Paying For The UK’s Cyber War With Russia

The British government is expected to deny further funding to its Armed Forces, diverting the much-needed funds to cyber security measures that are likely to target Russia in a move that split Prime Minister Theresa May's Conservative Party.

A new report by the Telegraph newspaper has revealed that the latest National Security Review has delivered a striking blow to the British military, whilst allocating significant chunks of the budget to cyber warfare. 

The UK military establishment had hoped to evade the crippling cuts if the new Review would have recommended Theresa May channel some £2 billion to the Ministry of Defense (MoD) in order to fight terrorism more effectively and improve veteran care.

According to the Telegraph, however, those hopes are now shattered as National Security Advisor Mark Sedwill suggested that the money would be better spent on conducting cyber activities. The Review, which was ordered by British Prime Minister Theresa May after terrorist attacks in London and Manchester, has allegedly stated that the MoD will not receive any more funds over its annual budget of £36 billion and proposed additional cuts to military personnel.

Amongst suggestions being considered is the idea of sacking 1,000 Royal Marines, delaying the Royal Airforce's order for the F-35 fighters and dropping two Royal Navy ships.

The British Army is also expected to be gutted out as the number of servicemen may be reduced to less than 70,000 against the recommended target of 82,000 soldiers and officers. The proposals sent shock waves through the British Army, which is currently at its smallest in over 350 years, falling behind its target size by some 4,000 servicemen.

Disquiet in Conseravtive Ranks
Minister for Defence People and Veterans Tobias Ellwood threatened to resign if all Mark Sedwills proposals are adopted by the government. Nicholas Soames MP, the senior conservative and Winston Churchill's grandson, urged that "the Conservative party has a duty now to unite against further defence cuts to capability." 

The reason behind plans to boost the UK's cyber warfare capabilities is thought to be Theresa May's promise to wage a cyber campaign against Russia.

Speaking at the annual Lord Mayor's Banquet in London earlier this month the Prime Minister, accused Russia of a "sustained campaign of cyberespionage and disruption", that was "threatening the international order".  "So we will take the necessary actions to counter Russian activity," May proclaimed.

The Russian government has firmly denied these allegations, saying that it does not engage in offensive cyber activities and pointing to the lack of proof to that fact. 

Ein News

You Might Also Read:

Forget Trident & Welcome To Cyber Warfare:

Russia Attacked The UK & Faked Brexit Tweets:

Which Countries Are Ready For Cyberwar?:

Britain Bombarded With High Level Cyber Attacks:

Some Observations On Britain's New Cyber Security Strategy:

 

« What Is the Dark Web? Can You Access It?
NSA Employee Pleads Guilty To Stealing Classified Information »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Spambrella

Spambrella

Spambrella provides email security with real-time threat protection. 100% SaaS (nothing to install)

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

DataDome

DataDome

DataDome offers real-time AI protection against all OWASP automated threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

Basalt

Basalt

Basalt provide qualified consulting services in information security, personnel security and physical security.

Runtime Ventures

Runtime Ventures

Runtime Ventures focuses on seed and pre-seed stage cybersecurity investments. We love to work with ambitious founders building the future of the secure enterprise.