Cyber Soldiers: UK Announces Creation Of The 77th Battalion

The documents leaked by Edward Snowden demonstrate that the NSA and its allies are now preparing for future dominance in cyberspace.

Cyberspace is a strategic domain for modern warfare, for this reason, the British Government has decided to create a new cyber unit composed of cyber experts, so-called "Facebook Warriors", which will "wage complex and covert information and subversion campaigns".

According to the Financial Times, the new cyber unit will be named the 77th battalion due to a historical significance.

"The original Chindits [77th battalion] were a guerrilla unit led by the swashbuckling British commander Major General Orde Wingate, one of the pioneers of modern unconventional warfare. They operated deep behind Japanese lines in Burma between 1942 and 1945 and their missions were often of questionable success." reported the Financial Times.

The group will use social networks like Facebook and Twitter to monitor their opponents, the information they produce and to run PSYOPs.

The British army will assign more than 1,500 specialists to the new troop that will use popular social networks to spread disinformation, run intelligence operations and disclose real war truths.

The 77th battalion will reportedly begin its activity in April 2015. The decision of the British Government to create the 77th battalion cyber unit follows a similar initiative of other governments that are using social networks to run cyber espionage campaigns, spread disinformation or influence the human sentiment about specific topics.

As reported by the Guardian, both the Israeli and US army have already dedicated internal staff to psychological operations run through social networks. An Israel Defense Force spokesperson revealed that the IDF used 30 different social media sites in several different languages during Operation Cast Lead in an effort to "engage with an audience we otherwise wouldn't reach."

Security Affairs: 

 

« Dramatic Improvement in Intelligence Sharing Because of ISIS
Android malware fakes phone shutdown then steals data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

Clavis Information Security

Clavis Information Security

Clavis is an Information Security company offering a complete portfolio of solutions from Pentesting and Security Assessments to Managed Security Services and Training.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

Securden

Securden

Securden provide an all-in-one Platform for Next-Gen Privileged Access Governance, helping you to prevent identity thefts, malware propagation, cyber attacks, and insider exploitation.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

Vanta

Vanta

Vanta helps companies scale security practices and automate compliance for the industry’s most sought after standards - SOC 2, ISO 27001, HIPAA, GDPR, and other security and privacy frameworks.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

EPIQ Infotech

EPIQ Infotech

EPIQ Infotech is a trusted consulting and implementation partner for Oracle JD Edwards and Amazon Web Services (AWS).

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.