Britain Hacks Back

The British government is stepping up the rhetoric on cyber warfare, with £22m to be spent on an "offensive hacking" unit as Foreign Secretary Jeremy Hunt (pictured) vowed to retaliate against Russian cyber-attacks.

In a speech delivered at Lancaster House, the preferred venue for big foreign policy set-pieces, Hunt declared that Britain's "primary goal" must be to deter foreign state-backed hackers from targeting the country at all. "In particular," he said, "we should be more emphatic about what we consider to be unacceptable behaviour and the consequences for any breach of international law."

The speech was the keynote of a NATO press conference, arranged for the NATO Cyber Defence Pledge conference. That conference was themed around getting alliance members to agree tougher responses to largely Russian hacking attacks.
Hunt continued: "Recent events demonstrate that our adversaries regard democratic elections as a key vulnerability of an open society. If cyber interference were to become commonplace, the danger is that authoritarian states would damage public confidence in the very fabric of democracy."

He said all this without acknowledging the electoral chaos rampaging through the UK thanks to the indecision of his own political party over the Britain leaving the European Union.

We must be very clear, any cyber operations designed to alter an election would breach international law and justify a proportionate response. Together we possess options for responding to any attacks that fall below the threshold for Article 5 and we should be prepared to use them.

Article 5 is the part of the NATO founding treaty which says an attack on one alliance member is counted as an attack on all of them.

NATO Secretary-General Jens Stoltenberg also chipped in, boasting: "None of the [hacking] attempts against NATO have compromised our secure networks and none have affected our operations." The secretary-general, a one-time prime minister of Norway, ominously added that the 29-strong alliance must be "ready to use our cyber capabilities to fight an enemy" - though he later qualified this to mean in the same way that British hackers disrupted Islamic State extremists' propaganda channels during the ongoing war in Iraq and Syria.

British rhetoric is growing about the nation being increasingly willing to actively hack and damage other countries' cyber-infrastructure in retaliation for attacks on our own, or allied, infrastructure. With the general thrust of recent defence and foreign policy being to push Britain as a countering "force for good" against the traditional bogeyman of Russia, cyber warfare threats will be playing an increasingly larger role.

So far the UK has not admitted to actually using its hacking capabilities against another country. Only Islamic extremists in the Middle East have been publicly acknowledged as targets. 

The Register

You Might Also Read: 

NATO Agrees Collaboration On Cyber Security:

 

 

« Now Is Definitely Time To Check You Are GDPR Compliant
More Than 900 Million Financial Records Exposed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

Komodo Consulting (KomodoSec)

Komodo Consulting (KomodoSec)

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

BlueKrypt

BlueKrypt

BlueKrypt is a consulting firm for the security of IT systems and their management.

Consortium for Information & Software Quality (CISQ)

Consortium for Information & Software Quality (CISQ)

The mission of CISQ is to develop international standards for software quality and to promote the development and sustainment of secure, reliable, and trustworthy software.

Sum&Substance (Sumsub)

Sum&Substance (Sumsub)

Sum&Substance is a developer of remote verification solutions. Our technology allows online services around the world to meet regulatory requirements, prevent fraud and enhance customer confidence.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

Ballistic Ventures

Ballistic Ventures

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

B&L PC Solutions

B&L PC Solutions

B&L PC Solutions deliver top cyber security services on Long Island and New York city to protect businesses from evolving online threats.

AppSentinels

AppSentinels

Appsentinels are a group of security and technology experts with a mission to fix gaps in application security.