British Spies Must Adapt to Survive

Britain's senior spy chief says that ‘the digital era has profoundly changed our operating environment’.  Britain's Secret Intelligence Service, better known as MI6, must become more open in order to do its secret work effectively. That's according to its chief, Richard Moore, in his first major public speech since taking on the role in October 2020.

Artificial Intelligence (AI), quantum computing and digital technology have combined to completely transform the way human intelligence is gathered by spies, presenting MI6 with major challenges in the digital age.

The West's adversaries such as China and Russia are racing to master Artificial Intelligence (AI) in a way which could revolutionise geopolitics over the next ten years Moors said, in a rare public appearance at the London-based think tank the International Institute for Strategic Studies.

As one of Britain's three intelligence agencies, along with the domestic security service (MI5) and GCHQ, MI6's role has always been to acquire secrets from overseas targets to help protect Britain's national security. While human intelligence - old-fashioned spying - is central to its work, the MI6 chief points to his service's innovations over time. Examples range "from the chemistry that enabled us to produce secret writing technologies in the early days, to the wireless and secure speech technologies we developed during the Second World War".

Inside the MI6 London HQ there is a real-life 'Q Section' that works to provide Britain's spies with the latest gadgets to keep them safe and secret, although mastering intelligence in the age of rapidly accelerating technology is no longer  something the British spy agency can do by itself. 

Moore said that the rapid speed of technological development has been a key contributing factor in making the world a “dramatically more complicated” place. 

MI6 is growing is cyber directorate faster than any other unit and is setting up partnerships with technology companies and experts across industry and academia. To help cultivate innovation, there is also a focus on recruiting people from a wide range of backgrounds and in possession of a diverse array of skills.

Biometric data and facial recognition have made it far harder for intelligence officers to assume false identities in hostile countries without being recognised and exposed. Furthermore,  the traditional boundaries between virtual and real; the domestic and the international; between states and non-state actors and between war and peace have grown opaque. 

Britain's  Adversaries

Russia has been rapidly developing its hacking capabilities and has been accused of perpetrating a wide range of large scale, sophisticated, hacking activities directed against critical infrastructure, the private sector and numerous Western government agencies.There have been powerful attempts by hackers under Russian protection to extort money from UK businesses in ransomware attacks. "Our adversaries are pouring money and ambition into mastering artificial intelligence, quantum computing and synthetic biology because they know... this will give them leverage" Moore said.

MI6 will have to become “more open to stay secret” and work with tech companies to counter threats posed by China and Russia who seek to gain advantage by mastering artificial intelligence and other emerging technologies. Despite the importance of cutting edeg technologies “I do not expect our human intelligence role will ever change fundamentally,” Moore said.

“We will always need to understand the motivations, intentions and aspirations of people in other countries. Even in an era of artificial intelligence, you need human intelligence. In fact, it will become even more important in a more complex world.” 

BBC:      Reuters:    Civil Service World:    Business Telegraph:     Newsbreak:    Guardian:    Flipboard:   Reddit:     

You Might Also Read: 

Cyber Warfare, Intelligence & Malware:

 

« Britain Is Fighting A Ransomware Epidemic
Clearview Faces £17 Million Penalty For Breaching Data Laws »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

4Secure

4Secure

For over two decades, 4Secure has specialised in cyber security consultancy, safeguarding the worlds critical Infrastructure through securely bridging air gapped networks.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

Hivint

Hivint

Hivint is a new kind of Information Security professional services company enabling collaboration between our clients to reduce unnecessary security spend.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

ENLIGHTENi

ENLIGHTENi

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. Our mission is to develop next-gen talent through challenge-based learning and team collaboration.

Montreal International

Montreal International

You’re an entrepreneur planning to launch a company in an innovative sector such as AI, cybersecurity, 'deeptech' or fintech? You’ve found the right place!

Sevatec

Sevatec

Sevatec’s Active Cyber Defense (ACD) methodology proactively defends against adversarial kills chain, addressing active and emerging threats while reducing program vulnerabilities and risks.

Transmit Security

Transmit Security

The Transmit Security Platform provides a solution for managing identity across applications while maintaining security and usability.

Gula Tech Adventures

Gula Tech Adventures

Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

Ethnos Cyber

Ethnos Cyber

Ethnos Cyber is Africa’s leading cybersecurity and compliance management company. We provide Information Security, Risk Management, Cybersecurity and Compliance Management solutions to clients.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.