Britain to create 2,000-strong cyber force to tackle Russia threat
Britain is significantly increasing its ability to wage war in cyberspace with the creation of a new offensive cyber force of up to 2,000 personnel.
The plan by the Ministry of Defence and GCHQ comes amid a growing cyber threat from Russia and after the UK used cyber weapons for the first time to fight Islamic State.
The new force - expected to be announced soon - would represent a near four-fold increase in manpower focused on offensive cyber operations.
Made up of GCHQ officials, military personnel and contractors, it looks set to receive more than £250m in funding, according to one source.
A second source said that the figure would likely be higher.
General Sir Richard Barrons, a former commander of Joint Forces Command, which is responsible for military cyber, said enhancing the UK's ability to launch cyber attacks is paramount at a time when countries such as Russia are already on the offensive.
"By adopting offensive cyber techniques in the UK we are levelling the playing field and providing new means of both deterring and punishing states that wish to do us harm," he said.
The US-led campaign against IS in Iraq and Syria demonstrates the growing importance of cyber warfare in modern-day conflict.
Interviews with several former and serving security and military officers reveal:
- David Cameron, as prime minister, instructed his spy agencies and the armed forces at the start of 2016 to go after the IS media machine behind a series of gruesome online beheading videos of hostages, slick online magazines and a huge volume of other propaganda used to draw new recruits and incite violence.
- Britain, the United States and allies launched a series of secret cyber operations, including one called Glowing Symphony. They used malware to block access to data, placed fake stories to create confusion and deleted large volumes of material. IS financing was also targeted.
- GCHQ worked with special forces to deploy cyber attacks from laptops and handheld devices against IS commanders in Iraq and Syria to jam their ability to communicate electronically and to spoof them into running into real-world traps by feeding false instructions over the internet. "It was very effective," a source said.
Details of the UK's ongoing cyber mission against IS - conducted in close coordination with the United States, Australia and other members of the "five eyes" intelligence community - are highly classified.
In a rare public acknowledgement, Jeremy Fleming, the director of GCHQ, spoke about the impact his agency and the MoD were having against the terrorist group earlier this year.
"These operations have made a significant contribution to coalition efforts to suppress Daesh [IS] propaganda, hindered their ability to co-ordinate attacks, and protected coalition forces on the battlefield," Mr Fleming said.
The United States has avowed its part in the Glowing Symphony offensive from November 2016 into early 2017 - an operation that Britain played an equal but until today unacknowledged role in.
This was only one element of a much wider online offensive.
"It was a small example of the kind of destructive things you can do to disrupt, and stop them distributing propaganda material," one security source said.
The mission has reduced the volume and quality of IS propaganda on the internet.
Analysts point to the disappearance of an online magazine, originally called Dabiq and then renamed Rumiyah, that was produced by IS every month.
The quality of the content eroded from 2016, according to Charlie Winter, a senior research fellow at the International Centre for the Study of Radicalisation and Political Violence.
Spoof versions of the magazine also emerged in what might have been part of the cyber offensive. A final version of Rumiyah was published a year ago.
The UK-end of the cyber mission against IS is run out of GCHQ's headquarters in Cheltenham and the military's permanent joint headquarters in Northwood.
The new joint cyber force will be established at a separate location that has yet to be agreed upon. Another detail still to be hammered out is selecting who will run it.
One suggestion is for the military and GCHQ to take it in turns, with one organisation fielding the chief and the other fielding the deputy for one term and then switching.
The online campaign against IS is one element in a much broader, covert offensive that was just as important at dismantling the so-called caliphate in Iraq and Syria as the bombs and bullets, according to military and security officials who were involved.
This included disrupting IS funding and logistics to make it harder for the group to pay its fighters and supply them with weapons, ammunition, food and other supplies.
Industry: Cyber Security news
- Cyber Incident Response Consultant (DFIR)
- Up to £70,000 Base
Cyber Incident Response Consultant (DFIR) is needed to join a global consultancy to focus on leading the Incident response capability in the UK. The team are actively growing, are globally recognised and work on varied, high profile and interesting projects. Given the nature of the role, this individual must be available and happy to travel. The Cyber Incident Response Consultant (DFIR) will have a blend of technical hands-on and client-facing consultancy. Any mentorship experience is always desirable. In-depth technical experience is a must; specific experience working with clients in the ‘eye of the storm’ of an incident is essential. APT, active threat hunting, IR triage/planning experience is critical. Just as important is the ability to coordinate the response across multiple client stakeholders, team members and other team members; such as Legal, PR. It is essential that the Cyber Incident Response Consultant (DFIR) is able to identify, scope, manage, remediate/eradicate the threat for the clients. Any previous experience in identifying and generating revenue is obviously valued, but not essential. A broad forensic background would be highly desirable also. An ideal candidate will be CREST CCIR, CCIM certified, Key attributes should also include; stakeholder engagement, mentoring of team members, a collaborative working style. Technical experience must include; demonstrable experience within cyber incident response, Forensic, cyber etc. Additional certifications could / should include GIAC certified (Intrusion analyst, incident handler, forensic handler) Career development and the opportunity to influence, apply today for more information or call Chris Holt on 07884666351 email@example.com Ref CH7625 Candidates must be UK Based. Sponsorship is not available for Non-Eu Candidates.
- Director of Sales Engineering
- Up to €110,000 plus bonus and benefits
Location: Paris Salary Upto €110,000 plus bonus and benefits Reference: RA 7382 Director of Sales Engineering This rapidly expanding Cloud Service company are looking for an experience Director of Sale Engineering (Pre sales), to help them expand both their customer base and also their sales engineering team, You will be responsible for managing a team spread across Europe, (France, Germany and UK currently 6) Your responsibilities will include : Organising and monitoring your pre-sales team activity in coordination with your management. Building and managing a pan European team. Making sure your team members are on track with company or individual KPIs. Managing your own set of customer/proposal Coordinating closely with Sales – you will work alongside Account Managers, serving as a technical lead for more standard solutions development. Assigning required resources to the Complex Solution team when required by your management. Working closely with the engineering and product teams to provide customer and market feedback Participating in the planning and execution of various partners facing activities. The role may include actively driving presentations creation or delivery, and general networking activities. As well as previous experience in leading a sales engineering/ presales team you will require both Telecommunications (MPLS, Ethernet,) and Cloud platforms (Azure, Aws, Oracle etc) knowledge.
- Product Manager - Access Controls
- £50,000 - £90,000
An Identity and Access Controls vendor are currently looking to bring on board an exceptional Product Manager with recent exposure around Access Controls and Identity Management. The particular portfolio this person would be responsible for is their Events and transportation Access controls solutions. Managing and overseeing Configuration and implementations of these solutions. The Product Manager would need previous experience within a similar product suite, particularly around Access Controls/ Identity & Access Management delivery programmes. Project size will vary from £200,000 to larger multi-million pounds, so someone with experience managing these sizes of projects is key. This will be a client facing position, so someone with strong customer engagement skills, and the willingness to travel will be essential. If you have any project management certifications, for example Prince2 Practitioner, This will be hugely advantageous. Due to some of the Engineering team being based in Italy, Someone with strong Italian speaking and listening skills will be a front runner, but this is not an essential skill. Unfortunately sponsorship can't be provided to non-eu candidates TC7774 Salary: £50,000 - £90,000 Location: London with travel Cyber Security Jobs | Information Security Jobs | Access Controls Jobs | IDAM Jobs | IAM Jobs | Identity And Access Management Jobs
- CyberArk Specialist
- Up to £90,000
We are currently working with an International Outsourcing business who are looking for a CyberArk Specialist to assist with a large scale Identity and Access Management rollout across large Financial institutions. This business is at the forefront of the financial services market, working alongside some of the largest banks globally, so this will be a great chance to be a key figure in large digital transformation projects. The CyberArk Specialist responsibilities for this role will to be the lead in the Configuration and Design of a Large Privileged Access Management rollout of the CyberArk suite. Solutions Design Client Engagement Liaison between the business and Technical teams If you have strong hands on CyberArk exposure and are looking to move into more of a Business led programme, this is a great opportunity to make that transition. The CyberArk Specialist will be mostly spent on client site, which is based in London. So the right individual will be commutable into Central London. Candidates must be based in the UK. Sponsorship can't be provided to non-eu applicants Salary: £Up to 90,000 Location: London REF: TC7773 CyberArk Jobs | Information Security Jobs | Cyber Security Jobs | IDAM Jobs | IAM Joba | Identity and Access Management Jobs