Britain Hacks Back

The British government is stepping up the rhetoric on cyber warfare, with £22m to be spent on an "offensive hacking" unit as Foreign Secretary Jeremy Hunt (pictured) vowed to retaliate against Russian cyber-attacks.

In a speech delivered at Lancaster House, the preferred venue for big foreign policy set-pieces, Hunt declared that Britain's "primary goal" must be to deter foreign state-backed hackers from targeting the country at all. "In particular," he said, "we should be more emphatic about what we consider to be unacceptable behaviour and the consequences for any breach of international law."

The speech was the keynote of a NATO press conference, arranged for the NATO Cyber Defence Pledge conference. That conference was themed around getting alliance members to agree tougher responses to largely Russian hacking attacks.
Hunt continued: "Recent events demonstrate that our adversaries regard democratic elections as a key vulnerability of an open society. If cyber interference were to become commonplace, the danger is that authoritarian states would damage public confidence in the very fabric of democracy."

He said all this without acknowledging the electoral chaos rampaging through the UK thanks to the indecision of his own political party over the Britain leaving the European Union.

We must be very clear, any cyber operations designed to alter an election would breach international law and justify a proportionate response. Together we possess options for responding to any attacks that fall below the threshold for Article 5 and we should be prepared to use them.

Article 5 is the part of the NATO founding treaty which says an attack on one alliance member is counted as an attack on all of them.

NATO Secretary-General Jens Stoltenberg also chipped in, boasting: "None of the [hacking] attempts against NATO have compromised our secure networks and none have affected our operations." The secretary-general, a one-time prime minister of Norway, ominously added that the 29-strong alliance must be "ready to use our cyber capabilities to fight an enemy" - though he later qualified this to mean in the same way that British hackers disrupted Islamic State extremists' propaganda channels during the ongoing war in Iraq and Syria.

British rhetoric is growing about the nation being increasingly willing to actively hack and damage other countries' cyber-infrastructure in retaliation for attacks on our own, or allied, infrastructure. With the general thrust of recent defence and foreign policy being to push Britain as a countering "force for good" against the traditional bogeyman of Russia, cyber warfare threats will be playing an increasingly larger role.

So far the UK has not admitted to actually using its hacking capabilities against another country. Only Islamic extremists in the Middle East have been publicly acknowledged as targets. 

The Register

You Might Also Read: 

NATO Agrees Collaboration On Cyber Security:

 

 

« Now Is Definitely Time To Check You Are GDPR Compliant
More Than 900 Million Financial Records Exposed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

WEBINAR: 2024 and Beyond: Top Six Cloud Security Trends

April 4, 2024 | 11:00 AM PT: Join this webinar to find out about six emerging trends dominating the cloud cybersecurity landscape.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo is the UK’s largest cloud and cyber security event.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

Talion

Talion

Talion aim to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast.

Capital Network Solutions

Capital Network Solutions

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications.

Tutanota

Tutanota

Tutanota is the world’s first end-to-end encrypted mail service that encrypts the entire mailbox.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

Prophaze Technologies

Prophaze Technologies

Prophaze enable organizations and SaaS providers to improve their web application cybersecurity and reduce costs through AI automation.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.