Stories
Slash Boxes
Comments

SoylentNews is people

posted by takyon on Wednesday June 28 2017, @05:41PM   Printer-friendly
from the two-rockets-of-hate dept.

Although "offensive cyber" seems to have a different definition to my re-collection, Britain's Defence Secretary, Sir Michael Fallon, gave a speech at Cyber 2017 outlining how the Ministry of Defence is tackling today's cyber threats:

A stronger password here, a Windows update there, and we would have stood an even better chance of warding off the Parliamentary and Wannacry attacks. So my second point is that the MOD has a key role to play in contributing to a culture of resilience. That's why we set up the Defence Cyber Partnership Programme (DCPP) to ensure that companies with whom we have defence contracts are properly protecting themselves and meeting a host of cyber security standards.

Strengthening our deterrence

But there's a third way in which we can protect our national infrastructure, and that's by strengthening our deterrence. So we're using our rising budget to invest our £178bn in full spectrum capability, from carriers to Ajax armoured vehicles, fifth generation F35 to the latest UAVs, signalling to potential cyber strikers that the price of an online attack could invite a response from any domain, air, land, sea or cyber space. And when it comes to the latter, we're making sure that offensive cyber is now an integral part of our arsenal. We now have the skills to expose cyber criminals, to them hunt down and to prosecute them, to respond in kind to any assault at a time of our choosing.

Our National Offensive Cyber Planning allows us to integrate cyber into all our military operations. And I can confirm that we are now using offensive cyber routinely in the war against Daesh, not only in Iraq but also in the campaign to liberate Raqqa and other towns on the Euphrates. Offensive cyber there is already beginning to have a major effect on degrading Daesh's capabilities.

Unfortunately, the Vault7 leaks show that at least one nation-state believes it is able to imitate attacks from other nation-states:

What was once conspiracy is now fact, as it appears the CIA has essentially developed their own NSA without the oversight. Under the Center for Cyber Intelligence (CCI), over 5,000 hackers have produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware targeting everything from anti-virus software to commonly used consumer devices. This includes malware which makes it look like it was planted by a foreign government or hacker. This includes Russia, essentially proving the CIA has the ability to plant evidence to make it look like Russian hackers were the culprits. This potentially disrupts and discredits the entire Russia hacking narrative being pushed by the media.

So, under Britain's official foreign policy, when a country has sustained attacks or just a flaky infrastructure, that's sufficient justification to bomb a random country rather than attack the wrong computers. After Iraq was bombed for having Weapons of Mass Distraction and bombed again due to Saudi Arabian terrorists, will North Korea get bombed due to NHS failure?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Wednesday June 28 2017, @06:12PM (1 child)

    by Anonymous Coward on Wednesday June 28 2017, @06:12PM (#532550)

    The Fifth of November is only 130 days away.

  • (Score: 2) by takyon on Wednesday June 28 2017, @06:20PM

    by takyon (881) <{takyon} {at} {soylentnews.org}> on Wednesday June 28 2017, @06:20PM (#532554) Journal

    It will be extra fun to celebrate a failed "terrorist" plot this year.

    --
    [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]