The British Cyber Command

A new British combined specialist cyber unit the British National Cyber Force (NCF) will soon become operational with the aim to take offensive action to combat security threats, hacking, fake-news and election interference. The unit has been conceived as a joint initiative between the Ministry of Defence and the national signals intelligence agency GCHQ.

Currently these operations already employ over 500 personnel for the national offensive cyber programme. The new £250 million unit will comprise about 2,000 digital warriors, with experts recruited from the military, security services and industry. It will quadruple the number of personnel in offensive cyber-roles and marks a step change in the nation’s ability to disrupt and destroy computer networks and Internet-connected devices.

Now the UK is almost ready to wage cyber warfare against terrorist groups, hostile states and organised crime groups that are threats to the country.

The American assassination of Iranian general Qassem Soleimani has added urgency to the progress of the specialist unit, amid risks of a cyber conflict that could affect the UK. Currently there is no evidence of any Iranians plans to target the UK in response to the killing carried out by the US administration, although it is thought tht their militant groups may decide to carry out strikes autonomously.

The NCF is operated by the Ministry of Defence and GCHQ and will be the first organisation in Britain dedicated solely to offensive action against adversaries abroad. Around £76m is due to be invested in the force in the first year. and recruitment is projected to take place from the armed forces and intelligence services, as well as academia and the private sector.

The NCF will operate alongside the National Cyber Security Centre (NCSC), which primarily concentrates on defensive cyber activities to protect government departments, strategic infrastructure and industry. The need for an organisation such as the NCF has been increasingly recognised in security and military circles, due to the rapid rise of extremist propaganda, allegations of Russian interference in western elections and referendum campaigns, disinformation following the Salisbury poisoning, and attacks on public and private institutions by hacking gangs.

Iran was blamed in 2012 for targeting Wall Street banks with denial-of-service attacks, knocking their websites offline in retaliation against US sanctions. In 2015, Turkey blamed Tehran for cyberattacks that hit its electricity grid, shutting down power for 40 million people.

Two years ago, dozens of Westminster  parliamentary accounts were breached in attacks linked to Iran and throughout 2019 Tehran was blamed for data hacks of American businesses. The Iranian government has firmly denied the allegations.

The NCF is expected to expand its activities to crime networks involved in gun and drug smuggling, as well as people trafficking, which often augments the earnings of extremist groups.

Offensive cyber action had been carried out on an ad-hoc basis against Isis in Syria and Iraq. Setting up the NCF has been delayed, say western officials, by distractions caused by uncertainties over Brexit and frequent changes of ministers and secretaries of state in the MoD. 

Independent:         New Satesman:        ITPro:     The Times:      GCHQ:        FT.com:

You Might Also Read: 

Britain Is At Cyber War Every Day:

Cyber Soldiers: UK Announces Creation Of The 77th Battalion:

 

« 5G Will Reduce Car Accidents
Bigger Budgets For Cyber Security In 2020 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

Entreda

Entreda

Entreda offers a unified platform to automate cybersecurity and compliance policy enforcement for your devices, users, networks, applications.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

CloudSphere

CloudSphere

CloudSphere’s flagship Cloud Governance Platform enables enterprises and cloud service providers to simplify and optimize cloud migration, management, and governance.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Support Link Technologies (SLT)

Support Link Technologies (SLT)

Support Link Technologies are an IT Solutions Company committed to achieving customer satisfaction through excellent customer service.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

Distology

Distology

Distology are an award-winning cloud security distributor bringing a wealth of experience and strong relationships with a huge breadth of partners covering the UK, Ireland and Benelux.

Seedcamp

Seedcamp

Seedcamp identify and invest early in world-class founders attacking large and global markets through disruptive technology in areas including AI, cybersecurity, and Fintech.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.