The British Cyber Command

A new British combined specialist cyber unit the British National Cyber Force (NCF) will soon become operational with the aim to take offensive action to combat security threats, hacking, fake-news and election interference. The unit has been conceived as a joint initiative between the Ministry of Defence and the national signals intelligence agency GCHQ.

Currently these operations already employ over 500 personnel for the national offensive cyber programme. The new £250 million unit will comprise about 2,000 digital warriors, with experts recruited from the military, security services and industry. It will quadruple the number of personnel in offensive cyber-roles and marks a step change in the nation’s ability to disrupt and destroy computer networks and Internet-connected devices.

Now the UK is almost ready to wage cyber warfare against terrorist groups, hostile states and organised crime groups that are threats to the country.

The American assassination of Iranian general Qassem Soleimani has added urgency to the progress of the specialist unit, amid risks of a cyber conflict that could affect the UK. Currently there is no evidence of any Iranians plans to target the UK in response to the killing carried out by the US administration, although it is thought tht their militant groups may decide to carry out strikes autonomously.

The NCF is operated by the Ministry of Defence and GCHQ and will be the first organisation in Britain dedicated solely to offensive action against adversaries abroad. Around £76m is due to be invested in the force in the first year. and recruitment is projected to take place from the armed forces and intelligence services, as well as academia and the private sector.

The NCF will operate alongside the National Cyber Security Centre (NCSC), which primarily concentrates on defensive cyber activities to protect government departments, strategic infrastructure and industry. The need for an organisation such as the NCF has been increasingly recognised in security and military circles, due to the rapid rise of extremist propaganda, allegations of Russian interference in western elections and referendum campaigns, disinformation following the Salisbury poisoning, and attacks on public and private institutions by hacking gangs.

Iran was blamed in 2012 for targeting Wall Street banks with denial-of-service attacks, knocking their websites offline in retaliation against US sanctions. In 2015, Turkey blamed Tehran for cyberattacks that hit its electricity grid, shutting down power for 40 million people.

Two years ago, dozens of Westminster  parliamentary accounts were breached in attacks linked to Iran and throughout 2019 Tehran was blamed for data hacks of American businesses. The Iranian government has firmly denied the allegations.

The NCF is expected to expand its activities to crime networks involved in gun and drug smuggling, as well as people trafficking, which often augments the earnings of extremist groups.

Offensive cyber action had been carried out on an ad-hoc basis against Isis in Syria and Iraq. Setting up the NCF has been delayed, say western officials, by distractions caused by uncertainties over Brexit and frequent changes of ministers and secretaries of state in the MoD. 

Independent:         New Satesman:        ITPro:     The Times:      GCHQ:        FT.com:

You Might Also Read: 

Britain Is At Cyber War Every Day:

Cyber Soldiers: UK Announces Creation Of The 77th Battalion:

 

« 5G Will Reduce Car Accidents
Bigger Budgets For Cyber Security In 2020 »

Perimeter 81

Directory of Suppliers

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Centre for Secure Information Technologies (CSIT)

Centre for Secure Information Technologies (CSIT)

CSIT is a UK Innovation and Knowledge Centre (IKC) for secure information technologies. Our vision is to be a global innovation hub for cyber security.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

Cyber Risk Agency

Cyber Risk Agency

Cyber Risk Agency is a cybersecurity consulting firm specializing in managing cyber risks for SMEs.

Flowmon Networks

Flowmon Networks

Flowmon provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.