British Navy Combines With The Japanese Military To Counter Cyber Attacks

UK’s Royal Navy (RN) specialists joined forces with Japanese counterparts in Tokyo to fend off cyber-attacks during a large-scale cyber battle exercise. 

Forty-one teams from 17 nations tested their cyber defence skills during the British Army’s annual Cyber Marvel exercise in Estonia, with an international network plugging in from across three continents. 

Cyber Marvel is a test of deception and  mental agility, designed to stretch the most experienced cyber specialists, allowing allies and partners to learn and sharpen skills together. Hosted at NATO’s Cyber Range, international participants dialled in from Kenya, Singapore, Philippines, India, Indonesia and Brunei and, in the Royal Navy’s case, Japan.

The Royal Navy’s cyber operations specialists based in Portsmouth are usually on the front line across the world, protecting ships and bases from threats around the clock, but were deployed to Tokyo for this valuable exercise. This year, for the first time, they formed a joint team with the Japanese Maritime Self Defence Force’s (JMSDF) Communication Security Group.

The 22-strong team, 12 from the RN and 10 from JMSDF, were given the mission of protecting an island in the Indo-Pacific region facing aggressive cyber attacks from a ‘hostile’ nation state. 

The cyber battle, which increased in its complexity throughout, helped forge closer bonds and understanding between Japanese and British personnel as they prepare to work with each other next year as the UK deploys its Carrier Strike Group to the region.

Lieutenant Commander Paul Adkins, in charge of the RN team, said: “Our participation in the exercise with the Communications Support Group based in Tokyo represents a culmination of activity that only came into being last year; but has already cemented an enduring relationship with our friends in the JMSDF.  “Together we have refined and developed joint tactics and procedures that have borne fruit now, but more importantly, will serve us well in the future, particularly as we look to provide cyber assurance to CSG deployment 2025. Here we look forward to continued engagement with the Japanese Defense Forces”.

  • Each ‘blue’ team is scored on the success of its defence against attackers’ (the hostile red teams), system availability, command briefing quality, situational and reports as well as side challenges which included Digital Forensics, Artificial Intelligence, Machine Learning and Quantum Computing.
  • The exercise created government, hospital, power plant and military networks, with the team defending critical national infrastructure from increasingly sophisticated attacks ensuring maximum availability, removing exploited vulnerabilities, and eradicating malicious actors from the networks.   

The joint team regularly reported to an Australian chain of command throughout the scenario and successfully maintained 100 per cent availability of Critical National Infrastructure (CNI), repeatedly removing malicious access and artifacts throughout the country’s infrastructure. 

The joint RN/JMSDF team were judged to have performed strongly, finishing sixth overall 

Royal Navy     |     Twitter

You Might Also Read: 

Locked Shields - NATO’s 2023 Cyber Exercise:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Humanoid Robot Startup Valued At $2.6 Billion
Identifying OSS Security Risks To Safeguard Software Supply Chains »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

Inogesis

Inogesis

Inogesis helps blue-chip organisations harness disruptive technologies and thinking to drive new revenues or overcome challenges by connecting them with dynamic small companies.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

Findcourses.co.uk

Findcourses.co.uk

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

Traceable

Traceable

Traceable was founded to protect applications from next-generation attacks.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

Institute for Applied Network Security (IANS)

Institute for Applied Network Security (IANS)

For the security practitioner caught between rapidly evolving threats and demanding executives, IANS Research is a clear-headed resource for decision making and articulating risk.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.