Online Book Reader

Home Category

Inside Cyber Warfare - Jeffrey Carr [156]

By Root 1226 0
in the office of the General Staff. The entire command, modeled largely after the United States’ Cyber Command, has experienced major delays due to organizational issues. The current established team has eight computer engineers with specialized cyber security training.[201]

* * *

[199] “Turkey conducts cyber terror drill,” Hurriyet Daily News, January 27, 2011, accessed August 31, 2011, http://www.hurriyetdailynews.com/n.php?n=turkey-conducts-cyber-terror-drill-2011-01-27.

[200] Giles Tremlett, “Turkish arrests intensify global war between hacker activists and police,” The Guardian, June 13, 2011, accessed August 31, 2011, http://www.guardian.co.uk/technology/2011/jun/13/turkish-arrests-global-war-hackers-police.

[201] Umit Enginsoy and Burak Ege Bekdil, “Turkey Raises Emphasis On Cyberspace Defense,” Defense News, August 15, 2011, accessed August 31, 2011, http://www.defensenews.com/story.php?i=7388376&c=FEA&s=SPE.

United Kingdom


The UK published a wider National Security Strategy in 2009 and along with that came a specific cyber security strategy.[202] This strategy was aimed at combating cyber attacks from countries—the Russian and Chinese governments were mentioned specifically. The strategy also appointed Lord West as the UK’s first cyber security minister. Lord West mentioned that the government had recruited a team of hackers for the new Cyber Security Operations Centre, located at the GCHQ in Cheltenham. He also commented that the UK will recruit former illegal hackers and “naughty boys,” as they often seem to enjoy stopping other illegal hackers. Offensive capabilities were also signified as priority as a result of state actor threats being the UK’s primary cyber concern.

In October 2010 the Strategic Defense and Security Review (SDSR) readdressed much of the cyber issues that the 2009 National Security Strategy highlighted. Much more funding was allocated to cyber security, and cyber threats were given priority access to the prime minister’s desk, alongside terrorism, natural disasters, and hostile military attacks.[203] In addition, several changes to the cyber security structure were implemented.

The UK Defense Cyber Operations Group (DCOG) was created and will work with the Ministry of Defense. UK intelligence agencies were instructed to share intelligence on cyber security. A cyber infrastructure team in the Department of Business, Innovation and Skills (BIS) was set up for coordinating security efforts with critical industries. An Infrastructure Security and Resilience Advisory Council was also set up to create a closer relationship between private sector infrastructure providers and the government.[204]

Recently, the SDSR planned for an increase in cyber warfare troops, which started to take shape in 2011. In May 2011 a Ministry of Defense (MoD) spokesman said there are plans to “significantly grow the number of dedicated cyber experts in the MoD, and the number will be in the hundreds but precise details are classified.”[205] The UK is expected to develop a first-strike capability in the Ministry of Defense’s cyber division. The cyber division doctrine will probably be covert in nature, similar to those of the Special Air Service forces, but will follow strict guidelines involving collateral damage.[206]

* * *

[202] Gordan Corera, “UK ‘has cyber attack capability’,” BBC News, June 25, 2009, http://news.bbc.co.uk/2/hi/uk_news/politics/8118729.stm.

[203] Derek Parkinson, “Funding the new Home Guard to protect against cyber attacks,” SC Magazine UK, January 3, 2011, http://www.scmagazineuk.com/funding-the-new-home-guard-to-protect-against-cyber-attacks/article/192648/.

[204] Ibid.

[205] “UK beefs up cyber warfare plans,” BBC News, May 31, 2011, http://www.bbc.co.uk/news/technology-13599916.

[206] Nick Hopkins, “UK developing cyber-weapons programme to counter cyber war threat,” The Guardian, May 30, 2011, http://www.guardian.co.uk/uk/2011/may/30/military-cyberwar-offensive.

Chapter 17. US Department of Defense Cyber Command and Organizational Structure


Some of the information

Return Main Page Previous Page Next Page

®Online Book Reader