Western Nations Face A ‘moment of reckoning’ Over Cyber Security

Western nations are unlikely to have a role in the shaping of critical technologies, such as cyber security, unless meaningful action is taken, says  the head of the British intelligence spy agency GCHQ, Jeremy Fleming.  He believes Britain must adapt to face global threats and calls for ‘whole nation approach’ and adapt its cyber security measures in the face of increasing developments abroad. 

The West must urgently act to ensure that China does not dominate the key technologies of the 21st Century or hostile states could take control of the world’s global operating system, according to Britain’s chief cyber spy.

Britain and its allies face a “moment of reckoning” in which secure encryption and other future technologies may no longer be “shaped and controlled by the west”, according to Fleming who also says that the UK has to “develop sovereign technologies” and work with allies to “build better cyberdefences” to prosper in the future.

Although Fleming does not mention China by name, his remarks are largely aimed at Beijing’s growing strength in high technology, revealed recently by the row over the deployment of Huawei kit in Britain’s 5G mobile phone networks.

There are also growing concerns about Russian state-sponsored hacking. This is showing signs of increasing sophistication, as demonstrated by the recent exploitation of a vulnerability in SolarWinds software used in several US government departments. “Cybersecurity is an increasingly strategic issue that needs a whole-nation approach. The rules are changing in ways not always controlled by government,” Fleming is expected to say in a speech at Imperial College London. “And without action it is increasingly clear that the key technologies on which we will rely for our future prosperity and security won’t be shaped and controlled by the west. We are now facing a moment of reckoning.”

Fleming says that Britain needs to ensure a diversity of supply in technologies that underpin the country’s security and prosperity - a coded reference to Huawei, which over a period of nearly 20 years gradually became the market-leading telecoms equipment supplier, prompting fears that it would crowd out western rivals.

The principal technologies that Fleming believes the UK must maintain a foothold in include ultra-high-speed quantum computing, and also areas such as artificial intelligence and bioscience, whose significance has been underscored in vaccine development during the coronavirus pandemic.

Policymakers, academics and teachers also need to help foster the scientific and technical skills the country needs, with an emphasis on “diversity of thought”, the spy chief will argue. Not keeping pace with China and Russia would have consequences, despite the UK’s “strong tech sector” and “world-class universities” that help make Britain “a global cyberpower” today. “Historic strength does not mean we can assume we will be in the future,” Fleming warned.

The speech reflects concerns in the British intelligence community that the country has too readily given up its strategic advantage in areas of emerging technology, through the sale of startups or even established businesses to foreign owners

.But there are signs that warnings like Fleming’s are now being taken seriously, with the proposed $40bn takeover of the Cambridge-based chipmaker Arm Holdings by  US company, Nvidia being referred to the Competition and Markets Authority on national security grounds. Furthermore, the UK government plans to introduce a National Security & Investment Bill that will introduce sweeping powers to restrict deals involving foreign firms.

"If we don't control the technology,” Fleming warned, “if we don't understand the security required to implement those effectively, then we'll end up with an environment or technology ecosystem where the data is not only used to navigate, but it could be used to track us".

According to Fleming, there are only a relatively small number of areas where the UK would need to completely control a technology and more broadly working with allies would be essential to shape international standards and to defend itself in cyberspace. The UK has to invest in skills and innovation. The UK should not be "fatalistic", he said, and had a "very strong track record" of meeting technology challenges.

GCHQ:       Reuters:    Guardian:        BBC:     Imperial College:     Computer Weekly:    ITPro:   ChannelWeb:

You Might Also Read: 

Britain Is At Cyber War Every Day:

 

« Standing On The Cryptocurrency Frontier
MI5 Joins Instagram »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Cloud53

Cloud53

Clolud53 is a Manchester based Managed Cyber Security & Cloud company providing solutions focused around you.

Cybereason

Cybereason

Cybereason provides attack protection with cutting edge EDR and XDR, and industry recognized consulting services to support organizations throughout any stage of the incident lifecycle.

Entreda

Entreda

Entreda offers a unified platform to automate cybersecurity and compliance policy enforcement for your devices, users, networks, applications.

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

RCDevs

RCDevs

RCDevs is an award-winning Software company providing security solutions designed for modern enterprise technologies and suited for SMEs to large corporations.

Early Birds

Early Birds

Early Birds is a Business to Business (B2B) marketplace for Innovators (Startups/Scaleups) and Early Adopters to exchange value early on.

Integrity

Integrity

Integrity is a PCI QSA and ISO 27001 certified company specialized in Information Security and IT Consulting.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

BluTinuity

BluTinuity

BluTinuity is a premier management consulting firm with a passion for information security, business continuity, incident response, disaster recovery, and HIPAA security.

Zally

Zally

Using advanced behavioural biometrics and AI, Zally is the world's answer to next-generation security.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.

SafeAeon

SafeAeon

SafeAeon is a leading Cybersecurity-as-a-Service provider, offering 24x7 premium Managed Security Services with AI-powered and Human-driven 24x7 SOC.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.

Basalt

Basalt

Basalt provide qualified consulting services in information security, personnel security and physical security.