Britain Hacks Back

The British government is stepping up the rhetoric on cyber warfare, with £22m to be spent on an "offensive hacking" unit as Foreign Secretary Jeremy Hunt (pictured) vowed to retaliate against Russian cyber-attacks.

In a speech delivered at Lancaster House, the preferred venue for big foreign policy set-pieces, Hunt declared that Britain's "primary goal" must be to deter foreign state-backed hackers from targeting the country at all. "In particular," he said, "we should be more emphatic about what we consider to be unacceptable behaviour and the consequences for any breach of international law."

The speech was the keynote of a NATO press conference, arranged for the NATO Cyber Defence Pledge conference. That conference was themed around getting alliance members to agree tougher responses to largely Russian hacking attacks.
Hunt continued: "Recent events demonstrate that our adversaries regard democratic elections as a key vulnerability of an open society. If cyber interference were to become commonplace, the danger is that authoritarian states would damage public confidence in the very fabric of democracy."

He said all this without acknowledging the electoral chaos rampaging through the UK thanks to the indecision of his own political party over the Britain leaving the European Union.

We must be very clear, any cyber operations designed to alter an election would breach international law and justify a proportionate response. Together we possess options for responding to any attacks that fall below the threshold for Article 5 and we should be prepared to use them.

Article 5 is the part of the NATO founding treaty which says an attack on one alliance member is counted as an attack on all of them.

NATO Secretary-General Jens Stoltenberg also chipped in, boasting: "None of the [hacking] attempts against NATO have compromised our secure networks and none have affected our operations." The secretary-general, a one-time prime minister of Norway, ominously added that the 29-strong alliance must be "ready to use our cyber capabilities to fight an enemy" - though he later qualified this to mean in the same way that British hackers disrupted Islamic State extremists' propaganda channels during the ongoing war in Iraq and Syria.

British rhetoric is growing about the nation being increasingly willing to actively hack and damage other countries' cyber-infrastructure in retaliation for attacks on our own, or allied, infrastructure. With the general thrust of recent defence and foreign policy being to push Britain as a countering "force for good" against the traditional bogeyman of Russia, cyber warfare threats will be playing an increasingly larger role.

So far the UK has not admitted to actually using its hacking capabilities against another country. Only Islamic extremists in the Middle East have been publicly acknowledged as targets. 

The Register

You Might Also Read: 

NATO Agrees Collaboration On Cyber Security:

 

 

« Now Is Definitely Time To Check You Are GDPR Compliant
More Than 900 Million Financial Records Exposed »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

Oodrive

Oodrive

Oodrive is the first trusted European collaborative suite allowing users to collaborate, communicate and streamline business with transparent tools that ensure security.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

YorCyberSec

YorCyberSec

YorCyberSec act as a trusted Cyber and Information Security broker and procurement specialist. We help companies to Reduce Risk, Increase Assurance and Improve Performance.

Communications & Information Technology Regulatory Authority (CITRA)

Communications & Information Technology Regulatory Authority (CITRA)

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Roberts & Obradovic Law

Roberts & Obradovic Law

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

IBN Technologies

IBN Technologies

IBN Technologies offerings include customized, high-end Cloud Managed Services and Cyber Security Solutions tailored to companies with critical Internet components.