Cyber Soldiers: UK Announces Creation Of The 77th Battalion

The documents leaked by Edward Snowden demonstrate that the NSA and its allies are now preparing for future dominance in cyberspace.

Cyberspace is a strategic domain for modern warfare, for this reason, the British Government has decided to create a new cyber unit composed of cyber experts, so-called "Facebook Warriors", which will "wage complex and covert information and subversion campaigns".

According to the Financial Times, the new cyber unit will be named the 77th battalion due to a historical significance.

"The original Chindits [77th battalion] were a guerrilla unit led by the swashbuckling British commander Major General Orde Wingate, one of the pioneers of modern unconventional warfare. They operated deep behind Japanese lines in Burma between 1942 and 1945 and their missions were often of questionable success." reported the Financial Times.

The group will use social networks like Facebook and Twitter to monitor their opponents, the information they produce and to run PSYOPs.

The British army will assign more than 1,500 specialists to the new troop that will use popular social networks to spread disinformation, run intelligence operations and disclose real war truths.

The 77th battalion will reportedly begin its activity in April 2015. The decision of the British Government to create the 77th battalion cyber unit follows a similar initiative of other governments that are using social networks to run cyber espionage campaigns, spread disinformation or influence the human sentiment about specific topics.

As reported by the Guardian, both the Israeli and US army have already dedicated internal staff to psychological operations run through social networks. An Israel Defense Force spokesperson revealed that the IDF used 30 different social media sites in several different languages during Operation Cast Lead in an effort to "engage with an audience we otherwise wouldn't reach."

Security Affairs: 

 

« Dramatic Improvement in Intelligence Sharing Because of ISIS
Android malware fakes phone shutdown then steals data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

Pervade Software

Pervade Software

Pervade Software is a global provider of dedicated compliance tracking software with monitoring & reporting capabilities.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Digital Infrastructure Association (DINL)

Digital Infrastructure Association (DINL)

DINL is the leading representative for companies and organisations which are active within the Dutch digital infrastructure sector.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

ICS-CSR

ICS-CSR

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Globesecure Technologies

Globesecure Technologies

Globesecure Technologies is a networks and cyber security company. We are here to resolve business security challenges and secure the digital transformation journey of our clients.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.

Amtivo Group

Amtivo Group

Amtivo provides Certification, Inspection and Training services to national and local Government bodies, multi-nationals, enterprise clients and SMEs.