British Army Reshapes Itself To Fight Cyberwars

Computer hackers and propaganda specialists working in the British Army are to be placed in a single division, as part of a reorganisation designed to reflect a belief that the boundary between peace and war has become increasingly blurred.

The cyber and intelligence experts will be consolidated into a reborn 6th Division, one of three in the army with a strength of 14,500, which will also contain ground troops who can be used in secret, special forces-type operations.

Lt Gen Ivan Jones, the commander of the British field army, said the plan reflected the fact that “the character of warfare continues to change” and “the boundaries between conventional and unconventional warfare” had become blurred. 

One of the early tasks for the rebranded unit is to better tackle disinformation and Russian and other places using fake news. For example, at the end of a recent exercise in Croatia, stories circulated that British soldiers had tried to abduct a native child only to be fought off by locals.

“What happened was that a handful of incidents that happened after the exercise, regrettable stories of soldiers accused of vandalism or urinating in public, were exaggerated online locally and began to appear in local media. We need people on the ground from the new 6th Division who can quickly counter that,” a military source told the Guardian newspaper.

Deliberate disinformation has been used in Mosul and northern Iraq “to great effect” to undermine Islamic State, army sources indicated, although they declined to provide further details for security reasons. 

British combat operations in Iraq and Afghanistan finished 10 and five years ago, and while the military are now engaged in some covert missions such as Yemen, conventional war fighting is currently rare.Troops are more likely to be engaged in peacekeeping and security operations, such as leading a Nato battlegroup on the Russian border in Estonia, or engaged in exercises in parts of the world where a visible UK presence is deemed politically desirable.

But there is an increasing view that conflict has moved to the electronic and information arenas, particularly with Russia, but also with countries such as China and Iran, in which a key question is whether the UK can play a role to ensure that countries in eastern Europe remained allied with the west.

Earlier this year, Gen Sir Mark Carleton-Smith, the chief of general staff, argued that peace and war were “two increasingly redundant states” because authoritarian regimes were “exploiting the hybrid space that exists in between”.

The reorganisation has been undertaken within the existing defence budget, although the army remains several thousand short of its target full-time strength of 82,000, with overall troop numbers at their lowest levels since before the two world wars.

In the race to be prime minister, the eventual winner Boris Johnson promised to maintain defence spending at the existing level of just over 2% of GDP, unlike defeated rival Jeremy Hunt, who said he would lift it by £15bn to 2.5%.

Generals hope that it will be possible to further retrain soldiers keen to work or improve their skills as hackers or information specialists to enhance the capabilities of the 6th Division, based in Upavon in Wiltshire. 

The change will also see the army’s 1st Division reorganised to focus more clearly on logistics, engineers and medics. The York-based 3rd Division, the army’s principal “war fighting” division, remains essentially unchanged.

Ministry of Defence:                Guardian

You Might Also Read: 

The Cyber Effect On Modern Warfare:

US Cyber Strike On Iran Is A Step Change:

Cyber Soldiers: UK Announces Creation Of The 77th Battalion:

 

« More About The Capital One Breach
Fraudsters Target Social Media Influencers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CW Jobs

CW Jobs

CWJobs.co.uk is a leading specialist IT recruitment website covering all areas of IT including Cyber Security.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

Sevatec

Sevatec

Sevatec’s Active Cyber Defense (ACD) methodology proactively defends against adversarial kills chain, addressing active and emerging threats while reducing program vulnerabilities and risks.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.

Verizon

Verizon

Verizon is a leader in IT technology solutions - Verizon Cloud, Networking, Security, Mobility, Machine-to-Machine (M2M), Advanced Communications and Professional Services.

GeoComply

GeoComply

GeoComply provides fraud prevention and cybersecurity solutions that detect location fraud and help verify a user's true digital identity.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

Custocy

Custocy

Custocy is a unique collaborative AI technology that identifies sophisticated and unknown (zero-day) attacks.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.