British Spies Must Adapt to Survive

Britain's senior spy chief says that ‘the digital era has profoundly changed our operating environment’.  Britain's Secret Intelligence Service, better known as MI6, must become more open in order to do its secret work effectively. That's according to its chief, Richard Moore, in his first major public speech since taking on the role in October 2020.

Artificial Intelligence (AI), quantum computing and digital technology have combined to completely transform the way human intelligence is gathered by spies, presenting MI6 with major challenges in the digital age.

The West's adversaries such as China and Russia are racing to master Artificial Intelligence (AI) in a way which could revolutionise geopolitics over the next ten years Moors said, in a rare public appearance at the London-based think tank the International Institute for Strategic Studies.

As one of Britain's three intelligence agencies, along with the domestic security service (MI5) and GCHQ, MI6's role has always been to acquire secrets from overseas targets to help protect Britain's national security. While human intelligence - old-fashioned spying - is central to its work, the MI6 chief points to his service's innovations over time. Examples range "from the chemistry that enabled us to produce secret writing technologies in the early days, to the wireless and secure speech technologies we developed during the Second World War".

Inside the MI6 London HQ there is a real-life 'Q Section' that works to provide Britain's spies with the latest gadgets to keep them safe and secret, although mastering intelligence in the age of rapidly accelerating technology is no longer  something the British spy agency can do by itself. 

Moore said that the rapid speed of technological development has been a key contributing factor in making the world a “dramatically more complicated” place. 

MI6 is growing is cyber directorate faster than any other unit and is setting up partnerships with technology companies and experts across industry and academia. To help cultivate innovation, there is also a focus on recruiting people from a wide range of backgrounds and in possession of a diverse array of skills.

Biometric data and facial recognition have made it far harder for intelligence officers to assume false identities in hostile countries without being recognised and exposed. Furthermore,  the traditional boundaries between virtual and real; the domestic and the international; between states and non-state actors and between war and peace have grown opaque. 

Britain's  Adversaries

Russia has been rapidly developing its hacking capabilities and has been accused of perpetrating a wide range of large scale, sophisticated, hacking activities directed against critical infrastructure, the private sector and numerous Western government agencies.There have been powerful attempts by hackers under Russian protection to extort money from UK businesses in ransomware attacks. "Our adversaries are pouring money and ambition into mastering artificial intelligence, quantum computing and synthetic biology because they know... this will give them leverage" Moore said.

MI6 will have to become “more open to stay secret” and work with tech companies to counter threats posed by China and Russia who seek to gain advantage by mastering artificial intelligence and other emerging technologies. Despite the importance of cutting edeg technologies “I do not expect our human intelligence role will ever change fundamentally,” Moore said.

“We will always need to understand the motivations, intentions and aspirations of people in other countries. Even in an era of artificial intelligence, you need human intelligence. In fact, it will become even more important in a more complex world.” 

BBC:      Reuters:    Civil Service World:    Business Telegraph:     Newsbreak:    Guardian:    Flipboard:   Reddit:     

You Might Also Read: 

Cyber Warfare, Intelligence & Malware:

 

« Britain Is Fighting A Ransomware Epidemic
Clearview Faces £17 Million Penalty For Breaching Data Laws »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

National Agency for the Security of Information Systems (ANSSI) - France

National Agency for the Security of Information Systems (ANSSI) - France

The role of Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI) is to foster a coordinated, ambitious, pro-active response to cybersecurity issues in France.

Capita

Capita

Capita is a consulting, digital services and software business, providing end-to-end enterprise IT services and solutions focused around digital transformation and innovation.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

ICTSecurity Portal

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

CloudSEK

CloudSEK

CloudSEK has set its sights on building the world’s fastest and most reliable AI technology, that identifies and resolves digital threats.

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

TechDemocracy

TechDemocracy

TechDemocracy are a trusted, global cyber risk assurance solutions provider whose DNA is rooted in cyber advisory, managed and implementation services.

usecure

usecure

usecure is a global provider of computer-based cyber security awareness training, offering the market’s most time-efficient, cost-effective and admin-lite solution for reducing insider threats.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Hayes Connor Solicitors

Hayes Connor Solicitors

Hayes Connor Solicitors is a specialist data breach and cybercrime law firm. We act for clients on individual data breaches and also where a group has been compromised as part of a targeted attack.

CyberHub

CyberHub

CyberHub is an educational platform that offers professional courses and knowledge sharing through articles and videos to help students discover their potential in cybersecurity.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.