Pvotal Technologies engineer complex, automated processes aligned with best AIOps, BizDevOps, DevSecOps, CloudOps, and ITOps practices.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.

Sherweb

Sherweb

Sherweb are a marketplace of leading cloud solutions and value-added services delivered by a team of passionate experts invested in MSP growth.