Britain's Cyber Force Toughens Up

Britain's new National Cyber Force (NCF) will be deployed to ‘detect, disrupt and deter’ adversaries and will feature among a number of ‘priority actions’ contained in a new fully-formed cyber strategy, to be published soon, according to Prime Minister Boris Johnson.  
 
A ‘cyber corridor’ in the north of England is set to become home of to the NCF, as Britain transitions towards more of an offensive security posture against terrorists, hostile states and criminal gangs. 
 
The location of the NCF is a key element of the plans with the government hoping to drive further growth in the digital tech and defence sectors outside of London and foster wider government partnerships within the industry and universities around the region.
 
The NCF is recruiting through existing members of the armed forces and from GCHQ, MI6 and also the Defence Science and Technology Laboratory.  MI6 officers might be involved if activity is taking place overseas or to work on the human aspect of an operation. The ambition is to grow the force to about 3,000 in the next decade. 

The UK is committed to using its cyber capabilities in a responsible way and in line with British and international law.  

Past and future cyber operations have and will continue to operate under existing laws, including those granted by the relevant legislation in the Intelligence Services Act and the Investigatory Powers Act. This ensures UK cyber operations are responsible, targeted and proportionate, unlike those of some of our adversaries.
 
The National Cyber Security Centre, which is part of the GCHQ spy agency, was first established in 2016 to help critical organisations, businesses and the general public protect themselves. However the change in tack is in line with an upsurge of global ransomware and espionage attacks carried out in recent years, which have disrupted businesses and life in the UK.
A new cyber strategy will be announced to create a cyber ecosystem fit for the future
 
The NCF was created last year to transform the UK’s capacity to conduct targeted offensive cyber operations against terrorists, hostile states and criminal gangs. It draws together personnel from both defence and the intelligence agencies under one unified command for the first time. The kinds of operations the NCF is able to carry out include:  
 
  • Interfering with a mobile phone to prevent a terrorist being able to communicate with their contacts
  • Helping to prevent cyberspace from being used as a global platform for serious crimes, including the sexual abuse of children
  • Keeping UK military aircraft safe from targeting by weapons systems
The Government’s new cyber strategy is intended to  support companies developing dual-use and consumer technology to ensure the UK is a cyber power in every sense.
 
GCHQ:         GovUK:       BBC:           ITPro:         Global Risks Insights:         I-HLS:
 
You Might Also Read: 
 
Britain Will Build Up Its Military Cyber Capabilities:
 
« 2021 Blockchain Trends
Secure Your Personal Email & Social Media Accounts »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Arcitura Education

Arcitura Education

Arcitura is a leading global provider of progressive, vendor-neutral IT training and certification programs.

Veridify Security

Veridify Security

Veridify Security (formerly SecureRF), develops and licenses quantum-resistant, public-key security tools for the low-resource processors powering the Internet of Things.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

Bolton Labs

Bolton Labs

Bolton Labs is a leading provider cybersecurity services, tools, and analysis for MSPs and organizations who want to scale their security offerings.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

SoftLock

SoftLock

Softlock is a regional leader in Information Security providing solutions, consulting, integration and testing services to protect information assets, identities and supporting infrastructure.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

OriginalMy

OriginalMy

OriginalMy is a cybersecurity startup, focussed on digital governance and information authentication. Its mission is to prove authenticity using state-of-the-art cryptography and blockchain technology

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Persona Identities

Persona Identities

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

Cypherleak

Cypherleak

Cypherleak provide Automated Cyber Risk Monitoring & Ai powered cyber recommendations.

United Nations Office of Counter-Terrorism (UNOCT)

United Nations Office of Counter-Terrorism (UNOCT)

UNOCT provides UN Member States with the necessary policy support of the UN Global Counter-Terrorism Strategy, and wherever necessary, expedites delivery of technical assistance.