A former top security adviser to Boris Johnson has revealed that Britain has launched recently a series of covert cyber-based attacks on Russian leaders and their interests to “impose a price greater than one they might have expected” for their cyber-offensive against the West. Other allied powers, including the U.S., are doing so, too, say Western intelligence officials in what is becoming a “like-for-like” cyber-conflict with the Kremlin in the so-called the “gray space,” the gap between normal state relations and armed conflict. “The fact you don’t see that we use it doesn’t mean we don’t, because we wouldn’t necessarily talk about those things,” said Mark Sedwill, until recently Britain’s top civil servant and national security adviser to Britain’s Boris Johnson. But in an interview with The Times newspaper, Sedwill underscored that Britain is using its cyber-offense capabilities to retaliate for Russian cyberattacks, information warfare and disruption campaigns. FILE – A still image taken from video shows Mark Sedwill, the top civil servant at Britain’s Home Office at the time. giving evidence at a Commons Home Affairs Select Committee hearing in London, July 8, 2014.“We seek to impose a price, usually a price greater than one they might have expected when we believe it is right and necessary,” he said. “We can’t leave the initiative to our adversaries,” he added. Britain has had an offensive cyber capability for more than decade and used it against the Islamic State, including targeting the terror group’s low-tech drones in the Iraqi town of Mosul in 2018. But officials rarely discuss how they defend against or carry out hacking attacks — nor have they spelled out what they consider legitimate targets outside a full-scale declared war. Last month, Gen. Patrick Sanders, who heads Britain strategic command, raised the veil a little, telling reporters that in theory Britain has the ability to “degrade, disrupt and even destroy critical capabilities and infrastructure of those who would do us harm, ranging from strategic to tactical targets.” The British military partners with GCHQ, Britain’s electronic intelligence agency. Sanders said: “The binary distinction between war and peace as we have approached it no longer applies.” From the first time, Sedwill said Britain had used its cyber-offensive capabilities to retaliate for the 2018 novichok attack on Sergei Skripal, the former Russian double agent in the English city of Salisbury. FILE – Police officers stand guard outside the home of Sergei Skripal in Salisbury, Britain, March 8, 2018.“After the Salisbury attack, first use of chemical weapons against a country in Europe in a century, we retaliated in visible ways. We expelled the entire Russian intelligence network in the UK,” he said. “But we also took a series of other discreet measures including tackling some of the illicit money flows out of Russia, and covert measures as well, which obviously I can’t talk about,” he added. Sedwill’s comments suggest Western powers are increasingly taking the gloves off in an intensifying “gray war” with Russia, as well as with Iran, China, and North Korea. “It is important that we are capable of maneuvering in the grey space, in that zone, and doing so effectively. We can’t leave the initiative to our adversaries,” he said. Last week, U.S. federal prosecutors unveiled indictments of six Russian military intelligence operatives for a series of cyber-attacks in an offensive spree aimed at undermining Western democracies by sowing confusion in everything from the 2016 U.S. presidential election to the South Korean Olympics in 2018. The indictments were the result of prolonged investigations by FBI analysts in cooperation with Google, Cisco, Facebook and Twitter as well with allied Western intelligence agencies, including Britain’s. FILE – A general view shows the headquarters of the Main Directorate of the General Staff of the Armed Forces of the Russian Federation, formerly known as the Main Intelligence Directorate (GRU), in Moscow, Russia, Oct. 4, 2018.Thomas Rid, an American academic and author of the recently published book “Active Measure” said the level of detail in the indictment probably reflected the degree to which the GRU hacking operations had been infiltrated. “The Five Eyes intelligence communities, I would suspect, must have stunning visibility into Russian military intelligence operations if today’s disclosures are considered dispensable,” he tweeted after the indictments were made public.
…