Britain's Cyber Force Toughens Up

Britain's new National Cyber Force (NCF) will be deployed to ‘detect, disrupt and deter’ adversaries and will feature among a number of ‘priority actions’ contained in a new fully-formed cyber strategy, to be published soon, according to Prime Minister Boris Johnson.  
 
A ‘cyber corridor’ in the north of England is set to become home of to the NCF, as Britain transitions towards more of an offensive security posture against terrorists, hostile states and criminal gangs. 
 
The location of the NCF is a key element of the plans with the government hoping to drive further growth in the digital tech and defence sectors outside of London and foster wider government partnerships within the industry and universities around the region.
 
The NCF is recruiting through existing members of the armed forces and from GCHQ, MI6 and also the Defence Science and Technology Laboratory.  MI6 officers might be involved if activity is taking place overseas or to work on the human aspect of an operation. The ambition is to grow the force to about 3,000 in the next decade. 

The UK is committed to using its cyber capabilities in a responsible way and in line with British and international law.  

Past and future cyber operations have and will continue to operate under existing laws, including those granted by the relevant legislation in the Intelligence Services Act and the Investigatory Powers Act. This ensures UK cyber operations are responsible, targeted and proportionate, unlike those of some of our adversaries.
 
The National Cyber Security Centre, which is part of the GCHQ spy agency, was first established in 2016 to help critical organisations, businesses and the general public protect themselves. However the change in tack is in line with an upsurge of global ransomware and espionage attacks carried out in recent years, which have disrupted businesses and life in the UK.
A new cyber strategy will be announced to create a cyber ecosystem fit for the future
 
The NCF was created last year to transform the UK’s capacity to conduct targeted offensive cyber operations against terrorists, hostile states and criminal gangs. It draws together personnel from both defence and the intelligence agencies under one unified command for the first time. The kinds of operations the NCF is able to carry out include:  
 
  • Interfering with a mobile phone to prevent a terrorist being able to communicate with their contacts
  • Helping to prevent cyberspace from being used as a global platform for serious crimes, including the sexual abuse of children
  • Keeping UK military aircraft safe from targeting by weapons systems
The Government’s new cyber strategy is intended to  support companies developing dual-use and consumer technology to ensure the UK is a cyber power in every sense.
 
GCHQ:         GovUK:       BBC:           ITPro:         Global Risks Insights:         I-HLS:
 
You Might Also Read: 
 
Britain Will Build Up Its Military Cyber Capabilities:
 
« 2021 Blockchain Trends
Secure Your Personal Email & Social Media Accounts »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Rockwell Automation

Rockwell Automation

Rockwell Automation offer industrial security solutions to protect the integrity and availability of your complex automation solutions.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

SAI360

SAI360

SAI360 (formerly SAI Global) provide products and services for enterprise risk management including Governance, Risk & Compliance and Digital Risk solutions.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

Oneconsult

Oneconsult

Oneconsult provides cyber security services focusing on penetration tests / ethical hacking, ISO 27001 security audits and incident response & IT forensics.

Atlantic Council Digital Forensic Research Lab (DFRLab)

Atlantic Council Digital Forensic Research Lab (DFRLab)

The Atlantic Council’s DFRLab has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

Fortalice

Fortalice

Fortalice provide customizable consulting services built on proven methodology to strengthen your business cyber security defenses.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

iVision

iVision

iVision is a technology integration and management firm that engineers success for clients through objective recommendations, process and technology expertise and best-of-breed guidance.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.