Armed forces "fatally" reliant on IT, with no backup plans
By Stewart Mitchell
Posted on 9 Jan 2013 at 09:58
The UK's cyberdefence strategy has come under fire from the Defence Committee, with fears that British troops are "fatally" reliant on technology that isn't sufficiently protected.
The select committee report follows an investigation that included interviews with Ministry of Defence personnel. It concluded that the government needs to put in place better measures to protect its assets from cyber-attack, and provide better contingency measures should an attack prove successful.
"The Government needs to put in place – as it has not yet done – mechanisms, people, education, skills, thinking and policies which take into account both the opportunities and the vulnerabilities which cyberspace presents," said James Arbuthnot, chair or the committee.
The report follows a significant increase in spending on cyberdefences, which were allocated £650 million in 2010, when a strategic defence and security review pushed cyberthreats up to a tier-one issue.
In the event of a sustained cyber attack the ability of the Armed Forces to operate effectively could be fatally compromised due to their dependence on information and communication technology
The funding for both public and private sector organisations has shown positive results, the report found, but more remains to be done to protect critical infrastructure.
Most worrying is the fact that the committee believes there are no plans in place should an attack on UK systems cause widespread failure, which could damage both military and civilian systems.
"In the event of a sustained cyber-attack the ability of the Armed Forces to operate effectively could be fatally compromised due to their dependence on information and communication technology," the committee concluded.
"We have asked the government to set out details of the contingency plans it has in place should such an attack occur. If it has none, it should say so – and urgently create some."
Chain of command
According to the MPs, there is also a lack of understanding over who would take charge in the event of a significant cyber-attack or in the event of a solar flare affecting UK systems, with concerns that confusion could lead to potentially serious delays.
"Before a 'lead government department' is identified for a particular cyber-incident there is a potential gap during which the Cabinet Office has a coordinating role but the location of executive authority is not clear," the reports said.
"It is vital that clear procedures are in place, and communicated, about how ownership of incident response is escalated when necessary from individual departments to higher, central authorities."
- Adobe Dreamweaver CC review: first look
- Huawei Ascend P6 review: first look
- Adobe Illustrator CC review: first look
- Let MPs tell us what they really want ISPs to block
- Adobe Photoshop CC review: first look
- WWDC 2013 and iOS 7 launch: live blog
- Sony VAIO Pro review: first look
- Want child porn blocked? Meet the IWF
- Is it worth upgrading a media centre to Windows 8?
- Flickr redesign: is it enough to tempt photographers back?
- Facebook "click on the photo" scams: how they work
- Three alternatives to Word's spelling and grammar checker
- Google two-step verification: a must for business email
- Microsoft Office and the death of upgrades
- The ICO's shame-faced u-turn on cookies
- Start8 and ModernMix: making Windows 8 work on a desktop
- How to boost your mobile reception
- How to fix Facebook: Social Fixer
- Taking the stress out of WordPress updates
- Where to download free web fonts