{"id":33563,"date":"2020-02-28T07:05:28","date_gmt":"2020-02-28T07:05:28","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30970\/UK-To-Launch-Specialist-Cyber-Force-Able-To-Target-Terror.html"},"modified":"2020-02-28T07:05:28","modified_gmt":"2020-02-28T07:05:28","slug":"uk-to-launch-specialist-cyber-force-able-to-target-terror","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/","title":{"rendered":"UK To Launch Specialist Cyber Force Able To Target Terror"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/i.guim.co.uk\/img\/media\/3ab62c6f8d7667c76c6b8b999f646763190e82c2\/0_140_4454_2672\/master\/4454.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=bf7442cfb8153e01250eb68ecbd05ce3\" class=\"ff-og-image-inserted\"><\/div>\n<p>A specialist cyber force of hackers who can target hostile states and terror groups is due to be launched later in the spring, after many months of delays and turf wars between the <a href=\"https:\/\/www.theguardian.com\/uk\/ministry-of-defence\" data-link-name=\"auto-linked-tag\" data-component=\"auto-linked-tag\" class=\"u-underline\">Ministry of Defence<\/a> and GCHQ.<\/p>\n<p>The National Cyber Force \u2013 containing an estimated 500 specialists \u2013 has been in the works for two years but sources said that after months of wrangling over the details, the specialist unit was close to being formally announced.<\/p>\n<p>Britain is keen to be seen as a \u201ccyber power\u201d able to disrupt against enemy states, targeting satellite, mobile and computer networks as well as trying to take down communications networks used by terror groups.<\/p>\n<p>The National Cyber Force is a joint initiative between the Ministry of Defence and <a href=\"https:\/\/www.theguardian.com\/uk\/gchq\" data-link-name=\"auto-linked-tag\" data-component=\"auto-linked-tag\" class=\"u-underline\">GCHQ<\/a>, and insiders said it would consolidate some existing capabilities as well as develop new ones.<\/p>\n<p>However, officials are coy on details, arguing that much of what the UK\u2019s offensive hackers could do should remain classified. Nor is the identity of its leader expected to be publicly disclosed, although previous speculation that it would be a woman is understood to be inaccurate.<\/p>\n<p>Experts argue that the lack of clarity makes it difficult to discuss the appropriate limits of cyber warfare in a democracy and what sort of attacks or disruptive measures can be considered legitimate, particularly if there is a strong military dimension to its work.<\/p>\n<p>James Sullivan, the head of cyber research at defence thinktank Rusi, said: \u201cThere has been limited public debate on the purpose and ethics of offensive cyber, the circumstances under which it might be used, and the kinds of effects that might and might not be acceptable.\u201d<\/p>\n<p>Avowed examples of British hacking are rare. Jeremy Fleming, GCHQ\u2019s director, <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-43738953\" data-link-name=\"in body link\" class=\"u-underline\">boasted in 2018<\/a> of conducting \u201ca major offensive cyber campaign\u201d against Isis, which he said \u201chad significant success in suppressing [its] propaganda, hindered their ability to coordinate attacks, and protected coalition forces on the battlefield\u201d.<\/p>\n<p>The spy chief claimed that during 2017, the terror group had \u201cfound it almost impossible to spread their hate online, to use their normal channels to spread their rhetoric, or trust their own publications\u201d in a speech given at Nato in Brussels.<\/p>\n<p>Britain\u2019s delayed efforts come on the heels of the US, which has been gradually acknowledging an expanded offensive cyber capability. Last summer, John Bolton, the then US national security adviser, acknowledged that Washington was broadening its operations after Donald Trump relaxed restrictions.<\/p>\n<p>The US also rarely acknowledges what its hackers do, although in one operation known as <a href=\"https:\/\/www.nytimes.com\/2019\/05\/07\/us\/politics\/cyber-command-russian-interference.html\" data-link-name=\"in body link\" class=\"u-underline\">Synthetic Theology<\/a>, the US Cyber Command jammed servers belonging to the Russian Internet Research Agency, in an apparent attempt to prevent Kremlin interference in the 2018 US mid-term elections.<\/p>\n<p>Fresh discussions about Britain\u2019s offensive hacking capability come a day after Boris Johnson <a href=\"https:\/\/www.theguardian.com\/politics\/2020\/feb\/25\/johnson-unveils-major-review-of-foreign-and-defence-policy\" data-link-name=\"in body link\" class=\"u-underline\">unveiled an integrated review of the UK\u2019s foreign and defence policy<\/a>, aimed at examining spending across all of the country\u2019s UK security agencies over the next five years.<\/p>\n<p>But the last National Security review, in 2015, promised to \u201cprovide the armed forces with advanced offensive cyber capabilities\u201d, although the final phase of that implementation has dragged on so long that it crossed over into the next review, which is due to complete in the autumn.<\/p>\n<p>No 10 has indicated that the review would not necessarily be cost-neutral, meaning that defence spending could increase beyond its existing level of 2% of GDP if an appropriate justification can be found. One of the issues it will address is the future balance of spending between conventional and cyber warfare.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30970\/UK-To-Launch-Specialist-Cyber-Force-Able-To-Target-Terror.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8466],"class_list":["post-33563","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentbritaincyberwarterrormilitary"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>UK To Launch Specialist Cyber Force Able To Target Terror 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"UK To Launch Specialist Cyber Force Able To Target Terror 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-28T07:05:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i.guim.co.uk\/img\/media\/3ab62c6f8d7667c76c6b8b999f646763190e82c2\/0_140_4454_2672\/master\/4454.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=bf7442cfb8153e01250eb68ecbd05ce3\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"UK To Launch Specialist Cyber Force Able To Target Terror\",\"datePublished\":\"2020-02-28T07:05:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/\"},\"wordCount\":601,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/3ab62c6f8d7667c76c6b8b999f646763190e82c2\\\/0_140_4454_2672\\\/master\\\/4454.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=bf7442cfb8153e01250eb68ecbd05ce3\",\"keywords\":[\"headline,hacker,government,britain,cyberwar,terror,military\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/\",\"name\":\"UK To Launch Specialist Cyber Force Able To Target Terror 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/3ab62c6f8d7667c76c6b8b999f646763190e82c2\\\/0_140_4454_2672\\\/master\\\/4454.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=bf7442cfb8153e01250eb68ecbd05ce3\",\"datePublished\":\"2020-02-28T07:05:28+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/3ab62c6f8d7667c76c6b8b999f646763190e82c2\\\/0_140_4454_2672\\\/master\\\/4454.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=bf7442cfb8153e01250eb68ecbd05ce3\",\"contentUrl\":\"https:\\\/\\\/i.guim.co.uk\\\/img\\\/media\\\/3ab62c6f8d7667c76c6b8b999f646763190e82c2\\\/0_140_4454_2672\\\/master\\\/4454.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=bf7442cfb8153e01250eb68ecbd05ce3\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/uk-to-launch-specialist-cyber-force-able-to-target-terror\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,britain,cyberwar,terror,military\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentbritaincyberwarterrormilitary\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"UK To Launch Specialist Cyber Force Able To Target Terror\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"UK To Launch Specialist Cyber Force Able To Target Terror 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/","og_locale":"en_US","og_type":"article","og_title":"UK To Launch Specialist Cyber Force Able To Target Terror 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-02-28T07:05:28+00:00","og_image":[{"url":"https:\/\/i.guim.co.uk\/img\/media\/3ab62c6f8d7667c76c6b8b999f646763190e82c2\/0_140_4454_2672\/master\/4454.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=bf7442cfb8153e01250eb68ecbd05ce3","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"UK To Launch Specialist Cyber Force Able To Target Terror","datePublished":"2020-02-28T07:05:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/"},"wordCount":601,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/3ab62c6f8d7667c76c6b8b999f646763190e82c2\/0_140_4454_2672\/master\/4454.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=bf7442cfb8153e01250eb68ecbd05ce3","keywords":["headline,hacker,government,britain,cyberwar,terror,military"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/","url":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/","name":"UK To Launch Specialist Cyber Force Able To Target Terror 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/#primaryimage"},"thumbnailUrl":"https:\/\/i.guim.co.uk\/img\/media\/3ab62c6f8d7667c76c6b8b999f646763190e82c2\/0_140_4454_2672\/master\/4454.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=bf7442cfb8153e01250eb68ecbd05ce3","datePublished":"2020-02-28T07:05:28+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/#primaryimage","url":"https:\/\/i.guim.co.uk\/img\/media\/3ab62c6f8d7667c76c6b8b999f646763190e82c2\/0_140_4454_2672\/master\/4454.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=bf7442cfb8153e01250eb68ecbd05ce3","contentUrl":"https:\/\/i.guim.co.uk\/img\/media\/3ab62c6f8d7667c76c6b8b999f646763190e82c2\/0_140_4454_2672\/master\/4454.jpg?width=1200&amp;height=630&amp;quality=85&amp;auto=format&amp;fit=crop&amp;overlay-align=bottom%2Cleft&amp;overlay-width=100p&amp;overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&amp;enable=upscale&amp;s=bf7442cfb8153e01250eb68ecbd05ce3"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/uk-to-launch-specialist-cyber-force-able-to-target-terror\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,britain,cyberwar,terror,military","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentbritaincyberwarterrormilitary\/"},{"@type":"ListItem","position":3,"name":"UK To Launch Specialist Cyber Force Able To Target Terror"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=33563"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/33563\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=33563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=33563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=33563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}