New UK Cyber Force Targets Terror Groups

A specialist cyber force of hackers who can target hostile states and terror groups is due to be launched later in the spring, after many months of delays and turf wars between the Ministry of Defence and GCHQ. The National Cyber Force, containing an estimated 500 specialists, has been in the works for two years but  after months of wrangling over the details, the specialist unit was close to being formally announced.

The American assassination of Iranian general Qassem Soleimani has added urgency to the progress of the specialist unit, amid risks of a cyber conflict that could affect the UK.

Therefore, the UK is keen to be seen as a “cyber power” able to disrupt against enemy states, targeting satellite, mobile and computer networks as well as trying to take down communications networks used by terror groups. The National Cyber Force is a joint initiative between the Ministry of Defence and GCHQ, and insiders said it would consolidate some existing capabilities as well as develop new ones.

Much of what the UK’s offensive hackers could do should remain classified and the identity of its leader is not expected to be publicly disclosed, although previous speculation that it would be a woman is understood to be inaccurate. However, officials are coy on details, arguing that much of what the UK’s offensive hackers could do should remain classified. Nor is the identity of its leader expected to be publicly disclosed, although previous speculation that it would be a woman is understood to be inaccurate.

Experts argue that the lack of clarity makes it difficult to discuss the appropriate limits of cyber warfare in a democracy and what sort of attacks or disruptive measures can be considered legitimate, particularly if there is a strong military dimension to its work.

James Sullivan, the head of cyber research at defence think-tank RUSI, said: “There has been limited public debate on the purpose and ethics of offensive cyber, the circumstances under which it might be used, and the kinds of effects that might and might not be acceptable.”

Avowed examples of British hacking are rare. Jeremy Fleming, GCHQ’s director, said that GCHQ conductied “a major offensive cyber campaign” against Isis, which he said “had significant success in suppressing propaganda, hindered their ability to coordinate attacks, and protected coalition forces on the battlefield”. 

Britain’s delayed efforts come on the heels of the US, which has been gradually acknowledging an expanded offensive cyber capability. Last summer, John Bolton, then US national security adviser, acknowledged that Washington was broadening its operations after President Trump relaxed restrictions.

The US also rarely acknowledges what its hackers do, although in one operation known as Synthetic Theology, the US Cyber Command jammed servers belonging to the Russian Internet Research Agency, in an apparent attempt to prevent Kremlin interference in the 2018 US mid-term elections.

A government spokesperson said the MoD and GCHQ “have a long and proud history of working together in the national interest and continue to tackle the real threats that the UK faces from a range of hostile actors”.

Around £76m is due to be invested in the force in the first year, with command and control shared between the MoD and the Government Communications Headquarters in Cheltenham. Recruitment is projected to take place from the armed forces and intelligence services, as well as academia and the private sector.

Silicon:     Guardian:        Independent:  

You Might Also Read:

The British Cyber Command:

Britain Is At Cyber War Every Day:

 

 

« Why 5G Is Going To Quickly Replace 4G
Cyber Attacks Predicted For 2020 Summer Olympics »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

Sintef Digital

Sintef Digital

Sintef Digital carries out research in Information and Communication Technology for industry and the public sector.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

FinCom.co

FinCom.co

FinCom.Co is the world’s first automatic AML/ KYC screening system, for comprehensive compliance.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

SpecterOps

SpecterOps

SpecterOps has unique insight into the cyber adversary mindset and brings the highest caliber, most experienced resources to assess your organizations defenses.

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

Framatome

Framatome

Framatome Cybersecurity portfolio is directly inspired by its unique experience in nuclear safety for critical information systems and electrical systems design.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

Intigriti

Intigriti

Intigriti helps companies protect themselves from cybercrime. Our community of ethical hackers provides continuous, realistic security testing to protect our customer’s assets and brand.

Sourcepass

Sourcepass

Sourcepass is an IT consulting company that focuses on providing expert IT services, cloud computing solutions, cybersecurity services, website, and application development.

ThreatLocker

ThreatLocker

The ThreatLocker Platform provides a Zero Trust security solution that offers a unified approach to protecting users, devices, and networks against the exploitation of zero day vulnerabilities.

StarLink

StarLink

StarLink is an acclaimed Value-Added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 20 countries including UK and USA.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

Hexagate

Hexagate

Hexagate is at the forefront of blockchain threat prevention and automated risk management, proactively detecting and mitigating threats to smart contracts and onchain assets.