http://www.myspace.com/dhlxstudios
A NEW breed of soldier is emerging in the British Army. Equipped with the latest computer know-how rather than machine guns and grenades, these techno troops are taking the fight to Britain’s digital enemies – sparring with smartphones and repelling rogue emails.
They are part of the MoD’s growing team of cyber warriors – personnel who are trained to defend the multi-billion pound computer and telephone networks that underpin the UK’s military operations.
Among the hundreds of digital defence staff working at the department’s round-the-clock Global Operation Security and Control Centre (GOSCC) are Royal Signals soldiers.
Along with troops from the other two Services, they use their expertise on a futuristic front line that is regularly under attack from enemy forces.
SSgt Martin Bentley is part of the Computer Emergency Response Team, a group of skilled analysts who look out for signs of trouble.
Most potential cyber attacks are detected or reported at their desk first.
“We are trained to spot threats and are constantly active,” he told
Soldier.
“Analysts are industry trained and have the experience to know what to look for.
“Our international allies also share relevant information with us.”
Seated in front of a wall of monitors, which relay up-to-the-minute information about data passing through the MoD’s restricted and secret networks, they are continually on alert for suspicious activity.
“It’s about seeing something and working out how to fix it,” said SSgt Bentley.
“It is a lot of responsibility but very rewarding and it’s nice to know this sort of thing is being done – I didn’t realise there was a big brother watching over everything before I came here.”
Everyone in the Army, from Apache pilots flying over Libya to commanders in Afghanistan’s forward operating bases, depends on secure telephone lines and intelligence data.
And it’s not just in theatre where this is important – defence attaches in foreign cities and training bases as far removed as Kathmandu are plugged into the Army’s email and intranet.
“What we do underpins operations because without communications everything would fall over,” added SSgt Bentley.
To help them police this sprawling web of information, staff at the cyber hub make use of all the latest developments.
SSgt Jan Nicholas, a systems engineer, has overseen the introduction of a powerful new suite of computers and software called Watchtower, which has boosted the team’s performance.
“The new set-up has the intelligence to alert us to network trends – it’s got the patience that we haven’t and it doesn’t get tired of looking,” he explained.
“It’s really enhanced our capability to keep up with our adversaries, much like a new weapon would.
“It’s brought the investigation time down to between five and ten minutes, whereas before it would take on average 40 to 50 minutes to gather information from different feeds.
“We now have a very well defended network, which is more efficiently policed than it was before thanks to this multi-million pound capability.”
Fellow signaller LCpl Robert Purdy plays an equally important part in ensuring the MoD’s computer crown jewels are protected. He fits and maintains the sensors that pick up potential security breaches.
“I will assess websites, install the kit and go and fix any problems, wherever they are,” he told Soldier.
The highly-secret system used to keep tabs on defence data depends on this hardware being fully functional. As each sensor is responsible for large areas, any damage could prove to be serious.
A few desks away, Cpl Gavin Partington’s team is tasked with identifying new viruses and potential weaknesses in the MoD’s computer networks. He said their work often reaches outside the defence community.
“We carry out in-depth analysis of malicious content by taking a code, reverse engineering it and looking at how it affects a system.
“We have forensics experts who examine kit and equipment and look for evidence of what has happened.
“We will identify threats and use that information to update our sensors.”
He added: “When we have discovered new variants of malicious software we get commercial anti-viral vendors to update their software to cope with this.”
Other cyber soldiers have closer links to more traditional theatres of war.
WO2 Damian Gunn works as part of the team that liaises with front-line commanders to make sure they have the communications they need.
When new missions such as Operation Ellamy begin, or new checkpoints are built in Helmand province, he ensures they are wired up as quickly as possible.
“We talk to the locations to see how to fit with the network already there. We can get basic comms nodes – secure phones and email – in within a week,” WO2 Gunn said.
The Army’s cyber soldiers may be using bandwidth rather than bullets to beat their enemies but they are fighting a battle that is becoming increasingly significant.
In an age where a code war is more likely than a cold war, troops are armed with all the skill and technology needed to safeguard the security of the UK and its Armed Forces.
Battle station All things digital: The GOSCC’s state-of-the-art HQ Constant battle: The enemy could strike anywhere INSIDE a futuristic structure that wouldn’t look out of place in a fantasy film, the cyber warriors operate 24-hours-a-day, seven-days- a-week. The purpose-built Global Operations and Security Control Centre (GOSCC) is tucked away down a small country lane near an historic market town. The windowless state-of-the-art building is packed with the latest computer technology and digital expertise. Live feeds from Libya and Afghanistan are projected onto a vast wall alongside data from the military’s Defence Information Infrastructure network and BBC News 24 updates. Rows of desks and computer monitors are occupied by hundreds of Army, Navy, RAF and MoD civilian staff and experts from external communications firms are also based there. The GOSCC defends technology that is accessed by some 300,000 restricted and secret users, ranging from ministers in MoD Main Building to commanders in Helmand. Capt Chris Parsons (RN), the officer in charge of the cutting-edge construction, said: “This is war-winning stuff because without communications, assets such as counter-IED kit and intelligence, surveillance, target acquisition and reconnaissance would not work. The way in which we fight has become increasingly technical and reliant on access to this sort of information.” An attack on MoD systems could prevent aircraft flying or ships sailing and, with no boundaries in cyber space, the enemy could easily strike anywhere. Last year GOSCC’s detection systems registered millions of alerts, hundreds of which required further analysis. “It’s a constant battle that is getting more sophisticated with advances in technology,” said Wg Cdr David Woodfine (RAF), the officer who oversees the centre’s cyber team. “We’ve got to be able to keep pace with that. Our watch keeping team monitor more than half a million devices, looking for where the threat might be and where there could be vulnerabilities. “It’s a new type of warfare where anyone with a PC and access to the web can be a threat.” While foreign spies, malicious hackers and internet activists represent a very real danger, a large chunk of the battle is fought closer to home. Careless troops clicking links in forwarded emails or plugging USB sticks or iPhones into computers are responsible for a large proportion of security breaches noted by the centre. “We want people to be aware of the dangers – if we can crack that then 80 per cent of the threat could be resolved,” added Wg Cdr Woodfine. Capt Chris Parsons |
They are part of the MoD’s growing team of cyber warriors – personnel who are trained to defend the multi-billion pound computer and telephone networks that underpin the UK’s military operations.
Among the hundreds of digital defence staff working at the department’s round-the-clock Global Operation Security and Control Centre (GOSCC) are Royal Signals soldiers.
Along with troops from the other two Services, they use their expertise on a futuristic front line that is regularly under attack from enemy forces.
SSgt Martin Bentley is part of the Computer Emergency Response Team, a group of skilled analysts who look out for signs of trouble.
Most potential cyber attacks are detected or reported at their desk first.
“We are trained to spot threats and are constantly active,” he told
Soldier.
“Analysts are industry trained and have the experience to know what to look for.
“Our international allies also share relevant information with us.”
Seated in front of a wall of monitors, which relay up-to-the-minute information about data passing through the MoD’s restricted and secret networks, they are continually on alert for suspicious activity.
“It’s about seeing something and working out how to fix it,” said SSgt Bentley.
“It is a lot of responsibility but very rewarding and it’s nice to know this sort of thing is being done – I didn’t realise there was a big brother watching over everything before I came here.”
Everyone in the Army, from Apache pilots flying over Libya to commanders in Afghanistan’s forward operating bases, depends on secure telephone lines and intelligence data.
And it’s not just in theatre where this is important – defence attaches in foreign cities and training bases as far removed as Kathmandu are plugged into the Army’s email and intranet.
“What we do underpins operations because without communications everything would fall over,” added SSgt Bentley.
To help them police this sprawling web of information, staff at the cyber hub make use of all the latest developments.
SSgt Jan Nicholas, a systems engineer, has overseen the introduction of a powerful new suite of computers and software called Watchtower, which has boosted the team’s performance.
“The new set-up has the intelligence to alert us to network trends – it’s got the patience that we haven’t and it doesn’t get tired of looking,” he explained.
“It’s really enhanced our capability to keep up with our adversaries, much like a new weapon would.
“It’s brought the investigation time down to between five and ten minutes, whereas before it would take on average 40 to 50 minutes to gather information from different feeds.
“We now have a very well defended network, which is more efficiently policed than it was before thanks to this multi-million pound capability.”
Fellow signaller LCpl Robert Purdy plays an equally important part in ensuring the MoD’s computer crown jewels are protected. He fits and maintains the sensors that pick up potential security breaches.
“I will assess websites, install the kit and go and fix any problems, wherever they are,” he told Soldier.
The highly-secret system used to keep tabs on defence data depends on this hardware being fully functional. As each sensor is responsible for large areas, any damage could prove to be serious.
A few desks away, Cpl Gavin Partington’s team is tasked with identifying new viruses and potential weaknesses in the MoD’s computer networks. He said their work often reaches outside the defence community.
“We carry out in-depth analysis of malicious content by taking a code, reverse engineering it and looking at how it affects a system.
“We have forensics experts who examine kit and equipment and look for evidence of what has happened.
“We will identify threats and use that information to update our sensors.”
He added: “When we have discovered new variants of malicious software we get commercial anti-viral vendors to update their software to cope with this.”
Other cyber soldiers have closer links to more traditional theatres of war.
WO2 Damian Gunn works as part of the team that liaises with front-line commanders to make sure they have the communications they need.
When new missions such as Operation Ellamy begin, or new checkpoints are built in Helmand province, he ensures they are wired up as quickly as possible.
“We talk to the locations to see how to fit with the network already there. We can get basic comms nodes – secure phones and email – in within a week,” WO2 Gunn said.
The Army’s cyber soldiers may be using bandwidth rather than bullets to beat their enemies but they are fighting a battle that is becoming increasingly significant.
In an age where a code war is more likely than a cold war, troops are armed with all the skill and technology needed to safeguard the security of the UK and its Armed Forces.