Britain to create 2,000-strong cyber force to tackle Russia threat
Britain is significantly increasing its ability to wage war in cyberspace with the creation of a new offensive cyber force of up to 2,000 personnel.
The plan by the Ministry of Defence and GCHQ comes amid a growing cyber threat from Russia and after the UK used cyber weapons for the first time to fight Islamic State.
The new force - expected to be announced soon - would represent a near four-fold increase in manpower focused on offensive cyber operations.
Made up of GCHQ officials, military personnel and contractors, it looks set to receive more than £250m in funding, according to one source.
A second source said that the figure would likely be higher.
General Sir Richard Barrons, a former commander of Joint Forces Command, which is responsible for military cyber, said enhancing the UK's ability to launch cyber attacks is paramount at a time when countries such as Russia are already on the offensive.
"By adopting offensive cyber techniques in the UK we are levelling the playing field and providing new means of both deterring and punishing states that wish to do us harm," he said.
The US-led campaign against IS in Iraq and Syria demonstrates the growing importance of cyber warfare in modern-day conflict.
Interviews with several former and serving security and military officers reveal:
- David Cameron, as prime minister, instructed his spy agencies and the armed forces at the start of 2016 to go after the IS media machine behind a series of gruesome online beheading videos of hostages, slick online magazines and a huge volume of other propaganda used to draw new recruits and incite violence.
- Britain, the United States and allies launched a series of secret cyber operations, including one called Glowing Symphony. They used malware to block access to data, placed fake stories to create confusion and deleted large volumes of material. IS financing was also targeted.
- GCHQ worked with special forces to deploy cyber attacks from laptops and handheld devices against IS commanders in Iraq and Syria to jam their ability to communicate electronically and to spoof them into running into real-world traps by feeding false instructions over the internet. "It was very effective," a source said.
Details of the UK's ongoing cyber mission against IS - conducted in close coordination with the United States, Australia and other members of the "five eyes" intelligence community - are highly classified.
In a rare public acknowledgement, Jeremy Fleming, the director of GCHQ, spoke about the impact his agency and the MoD were having against the terrorist group earlier this year.
"These operations have made a significant contribution to coalition efforts to suppress Daesh [IS] propaganda, hindered their ability to co-ordinate attacks, and protected coalition forces on the battlefield," Mr Fleming said.
The United States has avowed its part in the Glowing Symphony offensive from November 2016 into early 2017 - an operation that Britain played an equal but until today unacknowledged role in.
This was only one element of a much wider online offensive.
"It was a small example of the kind of destructive things you can do to disrupt, and stop them distributing propaganda material," one security source said.
The mission has reduced the volume and quality of IS propaganda on the internet.
Analysts point to the disappearance of an online magazine, originally called Dabiq and then renamed Rumiyah, that was produced by IS every month.
The quality of the content eroded from 2016, according to Charlie Winter, a senior research fellow at the International Centre for the Study of Radicalisation and Political Violence.
Spoof versions of the magazine also emerged in what might have been part of the cyber offensive. A final version of Rumiyah was published a year ago.
The UK-end of the cyber mission against IS is run out of GCHQ's headquarters in Cheltenham and the military's permanent joint headquarters in Northwood.
The new joint cyber force will be established at a separate location that has yet to be agreed upon. Another detail still to be hammered out is selecting who will run it.
One suggestion is for the military and GCHQ to take it in turns, with one organisation fielding the chief and the other fielding the deputy for one term and then switching.
The online campaign against IS is one element in a much broader, covert offensive that was just as important at dismantling the so-called caliphate in Iraq and Syria as the bombs and bullets, according to military and security officials who were involved.
This included disrupting IS funding and logistics to make it harder for the group to pay its fighters and supply them with weapons, ammunition, food and other supplies.
Source: skynews
Industry: Cyber Security news
Latest Jobs
-
- Senior Client Microsoft Security Delivery Consultant - Hybrid (London | Remote)
- London
- N/A
-
Senior Client Microsoft Security Delivery Consultant - Hybrid (London | Remote) We are seeking an experienced technical Security Consultant to help clients deploy and enhance their cyber defences across Microsoft and vulnerability management technologies. You will work with enterprise customers to deliver tailored solutions across threat detection, endpoint protection and exposure management, ensuring security platforms are efficient, integrated and aligned with operational goals. Whilst you won't do the design yourself- you will work alongside technical Presales to document, agree and then deliver the solution. You will have experience leading delivery the implementation and improvement projects, providing hands-on support with configuration, integration and optimisation. You will assess existing environments, recommend enhancements and guide clients on best practice to strengthen visibility and control. Strong experience with SIEM, XDR and vulnerability tooling (Microsoft & Tenable ecosystems ideal) Understanding of Azure security, identity and access controls Background in consulting or project-based cyber delivery Clear communication skills with the ability to engage senior stakeholders Extra points if you have the SC-100. You must be eligible to achieve UK Security Clearance to be considered for this role.
-
- Account Director | Cyber Security Consulting | UK - South East
- London
- N/A
-
Account Director | Cyber Security Consulting - Financial Services | UK - South East. New Role due to Growth We are looking for an experienced Account Director to develop and expand existing relationships across the financial services sector, working with investment firms, asset managers, private equity groups and strategic partners to deliver intelligent cyber consulting and a bespoke Cyber product offerings. You will act as a trusted advisor, helping organisations strengthen digital resilience, manage third-party and regulatory risk and adopt a proactive approach to cyber assurance. Key Responsibilities Manage a defined portfolio of financial clients, understanding business priorities and aligning tailored cyber solutions. Drive new client engagement while nurturing existing partnerships through a consultative, long-term approach. Present the benefits of advanced cyber services including threat intelligence, vulnerability management, incident readiness, and continuous risk monitoring. Collaborate with technical and delivery teams to ensure smooth engagement from proposal through to implementation and ongoing support. Prepare proposals, negotiate commercial terms, and clearly articulate value and business outcomes. Build trusted relationships at senior and board level. Ideal Profile Strong background in cybersecurity, consulting, or risk management within financial services. Skilled communicator with proven success managing and growing key accounts. Able to translate complex technical insight into commercial and strategic value for clients. Confident engaging with senior stakeholders and decision makers. Please note: Sponsorship is not available.
-
- SOC Analyst- Level 2- Hybrid Greater London
- London
- N/A
-
SOC Analyst- Level 2- Hybrid Greater London New opportunity created through continued growth. We’re looking for a SOC Analyst (Level 2) to strengthen a growing managed security team. You’ll work hands-on with Microsoft Sentinel and Defender XDR, investigating alerts, responding to incidents, and helping improve how clients stay protected. This role is ideal for someone who enjoys unravelling security events, thinking critically under pressure, and making a real difference day to day. What you’ll do · Investigate and respond to security activity across SIEM and endpoint tools · Analyse network and log data to uncover real threats · Support automation initiatives to streamline response processes · Help maintain visibility, data flow, and performance across SOC platforms What you’ll need · Practical experience using Microsoft Sentinel and Defender XDR · Confident working with KQL or similar query languages · Understanding of attacker tactics and response techniques · SC-200 certifications would be nice. · Experience supporting multiple customer environments Please note: Sponsorship is not available.
-
- Senior SOC Engineer - UK - New role due to growth
- London
- N/A
-
Senior SOC Engineer – New role due to growth We are hiring a Senior SOC Engineer to take the lead across security operations for a growing managed service. You will lead detection, response and onboarding activity across multiple clients, helping shape how the SOC evolves. Expect variety; from fine-tuning alerts and threat hunting to supporting customers and mentoring junior analysts. What you’ll bring · Strong experience across SIEM, EDR, and threat detection tools · Confident working with customers in a managed service environment · Skilled in scripting or query languages such as KQL or PowerShell · Knowledge of frameworks like NIST, ISO27001, MITRE ATT&CK · Calm communicator with a problem-solving mindset · Experience with Azure Lighthouse or delegated access models · Prior involvement in automation or SOC improvement projects Location: South East England- Hybrid role Please note: Sponsorship cannot be offered now or in the future.