The British Cyber Command

A new British combined specialist cyber unit the British National Cyber Force (NCF) will soon become operational with the aim to take offensive action to combat security threats, hacking, fake-news and election interference. The unit has been conceived as a joint initiative between the Ministry of Defence and the national signals intelligence agency GCHQ.

Currently these operations already employ over 500 personnel for the national offensive cyber programme. The new £250 million unit will comprise about 2,000 digital warriors, with experts recruited from the military, security services and industry. It will quadruple the number of personnel in offensive cyber-roles and marks a step change in the nation’s ability to disrupt and destroy computer networks and Internet-connected devices.

Now the UK is almost ready to wage cyber warfare against terrorist groups, hostile states and organised crime groups that are threats to the country.

The American assassination of Iranian general Qassem Soleimani has added urgency to the progress of the specialist unit, amid risks of a cyber conflict that could affect the UK. Currently there is no evidence of any Iranians plans to target the UK in response to the killing carried out by the US administration, although it is thought tht their militant groups may decide to carry out strikes autonomously.

The NCF is operated by the Ministry of Defence and GCHQ and will be the first organisation in Britain dedicated solely to offensive action against adversaries abroad. Around £76m is due to be invested in the force in the first year. and recruitment is projected to take place from the armed forces and intelligence services, as well as academia and the private sector.

The NCF will operate alongside the National Cyber Security Centre (NCSC), which primarily concentrates on defensive cyber activities to protect government departments, strategic infrastructure and industry. The need for an organisation such as the NCF has been increasingly recognised in security and military circles, due to the rapid rise of extremist propaganda, allegations of Russian interference in western elections and referendum campaigns, disinformation following the Salisbury poisoning, and attacks on public and private institutions by hacking gangs.

Iran was blamed in 2012 for targeting Wall Street banks with denial-of-service attacks, knocking their websites offline in retaliation against US sanctions. In 2015, Turkey blamed Tehran for cyberattacks that hit its electricity grid, shutting down power for 40 million people.

Two years ago, dozens of Westminster  parliamentary accounts were breached in attacks linked to Iran and throughout 2019 Tehran was blamed for data hacks of American businesses. The Iranian government has firmly denied the allegations.

The NCF is expected to expand its activities to crime networks involved in gun and drug smuggling, as well as people trafficking, which often augments the earnings of extremist groups.

Offensive cyber action had been carried out on an ad-hoc basis against Isis in Syria and Iraq. Setting up the NCF has been delayed, say western officials, by distractions caused by uncertainties over Brexit and frequent changes of ministers and secretaries of state in the MoD. 

Independent:         New Satesman:        ITPro:     The Times:      GCHQ:        FT.com:

You Might Also Read: 

Britain Is At Cyber War Every Day:

Cyber Soldiers: UK Announces Creation Of The 77th Battalion:

 

« 5G Will Reduce Car Accidents
Bigger Budgets For Cyber Security In 2020 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance is a nonprofit, nonpartisan collaboration of individuals, businesses, government entities, and professionals advocating for more effective cyber security solutions.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

VulnCheck

VulnCheck

VulnCheck helps organizations outpace adversaries with vulnerability intelligence that predicts avenues of attack with speed and accuracy.

Foghorn Consulting

Foghorn Consulting

Foghorn can analyze your cloud to enhance performance and security, while reducing costs. Based on AWS’ 6 Pillars, our AWS WAFR Certified Engineers Will Identify Areas of Improvement.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.