US election hack could prompt UK attacks, warns UK cyber chief

Suspected Russian hacks could be replicated for UK elections

The head of the UK's National Cyber Security Centre (NCSC) has warned that Russia's alleged hacking of the US elections could inspire copycat attacks in the UK.

"There may be a perception now that this is a successful model for intervention in a society such as ours and those of our allies," said Ciaran Martin, CEO of the NCSC, "and clearly that's something we need to be prepared to deal with."

Throughout the 2016 presidential race, rumours of Russian tampering have been widespread. The US government formally blamed state actors for the release of a cache of Democratic National Committee (DNC) emails during the campaign, while the CIA says it can state with "a high level of confidence" that Russian hackers meddled in the election with the specific goal of ensuring Trump's victory.

However, Martin also cautioned that nation-state hackers are motivated by much more diverse things than simply political gain. "States undertake cyber-attacks for all sorts of different reasons," he said.

Advertisement
Advertisement - Article continues below

"They undertake it sometimes for commercial and economic advantage, they undertake it for commercial espionage. They undertake it for political espionage. And it may be the case that states are undertaking cyber-attacks in order to achieve outcomes in influencing and propaganda."

Martin refused to comment on whether or not GCHQ agreed with the US intelligence community's assessment of the situation, but he "fully endorsed" claims by Germany's spy chief that hackers are already trying to influence Germany's election next year.

He also confirmed the UK counter-intelligence put measures in place specifically to thwart hackers during the UK elections last year.

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/business-strategy/digital-transformation/354201/boston-dynamics-dog-like-robots-sniff-out-bombs-for
digital transformation

Boston Dynamics dog-like robots sniff out bombs for Massachusetts police

26 Nov 2019
Visit/business-strategy/mergers-and-acquisitions/354191/xerox-threatens-hostile-takeover-after-hp-rebuffs
mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019