Learning from the Military: Valuable Ransomware Insights by Security Think Tank

As someone with a military intelligence background focused on disrupting terrorist financing, I witnessed the significant impact that financial actions can have on bad actors. Simply taking away a dollar from their pocket, or redirecting it elsewhere, often had a greater effect than physical force. If we can influence the battlefield by cutting off their financial flows, we can reduce the need for kinetic actions and better protect our troops.

When I first applied my military training to the cyber domain a decade ago, I adopted this mindset. Therefore, I find it hard not to agree with leading voices like Ciaran Martin, who suggest banning ransom payments to cyber threat actors. While there will always be debates about this approach, it’s clear that our current strategies are ineffective. Efforts to prevent public sector entities from paying ransoms or stop payments to designated terrorist or sanctioned groups have resulted in reduced targeting of these regions, sectors, or entities.

Moreover, the payments made to these groups often fund further illicit activities and bolster the economies that support them. They also enrich corrupt officials in states that seek to undermine our way of life. Recently, the NCA and their international counterparts achieved a major success by targeting the LockBit ransomware group using their own tactics against them. Combining effective law enforcement actions with the reduction of financial incentives for bad actors can have a tangible impact.

In my military experience, removing money from the pockets of certain terrorists directly led to a decrease in their activities. Desperation or discontent often caused them to make mistakes or expose themselves, making it easier for us to apprehend them. This principle applies in the cyber domain as well. By preventing crypto exchanges from facilitating ransom payments and placing additional pressure on threat actors, we can disrupt their operations.

However, banning ransom payments does raise legitimate concerns. It might divert threat actors’ attention towards fraud-based activities targeting individuals instead of corporate entities. This would burden those who are less financially capable. To address this issue, governments, telecommunications providers, infrastructure providers, service providers, domain and email providers must all take proactive measures to limit the capabilities of threat actors.

A ban on ransom payments is a positive step forward, but it must be accompanied by increased resources for law enforcement and intelligence agencies. Additionally, we need to impose stricter requirements on the providers of systems and infrastructures used by these actors. In the UK, our national cyber security strategy lacks the necessary coordination to effectively tackle this threat. Establishing a ransomware task force with the authority to drive change across multiple government departments, agencies, arm’s length bodies, and law enforcement is crucial to making the ban effective and minimizing unintended consequences.

Unlock your business potential with our expert guidance. Get in touch now!

Robot-bot-chatbot-AI.jpg

A Jobseeker’s Handbook: Leveraging AI and Its Implications for Employers

tr_20241220-top-software-development-technologies.jpg

8 Key Software Development Technologies to Watch in 2025

cloud-money-finance-investment-savings-adobe.jpg

AWS Provides Hackney Council with a Minimum 22% Discount on Cloud Services via OGVA 2.0

tr_20241219-eu-guidance-ai-privacy-laws.jpg

EU Provides Guidance for AI Developers on Compliance with Privacy Regulations

IT-sustainability-think-tank-hero.jpg

IT Sustainability Think Tank: Insights from 2024 and Key Priorities for 2025

AdobeStock_210063189.jpg

NVIDIA Unveils New Mini Developer Kit for Generative AI

technology-digital-ai-binary-adobe.jpeg

Digital Ethics Summit 2024: Understanding the Socio-Technical Aspects of AI