British Spies Must Adapt to Survive

Britain's senior spy chief says that ‘the digital era has profoundly changed our operating environment’.  Britain's Secret Intelligence Service, better known as MI6, must become more open in order to do its secret work effectively. That's according to its chief, Richard Moore, in his first major public speech since taking on the role in October 2020.

Artificial Intelligence (AI), quantum computing and digital technology have combined to completely transform the way human intelligence is gathered by spies, presenting MI6 with major challenges in the digital age.

The West's adversaries such as China and Russia are racing to master Artificial Intelligence (AI) in a way which could revolutionise geopolitics over the next ten years Moors said, in a rare public appearance at the London-based think tank the International Institute for Strategic Studies.

As one of Britain's three intelligence agencies, along with the domestic security service (MI5) and GCHQ, MI6's role has always been to acquire secrets from overseas targets to help protect Britain's national security. While human intelligence - old-fashioned spying - is central to its work, the MI6 chief points to his service's innovations over time. Examples range "from the chemistry that enabled us to produce secret writing technologies in the early days, to the wireless and secure speech technologies we developed during the Second World War".

Inside the MI6 London HQ there is a real-life 'Q Section' that works to provide Britain's spies with the latest gadgets to keep them safe and secret, although mastering intelligence in the age of rapidly accelerating technology is no longer  something the British spy agency can do by itself. 

Moore said that the rapid speed of technological development has been a key contributing factor in making the world a “dramatically more complicated” place. 

MI6 is growing is cyber directorate faster than any other unit and is setting up partnerships with technology companies and experts across industry and academia. To help cultivate innovation, there is also a focus on recruiting people from a wide range of backgrounds and in possession of a diverse array of skills.

Biometric data and facial recognition have made it far harder for intelligence officers to assume false identities in hostile countries without being recognised and exposed. Furthermore,  the traditional boundaries between virtual and real; the domestic and the international; between states and non-state actors and between war and peace have grown opaque. 

Britain's  Adversaries

Russia has been rapidly developing its hacking capabilities and has been accused of perpetrating a wide range of large scale, sophisticated, hacking activities directed against critical infrastructure, the private sector and numerous Western government agencies.There have been powerful attempts by hackers under Russian protection to extort money from UK businesses in ransomware attacks. "Our adversaries are pouring money and ambition into mastering artificial intelligence, quantum computing and synthetic biology because they know... this will give them leverage" Moore said.

MI6 will have to become “more open to stay secret” and work with tech companies to counter threats posed by China and Russia who seek to gain advantage by mastering artificial intelligence and other emerging technologies. Despite the importance of cutting edeg technologies “I do not expect our human intelligence role will ever change fundamentally,” Moore said.

“We will always need to understand the motivations, intentions and aspirations of people in other countries. Even in an era of artificial intelligence, you need human intelligence. In fact, it will become even more important in a more complex world.” 

BBC:      Reuters:    Civil Service World:    Business Telegraph:     Newsbreak:    Guardian:    Flipboard:   Reddit:     

You Might Also Read: 

Cyber Warfare, Intelligence & Malware:

 

« Britain Is Fighting A Ransomware Epidemic
Clearview Faces £17 Million Penalty For Breaching Data Laws »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CERT-In

CERT-In

CERT-In is a functional organisation of the Ministry of Information & Electronics Technology, Government of India, with the objective of securing Indian cyber space.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

NETAS

NETAS

Netas offers solutions in information and communication technologies including end-to-end value added solutions, system integration and technology services to providers and corporations.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

Smoothstack

Smoothstack

Smoothstack is a technology talent incubator whose immersive training program kick starts IT careers and delivers a fresh source of IT talent.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Privacy Compliance Hub

Privacy Compliance Hub

Privacy Compliance Hub provide an easy to use platform with a comprehensive data protection compliance programme including training, information, templates and reporting.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

Guardian Angel Cyber

Guardian Angel Cyber

Guardian Angel Cyber, is your trusted ally in safeguarding your digital assets and online presence.