British Army Reshapes Itself To Fight Cyberwars

Computer hackers and propaganda specialists working in the British Army are to be placed in a single division, as part of a reorganisation designed to reflect a belief that the boundary between peace and war has become increasingly blurred.

The cyber and intelligence experts will be consolidated into a reborn 6th Division, one of three in the army with a strength of 14,500, which will also contain ground troops who can be used in secret, special forces-type operations.

Lt Gen Ivan Jones, the commander of the British field army, said the plan reflected the fact that “the character of warfare continues to change” and “the boundaries between conventional and unconventional warfare” had become blurred. 

One of the early tasks for the rebranded unit is to better tackle disinformation and Russian and other places using fake news. For example, at the end of a recent exercise in Croatia, stories circulated that British soldiers had tried to abduct a native child only to be fought off by locals.

“What happened was that a handful of incidents that happened after the exercise, regrettable stories of soldiers accused of vandalism or urinating in public, were exaggerated online locally and began to appear in local media. We need people on the ground from the new 6th Division who can quickly counter that,” a military source told the Guardian newspaper.

Deliberate disinformation has been used in Mosul and northern Iraq “to great effect” to undermine Islamic State, army sources indicated, although they declined to provide further details for security reasons. 

British combat operations in Iraq and Afghanistan finished 10 and five years ago, and while the military are now engaged in some covert missions such as Yemen, conventional war fighting is currently rare.Troops are more likely to be engaged in peacekeeping and security operations, such as leading a Nato battlegroup on the Russian border in Estonia, or engaged in exercises in parts of the world where a visible UK presence is deemed politically desirable.

But there is an increasing view that conflict has moved to the electronic and information arenas, particularly with Russia, but also with countries such as China and Iran, in which a key question is whether the UK can play a role to ensure that countries in eastern Europe remained allied with the west.

Earlier this year, Gen Sir Mark Carleton-Smith, the chief of general staff, argued that peace and war were “two increasingly redundant states” because authoritarian regimes were “exploiting the hybrid space that exists in between”.

The reorganisation has been undertaken within the existing defence budget, although the army remains several thousand short of its target full-time strength of 82,000, with overall troop numbers at their lowest levels since before the two world wars.

In the race to be prime minister, the eventual winner Boris Johnson promised to maintain defence spending at the existing level of just over 2% of GDP, unlike defeated rival Jeremy Hunt, who said he would lift it by £15bn to 2.5%.

Generals hope that it will be possible to further retrain soldiers keen to work or improve their skills as hackers or information specialists to enhance the capabilities of the 6th Division, based in Upavon in Wiltshire. 

The change will also see the army’s 1st Division reorganised to focus more clearly on logistics, engineers and medics. The York-based 3rd Division, the army’s principal “war fighting” division, remains essentially unchanged.

Ministry of Defence:                Guardian

You Might Also Read: 

The Cyber Effect On Modern Warfare:

US Cyber Strike On Iran Is A Step Change:

Cyber Soldiers: UK Announces Creation Of The 77th Battalion:

 

« More About The Capital One Breach
Fraudsters Target Social Media Influencers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

StratoKey

StratoKey

StratoKey is an intelligent Cloud Access Security Broker (CASB) that secures your cloud and SaaS applications against data breaches, so you can do secure and compliant business in the cloud.

IntSights

IntSights

IntSights is an intelligence driven security provider offering rapid, accurate cyberthreat intelligence and incident mitigation in real time

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

Cybercrime Support Network (CSN)

Cybercrime Support Network (CSN)

CSN is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

Beazley

Beazley

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide.

At-Bay

At-Bay

At-Bay offer an end-to-end solution to cyber risk with comprehensive risk assessment, a tailored cyber insurance policy and year-long, active, risk-management service.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

StoneLock

StoneLock

StoneLock is a trusted leader in the design and manufacture of facial recognition software and technology.

Cyber Risk International

Cyber Risk International

Cyber Risk International offer CyberPrism, a B2B SaaS solution that empowers businesses to perform a self-assessment of their cyber security program.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

DuckDuckGoose

DuckDuckGoose

DuckDuckGoose offer advanced solutions to protect against manipulated videos, images, voices and texts.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.

Nightwing

Nightwing

Nightwing is the intelligence services company that continually redefines the edge of the possible to keep advancing our national security interests.