Cyber Soldiers: UK Announces Creation Of The 77th Battalion

The documents leaked by Edward Snowden demonstrate that the NSA and its allies are now preparing for future dominance in cyberspace.

Cyberspace is a strategic domain for modern warfare, for this reason, the British Government has decided to create a new cyber unit composed of cyber experts, so-called "Facebook Warriors", which will "wage complex and covert information and subversion campaigns".

According to the Financial Times, the new cyber unit will be named the 77th battalion due to a historical significance.

"The original Chindits [77th battalion] were a guerrilla unit led by the swashbuckling British commander Major General Orde Wingate, one of the pioneers of modern unconventional warfare. They operated deep behind Japanese lines in Burma between 1942 and 1945 and their missions were often of questionable success." reported the Financial Times.

The group will use social networks like Facebook and Twitter to monitor their opponents, the information they produce and to run PSYOPs.

The British army will assign more than 1,500 specialists to the new troop that will use popular social networks to spread disinformation, run intelligence operations and disclose real war truths.

The 77th battalion will reportedly begin its activity in April 2015. The decision of the British Government to create the 77th battalion cyber unit follows a similar initiative of other governments that are using social networks to run cyber espionage campaigns, spread disinformation or influence the human sentiment about specific topics.

As reported by the Guardian, both the Israeli and US army have already dedicated internal staff to psychological operations run through social networks. An Israel Defense Force spokesperson revealed that the IDF used 30 different social media sites in several different languages during Operation Cast Lead in an effort to "engage with an audience we otherwise wouldn't reach."

Security Affairs: 

 

« Dramatic Improvement in Intelligence Sharing Because of ISIS
Android malware fakes phone shutdown then steals data »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

Capita

Capita

Capita is a consulting, digital services and software business, providing end-to-end enterprise IT services and solutions focused around digital transformation and innovation.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

CRI Group

CRI Group

CRI Group excels at deterring, detecting and investigating crimes against businesses using a global network of professionals specially trained in Anti-Corruption, Risk Management and Compliance.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

Forthright Technology Partners

Forthright Technology Partners

Forthright Technology Partners (Forthright) is a next-generation cloud and managed IT services provider serving a global clientele.

Red Alpha Cybersecurity

Red Alpha Cybersecurity

At Red Alpha, we specialize in recruiting and rigorously training individuals passionate about cybersecurity.