British Army Reshapes Itself To Fight Cyberwars

Computer hackers and propaganda specialists working in the British Army are to be placed in a single division, as part of a reorganisation designed to reflect a belief that the boundary between peace and war has become increasingly blurred.

The cyber and intelligence experts will be consolidated into a reborn 6th Division, one of three in the army with a strength of 14,500, which will also contain ground troops who can be used in secret, special forces-type operations.

Lt Gen Ivan Jones, the commander of the British field army, said the plan reflected the fact that “the character of warfare continues to change” and “the boundaries between conventional and unconventional warfare” had become blurred. 

One of the early tasks for the rebranded unit is to better tackle disinformation and Russian and other places using fake news. For example, at the end of a recent exercise in Croatia, stories circulated that British soldiers had tried to abduct a native child only to be fought off by locals.

“What happened was that a handful of incidents that happened after the exercise, regrettable stories of soldiers accused of vandalism or urinating in public, were exaggerated online locally and began to appear in local media. We need people on the ground from the new 6th Division who can quickly counter that,” a military source told the Guardian newspaper.

Deliberate disinformation has been used in Mosul and northern Iraq “to great effect” to undermine Islamic State, army sources indicated, although they declined to provide further details for security reasons. 

British combat operations in Iraq and Afghanistan finished 10 and five years ago, and while the military are now engaged in some covert missions such as Yemen, conventional war fighting is currently rare.Troops are more likely to be engaged in peacekeeping and security operations, such as leading a Nato battlegroup on the Russian border in Estonia, or engaged in exercises in parts of the world where a visible UK presence is deemed politically desirable.

But there is an increasing view that conflict has moved to the electronic and information arenas, particularly with Russia, but also with countries such as China and Iran, in which a key question is whether the UK can play a role to ensure that countries in eastern Europe remained allied with the west.

Earlier this year, Gen Sir Mark Carleton-Smith, the chief of general staff, argued that peace and war were “two increasingly redundant states” because authoritarian regimes were “exploiting the hybrid space that exists in between”.

The reorganisation has been undertaken within the existing defence budget, although the army remains several thousand short of its target full-time strength of 82,000, with overall troop numbers at their lowest levels since before the two world wars.

In the race to be prime minister, the eventual winner Boris Johnson promised to maintain defence spending at the existing level of just over 2% of GDP, unlike defeated rival Jeremy Hunt, who said he would lift it by £15bn to 2.5%.

Generals hope that it will be possible to further retrain soldiers keen to work or improve their skills as hackers or information specialists to enhance the capabilities of the 6th Division, based in Upavon in Wiltshire. 

The change will also see the army’s 1st Division reorganised to focus more clearly on logistics, engineers and medics. The York-based 3rd Division, the army’s principal “war fighting” division, remains essentially unchanged.

Ministry of Defence:                Guardian

You Might Also Read: 

The Cyber Effect On Modern Warfare:

US Cyber Strike On Iran Is A Step Change:

Cyber Soldiers: UK Announces Creation Of The 77th Battalion:

 

« More About The Capital One Breach
Fraudsters Target Social Media Influencers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

DataArt

DataArt

DataArt is a global technology consultancy that designs, develops and supports unique software solutions. Areas of activity include software security testing.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Intel Capital

Intel Capital

Intel Capital, Intel's strategic investment organization, backs innovative technology startups and companies worldwide. We invest in a broad range of hardware, software, and services.

Dataprovider.com

Dataprovider.com

Our Brand Protection Suite gives you the tools to discover trademark infringement on the Internet, such as websites selling counterfeit products, even when this is not immediately noticeable.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

Ministry of Information and Communications (MIC) - Vietnam

Ministry of Information and Communications (MIC) - Vietnam

The Ministry of Information & Communications of Vietnam is the policy making and regulatory body in the field of information technology and national information and and communication infrastructure.

National Security Services Group (NSSG)

National Security Services Group (NSSG)

National Security Services Group (NSSG) is Oman's leading and only proprietary Cybersecurity consultancy firm and Managed Security Services Provider.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.