New UK Cyber Force Targets Terror Groups

A specialist cyber force of hackers who can target hostile states and terror groups is due to be launched later in the spring, after many months of delays and turf wars between the Ministry of Defence and GCHQ. The National Cyber Force, containing an estimated 500 specialists, has been in the works for two years but  after months of wrangling over the details, the specialist unit was close to being formally announced.

The American assassination of Iranian general Qassem Soleimani has added urgency to the progress of the specialist unit, amid risks of a cyber conflict that could affect the UK.

Therefore, the UK is keen to be seen as a “cyber power” able to disrupt against enemy states, targeting satellite, mobile and computer networks as well as trying to take down communications networks used by terror groups. The National Cyber Force is a joint initiative between the Ministry of Defence and GCHQ, and insiders said it would consolidate some existing capabilities as well as develop new ones.

Much of what the UK’s offensive hackers could do should remain classified and the identity of its leader is not expected to be publicly disclosed, although previous speculation that it would be a woman is understood to be inaccurate. However, officials are coy on details, arguing that much of what the UK’s offensive hackers could do should remain classified. Nor is the identity of its leader expected to be publicly disclosed, although previous speculation that it would be a woman is understood to be inaccurate.

Experts argue that the lack of clarity makes it difficult to discuss the appropriate limits of cyber warfare in a democracy and what sort of attacks or disruptive measures can be considered legitimate, particularly if there is a strong military dimension to its work.

James Sullivan, the head of cyber research at defence think-tank RUSI, said: “There has been limited public debate on the purpose and ethics of offensive cyber, the circumstances under which it might be used, and the kinds of effects that might and might not be acceptable.”

Avowed examples of British hacking are rare. Jeremy Fleming, GCHQ’s director, said that GCHQ conductied “a major offensive cyber campaign” against Isis, which he said “had significant success in suppressing propaganda, hindered their ability to coordinate attacks, and protected coalition forces on the battlefield”. 

Britain’s delayed efforts come on the heels of the US, which has been gradually acknowledging an expanded offensive cyber capability. Last summer, John Bolton, then US national security adviser, acknowledged that Washington was broadening its operations after President Trump relaxed restrictions.

The US also rarely acknowledges what its hackers do, although in one operation known as Synthetic Theology, the US Cyber Command jammed servers belonging to the Russian Internet Research Agency, in an apparent attempt to prevent Kremlin interference in the 2018 US mid-term elections.

A government spokesperson said the MoD and GCHQ “have a long and proud history of working together in the national interest and continue to tackle the real threats that the UK faces from a range of hostile actors”.

Around £76m is due to be invested in the force in the first year, with command and control shared between the MoD and the Government Communications Headquarters in Cheltenham. Recruitment is projected to take place from the armed forces and intelligence services, as well as academia and the private sector.

Silicon:     Guardian:        Independent:  

You Might Also Read:

The British Cyber Command:

Britain Is At Cyber War Every Day:

 

 

« Why 5G Is Going To Quickly Replace 4G
Cyber Attacks Predicted For 2020 Summer Olympics »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

Uniscon

Uniscon

Uniscon is a leading provider of cloud security solutions in Europe.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

Cyber Security Centre - Daffodil International University

Cyber Security Centre - Daffodil International University

Cyber Security Centre, DIU is a non-profitable organization which is focused on applied research in cyber security.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

Sekur Private Data

Sekur Private Data

Sekur Private Data Ltd. is a Cybersecurity and Internet privacy provider of Swiss hosted solutions for secure communications and secure data management.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

Planisys

Planisys

Planisys is a cybersecurity leader specializing in cutting-edge DNS security and email security solutions.