In 2015, Question Time put Jeremy Corbyn in front of a live audience and asked whether he would authorise a nuclear strike if it came to it. The question landed because everyone in that room had a mental picture of what nuclear war looked like — the mushroom cloud, the devastation, the finality of it. War, in the public imagination, has always looked like something.

The next wave of warfare looks like nothing. No flash on the horizon. No air raid warning. No headline that says "we are at war." Just your card declining at the supermarket. Your GP unable to pull up your records. Shelves running empty. And somewhere in a data centre, someone who means this country harm is watching it happen in real time. — This piece is for everyone who isn't in the security industry. It matters to you more than you might think.

This is not science fiction. It is not a distant threat. It has already started — in London hospitals, on British high streets, and quite possibly in your living room right now. The question is not whether this kind of attack can happen. It is whether enough people understand what is at stake before the next one does.

The hidden infrastructure of ordinary life

A Typical Day — and Where It Depends on Digital Systems

Every moment below is a point where a cyberattack could interrupt your day. None of these are hypothetical — each represents a system that has been successfully attacked somewhere in the world in the last three years.

6am 8am 10am 12pm 3pm 6pm 10pm Smart alarm IoT device Train signals SCADA systems Card payment Banking networks NHS records Hospital systems Supermarket Stock & till systems Fuel forecourt Payment terminals Smart TV Your home network Already attacked in UK Attacked elsewhere Active threat (BadBox)

Every highlighted touchpoint represents a system that has been successfully attacked. Red = attacked in the UK. Your day runs on digital infrastructure that most people never think about — until it fails.

It Has Already Started

This isn't a warning about the future. It is a report on what has already happened — and the pattern behind it.

In June 2024, a criminal gang attacked Synnovis, a company that processes blood tests for NHS hospitals across London. Within hours, seven hospitals lost the ability to run basic blood tests. Operations were cancelled. Blood transfusions were disrupted so severely that the NHS put out an emergency nationwide appeal for O-type blood donors — the universal type used when there is no time to match. Over 10,000 outpatient appointments and 1,700 procedures were postponed. The attack took months to recover from and exposed the personal health data of hundreds of millions of patient interactions. Nobody fired a shot. Nobody crossed a border.

In April 2025, hackers targeted Marks & Spencer over Easter weekend. They didn't smash a window or hold anyone at gunpoint. They called the IT helpdesk, pretended to be an employee, and talked their way past the security checks. Within days, M&S couldn't run its website, its stockrooms went dark, its food halls struggled to keep shelves filled, and the company was reverting to pen and paper to manage inventory. Online sales were suspended for 46 days. The total cost: over £300 million. M&S lost more money from that phone call than most towns generate in a year.

NHS Synnovis — June 2024
London Hospitals
10,152
Outpatient appointments postponed. Blood supplies fell critically low. Recovery took until December 2024.
Scattered Spider — April 2025
Marks & Spencer
£300m+
Lost in 46 days of disruption. One phone call to an IT helpdesk. No technical wizardry required.
Ransomware — Easter 2025
Co-op & Harrods
22%
Drop in consumer spending at M&S. Rural communities relying on Co-op saw food supply disruption.
Qilin Ransomware — 2024
NHS Data Stolen
400GB
Of confidential patient data published online. Records from 300 million patient interactions exposed.

These are not edge cases. These are not sophisticated military operations requiring state-level resources. The M&S attack started with a phone call. The NHS breach came through a third-party supplier. And both caused the kind of disruption to ordinary daily life that most people associate only with physical emergencies — empty shelves, cancelled operations, urgent blood donation appeals.

The Blitz Nobody Can See

During the Second World War, the threat was visible. You heard the air raid sirens. You saw the planes. You could queue for Anderson shelters and feel, at least, that you were doing something. Communities formed around the shared reality of the danger. The government could point at the sky and say: that is what we are fighting.

The next wave of warfare does not announce itself. There are no sirens. There is no flash on the horizon. There is no enemy you can point to, no border being crossed, no soldier to photograph. There is just a Wednesday afternoon when your card stops working at the petrol station, or your GP surgery calls to say your appointment is cancelled, or the pharmacy can't dispense your medication because their system is down.

Then and Now

The Blitz vs. The Invisible War

The threat has changed. The potential for devastation to ordinary life has not.

THE BLITZ — 1940 WARNING Air raid sirens THE THREAT Bombs from aircraft you could see THE RESPONSE Shelters. Anti-aircraft guns. Convoys. FRONTLINE Soldiers and pilots SAFE DISTANCE Miles from the battle THE INVISIBLE WAR — NOW WARNING None. Your card just stops working. THE THREAT Code. From anywhere on earth. THE RESPONSE Compliance tick-boxes. Reports. Inquiries. FRONTLINE You. Your devices. Your home network. SAFE DISTANCE There isn't one.

The crucial point is this: you do not need to attack a power station or a military installation to bring a modern country to its knees. You just need to take down enough of the ordinary systems that hold daily life together — payments, food logistics, fuel distribution, health services — long enough, and broadly enough, that the economic and social consequences cascade. We already know what a fuel shortage looks like. We saw petrol station queues stretch for miles in 2021 over a lorry driver shortage. Imagine that, but caused deliberately, and affecting not just fuel but food, and cash, and medicine, at the same time.

There will be no heroic effort of small boats crossing the Channel. No nightly air raid warning to bring communities together. No Atlantic convoys resupplying a battered nation. Just the systems that support our daily lives, ground quietly to a halt.

The scale of disruption — already

Major UK Cyber Incidents — What Actually Happened

These are not statistics from a distant country. These happened here, to people going about their ordinary lives.

2017
WannaCry — NHS England
Ransomware paralysed 80 NHS trusts and 595 GP surgeries in a single day. Ambulances were diverted. Operations cancelled. A £92 million recovery bill — paid by taxpayers.
80 NHS trusts hit £92M recovery cost Ambulances diverted
Jun 2024
Qilin Ransomware — NHS Synnovis, London
Blood testing across seven London hospitals collapsed. The NHS issued an emergency nationwide appeal for O-type blood donors. 400GB of patient data — covering 300 million interactions — was published online by the attackers. Recovery took until December.
10,152 appointments cancelled 1,710 procedures postponed 6 months to recover
Apr 2025
Scattered Spider — Marks & Spencer
One phone call to an IT helpdesk. Online sales suspended for 46 days. Shelves went bare. The company reverted to pen and paper. Pre-tax profit collapsed from £391m to £3.4m in the six months following the attack. Market value fell by over £700m within days.
£300m+ lost profit 46 days offline 22% consumer spending drop
Apr 2025
Same Easter Weekend — Co-op & Harrods
Three of Britain's most recognisable retailers targeted in the same weekend. Co-op's disruption hit rural communities particularly hard — in areas where it is the only local food shop, supply disruptions had immediate, visible consequences for residents with no alternatives.
3 major retailers, 1 weekend Rural food supply disrupted £270–440M total damage est.

Sources: NHS England, M&S financial filings, Cyber Monitoring Centre (CMC) Category 2 event report. All incidents are UK-based. All dates are confirmed.

The TV in Your Living Room

Here is something that might surprise you. You may already be involved in this — without knowing it, without consenting to it, and without having done anything wrong.

In 2025, the FBI issued a public warning about something called the BadBox 2.0 botnet. A botnet is a network of devices that have been secretly infected with malicious software and can be remotely controlled by criminals. BadBox 2.0 is the largest network of infected TV streaming devices ever discovered. At its peak, it had enrolled over ten million devices across 222 countries — including the UK. These aren't obscure pieces of equipment. They are the cheap Android TV boxes, streaming sticks, digital projectors, and smart tablets that millions of households use to watch films, sport, and television.

Many of these devices arrived infected before you even plugged them in. The malware was installed at the factory, hidden inside the operating system, invisible to the user. Once connected to your home Wi-Fi, the device quietly joins the botnet — and your internet connection, your home network, can then be used by criminals to launch attacks on other targets. Your streaming box, bought for £25 from a marketplace, might be helping an organised criminal group attack a hospital, launder advertising fraud, or assist a foreign government's hacking operation. And you would never know.

⚠ How to check your streaming device

If your TV box or streaming stick is from a brand you don't recognise, was advertised as "unlocked" or offering "free TV channels and sports," and required you to download apps from outside the Google Play store — it may be compromised. The FBI advises disconnecting suspicious devices from your network. A device bought from a well-known brand on the high street or certified by Google is far less likely to be affected.

The botnet in your home

BadBox 2.0 — Growth of the World's Largest TV Box Botnet

From 30,000 disrupted by German authorities in December 2024 to over 10 million by mid-2025. Law enforcement disruptions had only temporary effect — the infected devices kept shipping.

Sources: HUMAN Security Satori Intelligence, FBI IC3 Advisory, Bitsight. Despite multiple law enforcement operations, the botnet continued to grow because compromised devices kept being manufactured and sold.

The Government Is Not Ready — And It Is Making Things Worse

You might expect that facing a threat of this scale, government would be focused above all else on shoring up the country's defences. You might expect the public bodies responsible for our digital safety to be making careful, expert-led decisions. You would be wrong on both counts.

The government is currently building a mandatory national Digital ID system — a single digital card that will eventually be required to access employment, benefits, pensions, passports, and driving licences. All of it routed through one system. That system is called GOV.UK One Login, and it is already used by 13 million people.

Think about what that means in practice. Right now, if a criminal steals your bank card, the bank cancels it and you get a new one. Inconvenient, but recoverable. If a criminal steals your passport, you apply for another. These are separate systems with separate vulnerabilities. If any one of them is breached, the damage is contained. The Digital ID changes that fundamentally. It creates a single key that unlocks everything — your pension, your right to work, your driving licence, your benefit payments. One breach, and all of it is potentially compromised at once. Security experts call this a "single point of failure." For a lay audience, it is simpler than that: it is putting every egg in one basket, then advertising the basket to criminals.

In December 2025, senior civil servants who work on that system went to ITV News as whistleblowers, with confidential documents to back up their claims. What they described should alarm any ordinary person: One Login is failing to meet the government's own minimum security standards. People without proper security clearance had been able to access the system's most sensitive components — including development staff based overseas. System administrators were using unprotected devices, creating a potential pathway from the open internet straight into the heart of the system. And during a formal security test earlier in 2025, an outside tester was able to place malicious software on an administrator's computer and access sensitive parts of the system — without triggering a single alarm. The system, in other words, was penetrated during a test, and nobody noticed until the testers told them.

One of the whistleblowers spelled out what they fear: "The maximum damage that I can conceive is that they allow digital identity to continue to roll out and onboard all government services and then at a time of a bad state actor's choosing, they deny access to the services. That would shut everybody out of attempts to claim their pensions, welfare benefits, renew their passport, get a driving licence. Everything."

Read that again. One attack on one system. Everyone in the country locked out of everything. And the security concerns were first raised internally in 2022 — four years ago — and ignored. The whistleblower who reported the problems through official channels faced disciplinary action for doing so. The government's response to all of this has been to say that security is a priority, and to press on.

📋 What to know about Digital ID

A centralised identity system concentrates all the risk in one place. If it is breached, the consequences are not a stolen credit card — they are the loss of your entire digital identity. Security experts across the industry have described the UK scheme as a "honeypot for criminals." Nearly three million people signed a petition calling for it to be reconsidered. The ITV News whistleblower investigation is available to watch at itv.com. The government has pressed on regardless.

Meanwhile, the regulator Ofcom — whose expertise lies in broadcast licensing and communications regulation, not cybersecurity — has been monitoring how many British people use VPNs. A VPN is a tool that protects your internet traffic, used by journalists, lawyers, remote workers, businesses, and anyone concerned about their privacy online. Following public pushback against the Online Safety Act's age verification requirements, some MPs and campaigners began calling for VPNs to be banned or restricted. Security experts responded by pointing out that this would place the UK alongside China, Russia, and Iran as one of the few countries on earth that restricts its citizens' use of basic privacy tools. The body that should be leading this conversation — the National Cyber Security Centre — has been largely absent from it. A communications regulator should not be shaping national security policy. But right now, effectively, it is.

What This Means for You — and What You Can Do

The purpose of this piece is not to frighten you. It is to give you an honest picture of a threat that is real, that is already here, and that your own behaviour — and your government's decisions — can either make better or worse. The good news is that some of the most effective steps you can take are simple, free, and take ten minutes.

The Question Nobody Is Asking

When Jeremy Corbyn was asked about nuclear strikes, the audience was engaging with a question about visible, imaginable war. The harder question — the one nobody has yet asked at a prime-time debate — is what happens when an adversary doesn't need missiles.

In 1984, the BBC broadcast Threads, a drama about the aftermath of nuclear war in Sheffield. It is remembered as one of the most disturbing things ever shown on British television — not because of special effects, but because of specificity. It showed what nuclear war looked like on your street, in your home, to your neighbours. People who watched it changed their view of the threat. They demanded shelters. They demanded policy. The film did what no government briefing could: it made the abstract visceral and the distant immediate.

We need a Threads for cyber warfare. We need a public conversation that is as honest about this threat as that film was about nuclear war. Not hysterical. Not technical. Just clear. Because the next wave of warfare does not care whether you understand it. It does not care whether you live near a military base or a data centre. It is coming regardless — and it will land in your home, on your high street, and in your hospital, whether or not anyone told you to be ready.

Being miles from the battlefield is no longer protection. The battlefield is everywhere there is a device, a network, a system that someone depends on. That is your home. That is your town. That is the country you live in.

The air raid sirens are not coming this time. But that does not mean the bombs are not falling.

You are not a bystander in this. You are already on the frontline — in your living room, at your GP surgery, at the checkout. The only question is whether you know it.