New UK Cyber Force Targets Terror Groups

A specialist cyber force of hackers who can target hostile states and terror groups is due to be launched later in the spring, after many months of delays and turf wars between the Ministry of Defence and GCHQ. The National Cyber Force, containing an estimated 500 specialists, has been in the works for two years but  after months of wrangling over the details, the specialist unit was close to being formally announced.

The American assassination of Iranian general Qassem Soleimani has added urgency to the progress of the specialist unit, amid risks of a cyber conflict that could affect the UK.

Therefore, the UK is keen to be seen as a “cyber power” able to disrupt against enemy states, targeting satellite, mobile and computer networks as well as trying to take down communications networks used by terror groups. The National Cyber Force is a joint initiative between the Ministry of Defence and GCHQ, and insiders said it would consolidate some existing capabilities as well as develop new ones.

Much of what the UK’s offensive hackers could do should remain classified and the identity of its leader is not expected to be publicly disclosed, although previous speculation that it would be a woman is understood to be inaccurate. However, officials are coy on details, arguing that much of what the UK’s offensive hackers could do should remain classified. Nor is the identity of its leader expected to be publicly disclosed, although previous speculation that it would be a woman is understood to be inaccurate.

Experts argue that the lack of clarity makes it difficult to discuss the appropriate limits of cyber warfare in a democracy and what sort of attacks or disruptive measures can be considered legitimate, particularly if there is a strong military dimension to its work.

James Sullivan, the head of cyber research at defence think-tank RUSI, said: “There has been limited public debate on the purpose and ethics of offensive cyber, the circumstances under which it might be used, and the kinds of effects that might and might not be acceptable.”

Avowed examples of British hacking are rare. Jeremy Fleming, GCHQ’s director, said that GCHQ conductied “a major offensive cyber campaign” against Isis, which he said “had significant success in suppressing propaganda, hindered their ability to coordinate attacks, and protected coalition forces on the battlefield”. 

Britain’s delayed efforts come on the heels of the US, which has been gradually acknowledging an expanded offensive cyber capability. Last summer, John Bolton, then US national security adviser, acknowledged that Washington was broadening its operations after President Trump relaxed restrictions.

The US also rarely acknowledges what its hackers do, although in one operation known as Synthetic Theology, the US Cyber Command jammed servers belonging to the Russian Internet Research Agency, in an apparent attempt to prevent Kremlin interference in the 2018 US mid-term elections.

A government spokesperson said the MoD and GCHQ “have a long and proud history of working together in the national interest and continue to tackle the real threats that the UK faces from a range of hostile actors”.

Around £76m is due to be invested in the force in the first year, with command and control shared between the MoD and the Government Communications Headquarters in Cheltenham. Recruitment is projected to take place from the armed forces and intelligence services, as well as academia and the private sector.

Silicon:     Guardian:        Independent:  

You Might Also Read:

The British Cyber Command:

Britain Is At Cyber War Every Day:

 

 

« Why 5G Is Going To Quickly Replace 4G
Cyber Attacks Predicted For 2020 Summer Olympics »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI)

Homeland Security Investigations (HSI) is a premier federal law enforcement agency within the Department of Homeland Security (DHS).

Oodrive

Oodrive

Oodrive is the first trusted European collaborative suite allowing users to collaborate, communicate and streamline business with transparent tools that ensure security.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

Featurespace

Featurespace

Featurespace is a world-leader in Adaptive Behavioural Analytics and creator of the ARIC platform for fraud and risk management.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

Security Alliance

Security Alliance

Security Alliance provide bespoke cyber intelligence consulting and research services.

Stanley Reid & Company (SRC)

Stanley Reid & Company (SRC)

Stanley Reid & Co is an Executive and Technical Search Firm serving the commercial market and the US Intelligence & Defense community. Our areas of expertise include Cybersecurity.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.

AKS iQ

AKS iQ

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.

Sattrix Information Security

Sattrix Information Security

Sattrix Information Security helps small, mid, and large enterprises in the area of digital transformation with a focus on information security.