British Spies Must Adapt to Survive

Britain's senior spy chief says that ‘the digital era has profoundly changed our operating environment’.  Britain's Secret Intelligence Service, better known as MI6, must become more open in order to do its secret work effectively. That's according to its chief, Richard Moore, in his first major public speech since taking on the role in October 2020.

Artificial Intelligence (AI), quantum computing and digital technology have combined to completely transform the way human intelligence is gathered by spies, presenting MI6 with major challenges in the digital age.

The West's adversaries such as China and Russia are racing to master Artificial Intelligence (AI) in a way which could revolutionise geopolitics over the next ten years Moors said, in a rare public appearance at the London-based think tank the International Institute for Strategic Studies.

As one of Britain's three intelligence agencies, along with the domestic security service (MI5) and GCHQ, MI6's role has always been to acquire secrets from overseas targets to help protect Britain's national security. While human intelligence - old-fashioned spying - is central to its work, the MI6 chief points to his service's innovations over time. Examples range "from the chemistry that enabled us to produce secret writing technologies in the early days, to the wireless and secure speech technologies we developed during the Second World War".

Inside the MI6 London HQ there is a real-life 'Q Section' that works to provide Britain's spies with the latest gadgets to keep them safe and secret, although mastering intelligence in the age of rapidly accelerating technology is no longer  something the British spy agency can do by itself. 

Moore said that the rapid speed of technological development has been a key contributing factor in making the world a “dramatically more complicated” place. 

MI6 is growing is cyber directorate faster than any other unit and is setting up partnerships with technology companies and experts across industry and academia. To help cultivate innovation, there is also a focus on recruiting people from a wide range of backgrounds and in possession of a diverse array of skills.

Biometric data and facial recognition have made it far harder for intelligence officers to assume false identities in hostile countries without being recognised and exposed. Furthermore,  the traditional boundaries between virtual and real; the domestic and the international; between states and non-state actors and between war and peace have grown opaque. 

Britain's  Adversaries

Russia has been rapidly developing its hacking capabilities and has been accused of perpetrating a wide range of large scale, sophisticated, hacking activities directed against critical infrastructure, the private sector and numerous Western government agencies.There have been powerful attempts by hackers under Russian protection to extort money from UK businesses in ransomware attacks. "Our adversaries are pouring money and ambition into mastering artificial intelligence, quantum computing and synthetic biology because they know... this will give them leverage" Moore said.

MI6 will have to become “more open to stay secret” and work with tech companies to counter threats posed by China and Russia who seek to gain advantage by mastering artificial intelligence and other emerging technologies. Despite the importance of cutting edeg technologies “I do not expect our human intelligence role will ever change fundamentally,” Moore said.

“We will always need to understand the motivations, intentions and aspirations of people in other countries. Even in an era of artificial intelligence, you need human intelligence. In fact, it will become even more important in a more complex world.” 

BBC:      Reuters:    Civil Service World:    Business Telegraph:     Newsbreak:    Guardian:    Flipboard:   Reddit:     

You Might Also Read: 

Cyber Warfare, Intelligence & Malware:

 

« Britain Is Fighting A Ransomware Epidemic
Clearview Faces £17 Million Penalty For Breaching Data Laws »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SmartSearch

SmartSearch

SmartSearch is a leading online provider of Anti-Money Laundering and Fraud Prevention Services.

European Network for Cyber Security (ENCS)

European Network for Cyber Security (ENCS)

ENCS’s core focus is around educating and solving cyber security challenges in the development and operation of energy grids across Europe.

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

Nclose

Nclose

Nclose is a proudly South African cyber security specialist that has been securing leading enterprises and building our security portfolio since 2006.

FTI Consulting

FTI Consulting

FTI Consulting is a global business advisory firm dedicated to helping organizations manage change, mitigate risk and resolve disputes.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

Zenzero

Zenzero

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

Unosecur

Unosecur

Unosecur is a comprehensive identity security platform that addresses identity-related threats in multi-cloud and on-premise environments.