UK Airports & Nuclear Power Stations On Cybersecurity Alert

Britain’s airports and nuclear power stations have been told to tighten their defences against terrorist attacks in the face of increased threats to electronic security systems.

UK security services have issued a series of alerts recently, warning that terrorists may have developed ways of bypassing safety checks.

Intelligence agencies believe that Islamic State and other terrorist groups have developed ways to plant explosives in laptops and mobile phones that can evade airport security screening methods.

It is this intelligence which is understood in the past fortnight to have led the US and Britain to ban travellers from a number of countries carrying laptops and large electronic devices on board.

Now there are concerns that terrorists will use the techniques to bypass screening devices at European and US airports.

There were also fears that computer hackers were trying to bypass nuclear power station security measures. Government officials have warned that terrorists, foreign spies and “hacktivists” are looking to exploit “vulnerabilities” in the nuclear industry’s internet defences.

Jesse Norman, the energy minister, said that nuclear plants must make sure that they “remain resilient to evolving cyber threats”.

Mr Norman said: “The Government is fully committed to defending the UK against cyber threats, with a £1.9 billion investment designed to transform this country’s cyber security.”

He said the civil nuclear strategy published in February sets out ways to ensure that the civil nuclear sector “can defend against, recover from, and remain resilient to evolving cyber threats”.

Prof Malcolm Chalmers, deputy director-general of the Royal United Services Institute, an independent think tank for defence and security, said: “It is important for the Government to respond rapidly to evolving cyber security threats.  “The potential threats are wide-ranging and are coming from government and non-government sources.  “Crucially there has to be clear co-operation with the private sector to tackle this, especially as airports are usually in private hands.”

US intelligence officials have warned that groups including Islamic State and al-Qaeda may have developed ways to build bombs in laptops and other electronic devices that can fool airport security. There are fears that terrorists made the breakthrough after obtaining airport screening equipment to allow them to experiment.

FBI experts have tested how the explosives can be hidden inside laptop battery compartments in a way that allows a computer still to be turned on. They were said to have found that the technique would be achievable using everyday equipment.

The US Department of Homeland Security said in a statement: “Evaluated intelligence indicates that terrorist groups continue to target commercial aviation, to include smuggling explosive devices in electronics.

“The US government continually reassesses existing intelligence and collects new intelligence. This allows us to constantly evaluate our aviation security processes and policies and make enhancements when they are deemed necessary to keep passengers safe.”

Manny Gomez, a former FBI special agent, said: “We had the shoe bomber, cartridge attempt, now this is the next level. We need to be several steps ahead of them.”

Last year al-Shabaab, an al-Qaeda affiliate group in Somalia, detonated a bomb on a flight from Mogadishu to Djibouti. The explosives were hidden in a part of a laptop where bomb-makers had removed a DVD drive. The bomber was blown out of the window but the plane survived.

However, experts have said the bomb would have been far more devastating had the plane reached cruising altitude. The warnings come as Britain remains on a “severe” state of alert following last month’s attack at Westminster, in which four people were killed and more than 50 injured.

Warnings that the nuclear industry has to do more to protect itself were contained in the five-year Civil Nuclear Cyber Security Strategy.

It says: “The volume and complexity of cyber-attacks against the UK are growing and the range of actors is widening.” Government officials say that the threat from cyber-attacks is “growing” and add: “These attacks could disrupt supply, damage facilities, delay hazard and risk reduction, and risk adverse impacts to workers, the public or the environment.”

Telegraph

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

Ageing Energy Systems Hold Huge Potential For Cyber Attack:

Britain Bombarded With High Level Cyber Attacks:

Could Hackers Turn the Lights Out?:
 

« Google’s Fact Checking News
The New Face of Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

Dionach

Dionach

Dionach are a certified information security specialists who provide Penetration Testing, IT Security Auditing and Information Security Consultancy.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

Stratejm

Stratejm

Stratejm, a Next Generation Managed Security Services Provider, brings innovation and thought leadership to the fight against cyber criminals.

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Ultra Electronics

Ultra Electronics

Ultra specialises in providing application-engineered bespoke solutions. We focus on mission critical and intelligent systems in the defence, security, critical detection & control markets.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

CYMOTIVE Technologies

CYMOTIVE Technologies

Combining Israeli cyber innovation with a century of German automotive engineering. CYMOTIVE operates under the assumption that connectivity is a game changer for the automotive industry.

Association for Uncrewed Vehicle Systems International (AUVSI)

Association for Uncrewed Vehicle Systems International (AUVSI)

AUVSI is the world's largest nonprofit organization dedicated to the advancement of uncrewed systems and robotics. Focus areas include cyber security for uncrewed systems and robotics.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.

SecureFlag

SecureFlag

SecureFlag is dedicated to enhancing secure coding across all technical profiles within the Software Development Lifecycle.