I have tabled a question for oral answer in the House of Lords this afternoon, as follows:
“To ask HM Government what proportion of the United Kingdom’s critical national infrastructure is owned by foreign-owned companies; and what assessment they have made of the benefits and disbenefits of that level of ownership”
I am sure I will receive a courteous answer but I rather suspect that what it will boil down to is (1) the Government don’t really know what proportion of our infrastructure is in foreign hands; (2) that they haven’t really got a policy on it; and (3) even if they wanted to do something about it they feel it is either too late or there is nothing that they can do.
Earlier this month the Government announced, in response to a critical report from the Intelligence and Security Committee, that it would be reviewing the role of Chinese-owned Huawei in the UK’s telecommunications and security infrastructure. This is welcome, if a bit late. I have been banging on about this for ages: for example here and here.
Six years ago the think tank Chatham House reported that
“as much as 90% of the UK’s critical national infrastructure is not government owned and a large proportion of that is under foreign ownership.”
Most of London’s electricity is provided by Electricite de France. Does anyone seriously doubt what would happen if it was a choice between switching the lights out in London or Paris because of some crisis?
In the last 10 years, Ferrovial of Spain has bought BAA, the operator of Heathrow and Stansted airports, Germany’s RWE has acquired npower, and Australian bank Macquarie has taken control of car parks by buying NCP.
German group Deutsche Bahn recently bought rail and bus operator Arriva, while ports company P&O, which owns assets at Tilbury and Southampton, was also bought by Dubai’s DP World in 2006.
This Government bangs on about the threat to British sovereignty presented by the UK’s membership of the EU, but they seem to be utterly silent on the implications for our sovereignty of having so much of our infrastructure controlled by foreign governments or its future being determined at the whim of foreign investors who are unlikely to have the UK’s national interest at the top of their priorities.
Very few other nations would be so sanguine.
In Lords’ Question Time today I asked:
“Her Majesty’s Government what is their policy on the deployment of autonomous weapon systems by United Kingdom Armed Forces.”
The response was – in my view – a helpful one:
“The Parliamentary Under-Secretary of State, Ministry of Defence (Lord Astor of Hever):
My Lords, the United Kingdom does not have fully autonomous weapon systems. Such systems are not yet in existence and are not likely to be for many years, if at all. There are currently a limited number of naval defensive systems that could operate in automatic mode, although there would always be naval personnel involved in setting the parameters of any such operation. I must emphasise that any type of weapon system would be used only in strict adherence with international humanitarian law.”
Subsequent exchanges amplified the point further:
“Lord Harris of Haringey:
My Lords, I am grateful to the Minister for that reply. Is it the view of Her Majesty’s Government that there is a world of difference between a drone operated remotely from several hundred or thousands of miles away and one that is automatic and involves no human intervention before it discharges? In that context, will he tell us a bit more about the Mantis development by BAE Systems, which I understand is supported and funded by the UK’s Ministry of Defence, which the BAE Systems website describes as,
“Able to fly by itself, able to think for itself”?
Lord Astor of Hever:
My Lords, I agree with the noble Lord. As I said in the original Answer, the UK complies fully with its obligations under national and international law, and that applies to autonomous weapon systems. However, although technological advances are likely to increase the level of automation in some systems, just as in non-military equipment, such as cars, the MoD currently has no intention of developing systems that operate without human intervention.
As for Mantis, the MoD initiated a jointly funded advanced concept technology demonstrator in 2008, which led to flight trials in 2009. The MoD has no current involvement in BAE Systems’ Mantis advanced concept technology demonstrator.
Lord Lee of Trafford:
Does my noble friend agree with the comments of a senior RAF officer who said very recently that come 2020 the Royal Air Force would be something like 50% manned aircraft and 50% UAE or drones?
Lord Astor of Hever:
My Lords, remotely piloted aircraft systems are likely to form part of the future force mix, as they may offer advantages in endurance and range. However, the dynamic complexity of fighter-versus-fighter-type missions does not favour remote control. Therefore, a wholly unmanned force is unlikely to be achievable or desirable in future. Studies suggest a likely combat air force mix of two-thirds manned and one-third remotely piloted in around the 2030 timeframe.
There is a perception that unmanned technology is shrouded in secrecy. Although the rules of engagement for unmanned aerial vehicles are the same as those for manned aircraft, there is surely a case for the United Kingdom taking the lead by considering having a code on the context and limitations of usage of UAVs to clarify the rules, given the significance and spread of this technology. Is this a point that the Government are considering or will consider?
Lord Astor of Hever:
My Lords, I shall certainly take that question back to my department and get back to the noble Lord. We always make sure that equipment is used appropriately. Even after a weapon system is declared lawful, its use will still be subject to stringent rules of engagement governing its employment in the context and specific circumstances of the operation in question. Those rules of engagement as well as addressing legal issues can, as a matter of policy, be more restrictive than the applicable law. ….
Lord West of Spithead:
My Lords, the Minister slightly confused me with one of his answers. Will he confirm that for anti-missile, close range anti-aircraft, and anti-torpedo reaction systems, there is considerable merit in going for an autonomous system, even if it has a manual override? From what he said it sounds as though we are not continuing to develop that capability. Is that correct?
Lord Astor of Hever:
My Lords, in essence, an automatic system reacts to a limited number of external stimuli in the same way each time, just as automatic transmission changes gears when a car gets to a certain speed. Fully autonomous systems rely on a certain level of artificial intelligence for making high-level decisions from a very complex environmental input, the result of which might not be fully predictable at a very detailed level. However, let us be absolutely clear that the operation of weapons systems will always—always—be under human control.”
Yesterday afternoon I initiated a short debate in the Moses Room of the House of Lords on the biological threats facing the United Kingdom, specifically I was asking “Her Majesty’s Government what arrangements they have in place to protect the residents of the United Kingdom against biological threats; and what measures they are taking to promote the international regulation of biological weapons and to ensure that security standards are sufficient in laboratories engaged in biological research around the world.”
The National Risk Register has in its top tier of risks facing the UK major natural hazards, such as a flu pandemic, but also includes as a serious threat in that top tier of risks a biological attack by terrorists.
As Lord Tony Giddens pointed out later in the debate:
“There are three sets of factors which make biological threats far more menacing than they were for previous generations. The first of these … is work in scientific laboratories that is designed to unpack the basic building blocks of nature but which can have spin-offs of a dangerous kind. … Secondly, there is the disruption to or destruction of the world’s ecosystems, releasing pathogens from their normal hosts. The process is normally known as zoonosis and it is one that is fraught with implications for human beings. Thirdly, … we have globalisation which can transmit pathogens almost immediately from one side of the world to the other.”
But the other big change that I had highlighted was the speed of technological advance that has taken place in the last ten or fifteen years in respect of genetic manipulation and as I explained:
“viruses are very simple. They are simply a capsule, often with perhaps 10 or 12 genes within them. The changing of just one gene within a virus can have a very profound effect on what that virus does: how easily it is transmitted, the extent to which it can be transmitted from an animal to a human being or between humans, and the consequences for the organism that is infected.
In fact, in 2001 the Journal of Virology published a research paper that demonstrated a whole number of ways of modifying the mousepox virus. This new virus was so effective that it overwhelmed the immune system of the test mice, causing massive liver failure and eventually killing the subjects. That reaction occurred even if the mice had been vaccinated against the mousepox virus. That was a legitimate scientific experiment—an effort to control the mouse population in Australia—but it demonstrated that a quite small change in a single gene with comparatively simple techniques could have major consequences.
These techniques are becoming more straightforward and all sorts of legitimate research is taking place in these areas around the world. Some of this could have the consequence of rendering a vaccine ineffective; some of it could confer resistance to therapeutically useful antibiotics and antiviral agents in pathogenic organisms; it could increase the virulence of a pathogen, or make it easier for that pathogen to be transmitted; or it could perhaps alter the range of hosts for that pathogen. A whole number of things are now technically possible that were not easily doable 10, 15 or 20 years ago. Entirely legitimate research on genetic manipulation and modification is of course going on all over the world for entirely benign purposes.
The question that I want to pose is: how well regulated around the world is that research? How confident can we be that other countries are applying the sorts of restrictions that we would wish to see? Some pharmaceutical companies may have an interest in carrying out experiments and developing their techniques in countries where the regulatory regime is far less intense than it might be in our own country.”
Biological weapons are outlawed under the Biological Weapons Convention, which has been signed by virtually every country in the world. However, as I pointed out:
“although countries have said that they accept that they should not be developing biological weapons, the world has not set up what we might consider to be any effective system for monitoring compliance or verification. Some of the biggest and most powerful countries—the United States of America, for one—are extremely dubious about setting up any external system to monitor their own compliance and do not necessarily see the need for a supervisory body.
The US, for example, clearly has no official bioweapons capability but has constructed a huge research base, in many different centres around the United States, under the National Biodefense Analysis and Countermeasures programme. That is undertaking, no doubt quite properly, genetic research, development and testing. However, if the United States says, “We are not happy with our compliance with the Biological Weapons Convention ever being tested by anybody else”, it is very difficult to see how that could be enforced on other countries.
Scepticism also persists about whether Russia’s offensive bioweapons capabilities have been completely dismantled. There are, I think, five Russian military bioweapons facilities which remain closed to outside inspection. Many of the officials linked to their current defensive programme are the same officials that developed Soviet offensive capabilities during the Cold War. There is a question again about how secure those facilities are, particularly as we know that regimes change and that certain parts of the world become less stable as things move forward.”
I also warned that:
“There is clearly a risk that stocks of materials developed for one purpose could be misused or fall into the hands of terrorist groups or, potentially, rogue regimes.”
And concluded as follows:
“In responding, can the Minister first say what is being done to improve supervision of these matters? Secondly, what is being done to regulate the security of scientific establishments, including those that hold stocks of pathogens? It all ends with a fundamental question. We are at risk, as a nation, from a pandemic of whatever sort and from whatever origin, whether naturally or unnaturally occurring. Are we really satisfied that our emergency and health services are able to withstand that?”
The Minister who responded was Lord Wallace of Saltaire who acknowledged that:
“This is an important subject, and both a domestic and international one. We are concerned with the potential of a terrorist attack and the very distant potential of a global state attack. … We are also concerned with the possibility of accidental release from badly secured laboratories.”
Being a LibDem Minister he could not avoid taking the opportunity to snipe at his Conservative Coalition colleagues, saying:
“This is an area of domestic and international overlap. I would not discourage noble Lords from pointing out, as we deal with the intensely emotional issue of the defence of British sovereignty from European and other interference, that this is one of many areas where you cannot have entirely different British and foreign issues. We have to have international co-operation and, as far we can, regulation.”
He did confirm that:
“The Government are deeply committed to protecting the United Kingdom from biological threats. That requires us to have strong measures at home and co-operation abroad.”
but warned that:
“There is resistance to a strong international compliance programme … it is not simply from the United States, let alone from the American pharmaceutical industry, but from a range of other countries that I will not go through. For many of them it is a question of sovereignty and, for one or two south Asian countries, of suspicion of the West. There are limits to what we can achieve and we have to work as far as we can through education, co-operation and providing assistance. I also note that we are working with our partners inside the European Union through the establishment of centres of excellence with regional centres around the world to build this level of co-operation.”
His basic message was:
“There are some real problems here … this is a very complex area.”
And he concluded - rather strangely for a Government Minister – with:
“I shall finish by saying that we need to keep on challenging our Government and even more so other governments.”
So I suppose those of us who took part in the debate were being told: keep on nagging us and maybe we (the Government) will finally take this as seriously as it deserves.
If you want to read the full debate it is here.
Last Friday there was a debate in the House of Lords on the Second Reading of a Private Members Bill introduced by Baroness Howe of Idlicote on Online Safety with particular emphasis on the protection of children. The Bill would have the effect of requiring internet safety providers ansd mobile phone operators to provide an internet service without access to pornography (although adult subscribers would be able to opt in to receive adult material).
The Bill was welcomed by virtually every speaker from all parts of the House (although reservations were expressed by one Conservative and one LibDem peer). The Minister (Viscount Younger of Leckie), however, declined to say whether the Government supported the principle of the Bill (ie of protecting children from adult content online) and said that such matters were the responsibility of parents, even though many parents are far less technologically adept than their children.
A flavour of the Minister’s equivocation is given by these exchanges from the closing section of his speech:
“Viscount Younger of Leckie: I realise that many questions have come out of this interesting debate. If I have not been able to answer any, particularly on age verification, I will certainly make it a point to reply to noble Lords.
Baroness Thornton: The Minister mentioned age verification, and he prayed in aid the totally inadequate self-regulatory proposals that have been proven not to work. They are not working and we have an increasing problem. Will the Minister confirm that both the Byron report and the Bailey report recommended the use of age verification to block adult content on the internet?
Viscount Younger of Leckie: I can give the briefest of answers in the time available on age verification. It is an important issue. However, I would make a distinction between age verification in terms of the gambling sites, which the noble Baroness, Lady Howe, mentioned. My understanding is that with gambling sites there is a clear distinction at the age of 18. Material for the over-18s is pin-protected. Taking our view that parents would in effect be in control, parents would want to set a range of controls appropriate for their children, which may be different for a five year-old and a 15 year-old.
Lord Harris of Haringey: I am sorry because I realise the Minister is trying to close his remarks. But I am trying to understand the answer that he has just given my noble friend. Is he in essence saying that the Government are disregarding the recommendations from those two reports because the age verification used for gambling sites kicks in only at 18? The point is that they are saying that age verification is an important mechanism. We have the evidence from the gambling sites that age verification is possible and can work. Why is it not possible to put the two things together and introduce age verification structures that may kick in at younger ages?
Viscount Younger of Leckie: I note the noble Lord’s comment but the issue of age verification is more complicated than at first it appears. We need more time to discuss this. The best thing for me to do is to get back to the noble Lord and other noble Lords who have raised this particular issue with some answers.
Technology changes rapidly and legislation does not. Industry is better placed than legislators to design the simple and effective tools that parents want, keeping pace with technology and the way that their children access the internet. But there is a role for government in setting an expectation, bringing the right people together and always pushing for more and better-
Lord Maginnis of Drumglass: I am sorry to intervene again, but it is necessary. Everything that the Minister appears to be telling us is unsatisfactory. If it is not possible for legislators to set standards, how will a mishmash of providers across the entire community come up with anything that is consistent and reliable? Will he at least tell us that?
Viscount Younger of Leckie: I can reassure the noble Lord that it is in their interests to bring themselves up to scratch in order to be able to produce online safety for children. I know that this will not be a satisfactory answer for him, but our view is that it is the responsibility of parents, ultimately, to take this forward.
Lord Harris of Haringey: My Lords, why does the Minister say that it is in the interests of online suppliers to do this? It costs them money, they are in a highly competitive market and I suspect that a large number of them make money on the basis that they know perfectly well what some of their users want to access online and they simply want to increase the number of users. Why is it in their interests to introduce this without some form of regulation in the background?
Baroness Thornton: I am sorry, but before the noble Viscount sits down, I asked very specifically at least twice during my remarks whether the Government support the Bill in principle. The Minister has not answered that question. It is very important. It does not necessarily mean that the Minister wants the Bill, as it stands, to go forward, but the principle behind the Bill, that of protecting children from adult content online, seems obvious and I would really like to hear from the Government that that is the case. I do not wish to be rude to the Minister, but I wonder whether his speech was drafted in California or Whitehall.
This morning I have signed a letter sent by Baroness Howe to the Prime Minister seeking urgent clarification of the Government’s position. The letter says:
“We are writing to express concern about the Government’s policy on child internet safety following Friday’s debate on the Online Safety Bill in the House of Lords.
Just last month OFCOM published research highlighting the problems parents face in setting up their own filtering arrangements without government assistance, demonstrating what we already know, namely that parental controls are perceived to be “a fairly complex area, and… choosing and installing them would therefore require a considerable investment of time and effort”.
In this context, we feel that the approach suggested by the Minister – who appeared to suggest that putting in place appropriate protections is a matter for parents who should be better educated – is less than helpful.
We were particularly concerned that the Minister dismissed an opt-in system, as if the Government had always been opposed to it. This is troubling for two reasons. First, the opt-in model provides parents with the greatest level of assistance with filtering, whilst not in any way taking their decision-making responsibility away. It actually empowers them. Second, the opt-in model has just been presented by the Government (further to your very welcome intervention after the publication of the Perry Report) as one of three options that it is considering for promoting child safety on-line in its summer Parental Internet Controls Consultation, to which it has yet to make a formal response. This is particularly unfortunate not least because many parents engaged with the consultation believing opt-in to be a genuine option.
As the Government has yet to publish its response to the Parental Internet Controls Consultation, the good news is that there is still scope for the position presented on Friday to be reassessed in light of consultation submissions and indeed arguments made during the Second Reading debate.
We would urge you to do this and would be grateful for the opportunity for a meeting with you to discuss this matter further.
In closing a positive note from the Minister’s response is that he did not seem very sure about rejecting age-verification and said he would write to Peers. The truth is that without age-verification any form on online protection will be very weak. That age-verification is possible is clearly demonstrated by the regulatory frameworks surrounding online gambling and the sale of alcohol online which were stressed during the debate. Age-verification must be central to whatever regulatory framework the Government adopts.
We remain deeply concerned about this issue, as we know you are, and want to work with you to secure the most robust regulatory framework for our children. They deserve it.”
The letter is signed by three Labour, one Conservative, one LibDem and five independent/crossbench peers.
My speech in the debate was as folows:
“My Lords, the whole House is enormously grateful to the noble Baroness, Lady Howe of Idlicote, for bringing forward this timely and important Bill today. The degree of support that it seems to be finding from all quarters of your Lordships’ House is encouraging. Indeed, it is encouraging to see the range of speakers that we have today. That fact alone should send a very clear message to the Government that they should no longer be dithering on these issues but moving to try to find some solutions. There is also a very clear message to the internet service providers that they, too, need to put their house in order and start to find the most appropriate technical solutions to these problems.
The only note of dissent so far has been from the noble Lord, Lord Lucas. He seemed to make the point that the Bill would place too much of an onus on internet service providers, that this was not what they were good at, and that responsibility should essentially rest with parents. I hope that I have not misrepresented his argument too greatly. That is the standard defence that is heard in these arguments in all aspects: that the internet service providers are the mere conduit or the mere pipeline by which this stuff gets into people’s homes and that somehow, because they are merely the provider of the pipe, they are not responsible for anything that flows through it. To argue that they therefore have no responsibility is rather like saying that water companies have no responsibility for purifying the water that they deliver, because their main purpose-the thing that they are good at-is providing pipes. Actually, they are not that good at that either, given the level of leaks. We do not accept that argument. We say that there is a responsibility on the providers of the pipeline to ensure that the water is pure and safe. That is essentially what the Bill is about.
Let us be clear. In this country, access to pornography is controlled offline. Therefore, there are limitations but they are not total limitations. However, it is made more difficult to access pornography in printed form, on DVD or whatever else. This legislation, should it be passed, will enable us to adjust to the fact that society increasingly exists online. It levels the playing field. It brings what is happening on the internet to the level of everything else, whether it is the top shelf of the newsagent or the age clarification which exists for cinema or DVD material.
We also know that Parliament has already legislated on the principle of age verification. The Gambling Act requires robust age verification. We have already tested this and Parliament has been through these arguments. As my noble friend Lady Dean said, the world did not end because age verification was required in that area-actually, she was applying it to another area, but the principle is that the world did not end. Age verification can be done and it now needs to be applied more generally. The solutions are available and workable. A number of sites notionally have an age restriction but the reality is that those restrictions are laughably weak. However, mechanisms are available that can make those age restrictions work. We should be encouraging that and this Bill is a step towards enabling that to happen.
The other change that has happened in recent years, which we have to accept, is that most children now spend much of their lives online. Most of their social transactions are mediated through internet-enabled mobile phones. The days when I recall one of my sons spending about three hours on the phone to arrange where he and his mates would meet no longer apply. Now, it is all done through the internet-through social media networks and so on. Ofcom’s survey in 2011 found that the average time spent online by five to 15 year-olds was 90 minutes per day. However, I suspect that that statistic is already out of date. It is probable that most five year-olds do not spend that amount of time online but that therefore means that the figure for slightly older age groups is much higher. The same survey found that many-in this instance, I think it was 41%-had been disturbed by something that they had found online and that a quarter had received unsolicited explicit material online.
That was a survey of a year ago. This is an area where things move rapidly and I suspect that we need to have in place legislation that is able to respond to these changes. Those figures will already be out of date. Even I was surprised to learn that 37% of three to four year-olds use the internet, but we have all heard stories of, and perhaps even seen, toddlers whose reaction to a picture in a printed book is to try to expand it with their fingers to make the image get larger. Again, I suspect we are simply not keeping up with the trends.
The reality, which again was found by the Ofcom survey, is that parents know less about the internet than their children do. I recall that when I was part of the sub-committee of the Science and Technology Committee that looked at personal internet security, we were told repeatedly of parents who could not quite manage the parental control software and so got their children to install it for them. That is hardly going to induce this sort of control and maybe they were not quite the responsible parents whom we are looking for, but that is the reality. The children are ahead of their parents in all this, so you have to make it easier for the parent who wants to be responsible. In my view, this is what this Bill is about: opt-in control through ISPs will limit unsolicited and inappropriate material getting into the home.
There is also a sort of golden age view, rather like the image of the family sitting around the dining table in their front room listening to the Home Service, which we were all brought up with in the 1950s. If it ever really was a golden age, the day of the concept of the computer being somewhere in the main room of the home, so that access to the internet is mediated through that process, has long passed. There are now so many internet-enabled devices in most homes that such access is not confined to one room where there may be adequate supervision.
Most children, as has already been said, will have internet-enabled mobile phones but most of the game machines that they use in their bedrooms are also now internet-enabled. There are Xboxes and Game Boys, and all these things are internet-enabled. Not all of them can receive images or material but that is the direction of travel. Children play games on them with people all over the world whom they do not know. That raises all sorts of interesting and wider child protection questions but it demonstrates why we have to be able to control the pipeline that delivers what comes into the home. It is not just about the main computer; it is about all the internet material that comes into the home, which is mediated through the channel of the internet service providers. However responsible parents may be, they can simply no longer actively monitor all the material that their children are accessing, even if such total monitoring would be wholly desirable.
There is of course a collective responsibility in all this. In that inquiry into personal internet security, we used the road safety analogy. We said that responsibility for safety on the roads was accepted and that there was: a personal responsibility as to how you were a road user, whether you were a driver or a pedestrian; a responsibility on the manufacturers of cars to make their cars more safe; a responsibility on local authorities to ensure that roads were well lit; and a responsibility to have roads that were well maintained. All that was with a view to delivering safety. We need to take that same approach to these sorts of issues.
Frankly, children need to be educated about internet safety at the same time as they receive road safety advice. We should be looking at them doing it at that young an age. Parents need to be enabled to be responsible through the measures contained in this Bill by being able to decide, in terms of the material that can come into the home, not to opt in to pornographic material. ISPs and equipment manufacturers need to make it easier for parents, and site owners need to have robust age verification.
This Bill is not a total solution to the problems of online safety but it is a step in the right direction, making it easier for everyone to play their part in securing online safety. I sincerely hope that the Government are going to be supportive and, if not, I hope that they are going to tell us how they will move forward on these issues.”
Last week I signed up to become an IWF Champion. This means that I fully support the important work that the Internet Watch Foundation (IWF) does to remove child sexual abuse images on the internet.
The IWF was established in 1996 by the internet industry to provide the UK internet Hotline for the public and IT professionals to report criminal online content in a secure and confidential way.
The IWF Hotline service can be used anonymously to report content within its remit. The IWF successfully works in partnership with the online industry, law enforcement, government, and international partners to minimise the availability of this content, specifically:
The IWF helps internet service providers and hosting companies to combat the abuse of their networks through its ‘notice and takedown’ service which alerts them to content within its remit so they can remove it from their networks. The IWF also provides unique data to law enforcement partners in the UK and abroad to assist investigations into the distributors. As a result of this approach the content the IWF deals with has been virtually removed from UK networks. As sexually abusive images of children are primarily hosted abroad, the IWF facilitates the industry-led initiative to protect users from inadvertent exposure to this content by blocking access to it through their provision of a dynamic list of child sexual abuse web pages.
I am proud to be associated with an organisation that has successfully:
Over the last few years, I have repeatedly expressed concern about the potential importance of the threat of an electro-magnetic pulse that could disable or destroy electronic installations. Such a pulse could come from an errant solar flare or other extreme space weather or it could be produced by a nuclear warhead exploded in the upper atmosphere. Both could have devastating impacts on ground-based electronic equipment and on electric power grids.
Now comes news of a weapon that could be carried in a cruise missile that can be programmed to disable the electronic systems in individual buildings. Apparently, the U.S. Air Force and its contractor Boeing, along with Raytheon, have created the High-powered Microwave Advanced Missile Project, or CHAMP, which was just tested over a Utah desert.
The cruise missile, which was launched from a U.S. bomber, was pre-programmed to fly over a target and shoot a burst of high power microwaves at a two-story building. It knocked out rows of personal computers and electrical systems which were shown in a video taken of the test.
Following the first target, the cruise missile then was guided to six other targets, resulting in knocking out all electronics.
Even if this was a US initiative, it sounds as though more effort needs to go into protecting UK infrastructure and critical systems against such attacks – which is more or less what I was saying about three and a half years ago.
The Joint Committee on the National Security Strategy (of which I am a member) has just published a report criticising the Government for failing to take seriously the concerns that it expresses in its First Review of the Strategy.
In particular, the report points out that the Government has failed to respond adequately to the Committee’s concerns about the implications for the National Security Strategy of major shifts in US strategy, of the Eurozone crisis and the potential impact of Scottish independence.
The Joint Committee had urged the Government to press ahead with planning the next national Security Strategy, allowing sufficient time to involve academics and experts external to the Government in the process and to allow the next Comprehensive Spending Review and the Strategic Defence Review to be properly integrated in the process. The 2010 National Security Strategy was rushed and weaker as a result.
The Government has acknowledged that it is “important to start thinking about the work plan” for the next National Security Strategy “well in advance of 2015″. However, there is no indication that any effort has been made to start drawing up plans to ensure that the next Strategy is a more candid and more explicit document that properly addresses difficult questions.
Even more disturbing is the absence from the Government of any indication that it intends to draw up the next Strategy in a way that achieves a broad national consensus on the foundations necessary to plan for our nation’s security in the longer -term.
Failure to build such a consensus will be a wasted opportunity – without such a consensus any future Strategy will not have abroad enough basis of buy-in and consent and that in turn will weaken the Strategy and also National Security itself.
I have only just caught up with this story (courtesy of Naked Security from Sophos) and it is a salutary reminder to make sure that your home wifi connection is properly secured – as otherwise you don’t know who else might be using it and what else they might be doing.
According to the Sophos summary:
“After spotting threats posted online, a heavily-armed police SWAT team broke down the door of a house in Evansville, Indiana, smashed windows and tossed a flashbang stun grenade into the living room where an eighteen-year-old girl and her grandmother were watching the Food Network.
Can you imagine how terrifying it must have felt to have been in that room when the grenade was thrown in, and the house stormed by police with their guns drawn?
Oh, and just a small detail – the police had the wrong house. The home had an open WiFi connection, which meant that it could be used from an outside location. ….
The somewhat rattled Stephanie Milan and her family were released without charge once the mix-up became obvious, and police looked further afield for the culprit who had posted messages like the following online:
"Cops beware! I'm proud of my country but I hate police of any kind. I have explosives made in America. Evansville will feel my pain."
… The Milans’ door and window are now being repaired at the city’s expense. And presumably the family are taking steps to secure their WiFi connection.”
To make things worse the Evansville police had invited the local TV cameras along for the raid ….
It couldn’t happen here, or could it?
My good friends at The Risk Management Group have produced “The A to Z of Safe Social Media” (a sister guide to their earlier “The A to Z of Safe Children Online”. It is available for free download here and even contains a foreword from me!
A former senior analyst to the US Secretary for Defense has warned that:
“Chinese companies apparently have a covert capability to remotely access communications technology sold to the United States and other Western countries and could disable a country’s telecommunications infrastructure before a military engagement.”
Writing on Friday, F Michael Maloof reported that:
“The Chinese also have the ability to exploit networks “to enable China to continue to steal technology and trade secrets,” according to the open source intelligence company Lignet, which is comprised of former U.S. intelligence analysts.
The issue centers on the Chinese firm Huawei Technologies Co. Ltd., which U.S. intelligence sources say has direct links to the Chinese government and the People’s Liberation Army, or PLA. These sources assert that Huawei and other Chinese telecommunications firms such as ZTE Corp. have “electronic backdoors” to telecommunications technology sold to the U.S. and other countries.”
Huawei tell me that they are much-maligned and say that they are not linked to the People’s Liberation Army, but are just a private company trying to expand their business outside China.
In the UK the Government seems to be unconcerned that increasingly large parts of the country’s critical national infrastructure are under foreign ownership or are dependent for key components on overseas suppliers (there are a series of stories in yesterday’s Sunday Times behind its paywall about Chinese or Russian interests buying into the UK energy supply industry).
It is not clear why it can be assumed that these interests are necessarily benign and the UK Government doesn’t even seem to be interested in asking the question let alone doing anything about it.
How complacent can they get?