The British Cyber Command

A new British combined specialist cyber unit the British National Cyber Force (NCF) will soon become operational with the aim to take offensive action to combat security threats, hacking, fake-news and election interference. The unit has been conceived as a joint initiative between the Ministry of Defence and the national signals intelligence agency GCHQ.

Currently these operations already employ over 500 personnel for the national offensive cyber programme. The new £250 million unit will comprise about 2,000 digital warriors, with experts recruited from the military, security services and industry. It will quadruple the number of personnel in offensive cyber-roles and marks a step change in the nation’s ability to disrupt and destroy computer networks and Internet-connected devices.

Now the UK is almost ready to wage cyber warfare against terrorist groups, hostile states and organised crime groups that are threats to the country.

The American assassination of Iranian general Qassem Soleimani has added urgency to the progress of the specialist unit, amid risks of a cyber conflict that could affect the UK. Currently there is no evidence of any Iranians plans to target the UK in response to the killing carried out by the US administration, although it is thought tht their militant groups may decide to carry out strikes autonomously.

The NCF is operated by the Ministry of Defence and GCHQ and will be the first organisation in Britain dedicated solely to offensive action against adversaries abroad. Around £76m is due to be invested in the force in the first year. and recruitment is projected to take place from the armed forces and intelligence services, as well as academia and the private sector.

The NCF will operate alongside the National Cyber Security Centre (NCSC), which primarily concentrates on defensive cyber activities to protect government departments, strategic infrastructure and industry. The need for an organisation such as the NCF has been increasingly recognised in security and military circles, due to the rapid rise of extremist propaganda, allegations of Russian interference in western elections and referendum campaigns, disinformation following the Salisbury poisoning, and attacks on public and private institutions by hacking gangs.

Iran was blamed in 2012 for targeting Wall Street banks with denial-of-service attacks, knocking their websites offline in retaliation against US sanctions. In 2015, Turkey blamed Tehran for cyberattacks that hit its electricity grid, shutting down power for 40 million people.

Two years ago, dozens of Westminster  parliamentary accounts were breached in attacks linked to Iran and throughout 2019 Tehran was blamed for data hacks of American businesses. The Iranian government has firmly denied the allegations.

The NCF is expected to expand its activities to crime networks involved in gun and drug smuggling, as well as people trafficking, which often augments the earnings of extremist groups.

Offensive cyber action had been carried out on an ad-hoc basis against Isis in Syria and Iraq. Setting up the NCF has been delayed, say western officials, by distractions caused by uncertainties over Brexit and frequent changes of ministers and secretaries of state in the MoD. 

Independent:         New Satesman:        ITPro:     The Times:      GCHQ:        FT.com:

You Might Also Read: 

Britain Is At Cyber War Every Day:

Cyber Soldiers: UK Announces Creation Of The 77th Battalion:

 

« 5G Will Reduce Car Accidents
Bigger Budgets For Cyber Security In 2020 »

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Deloitte

Deloitte

Deloitte consultancy areas include cyber risk which covers cyber security, information security, data privacy and protection.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

Brinqa

Brinqa

Brinqa is a leading provider of unified risk management and security analytics.to manage IT governance and technology risk.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

Cyan AG

Cyan AG

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

Red Points

Red Points

Red Points protects your brand and content in the digital environment.

Curv

Curv

Powered by groundbreaking cryptography, Curv mitigates the blockchain’s irreversible single point of failure by eliminating the concept of private keys and providing an enterprise-grade policy engine.