British Spy Chief Says War In Ukraine Is Changing Intelligence Gathering

For a long time cyber attacks were believed to be the command of criminals seeking to steal or extort money, but now it’s become clear that nations are using cyber crime as a part of their offensive military  operations.

Now, nation-state sponsored cyber attacks by professional hacking groups are being widely used by governments, including as Russia and China, to take advantage of their diplomatic adversaries’ digital security weaknesses.

Ransomware, phishing and distributed denial-of-service (DDoS) attacks are just a few of the many weapons that states are now using in geopolitical conflicts that are increasingly playing out in cyberspace rather than on the battlefield.

In particular, the Ukraine conflict has marked a sea-change for the release of secret intelligence, the head of the spy agency GCHQ Sir Jeremy Fleming has said.

Washington and London took the unusual step of publicising their knowledge of Russia's plans ahead of its invasion. The head of US intelligence, Avril Haines, said lessons had been learned including the limits of such moves to publicise intelligence. Displaying an unprecedented degree of transparency, the British GCHQ spy chief, Sir Jeremy Fleming recently interviewed her for BBC Radio 4's Today news programme. As a 30-year veteran of the secret world, Sir Jeremy Fleming said the act of declassifying intelligence was "quite hard in many ways" because a lot of effort went into getting secret intelligence - but there was no point collecting it unless it could be used.

He said he agreed with the sea-change of getting intelligence out there and using it to undermine a narrative, but much of the world had not completely bought into the argument. He also said that Ukraine had seen a new type of conflict in which intelligence was at the forefront. "Keeping the population up-to-date on what we're seeing and involving them in the conversation in a more significant way is crucial," Ms Haines added in her conversation with Sir Jeremy, who is guest-editing the Today programme. As director of national intelligence, Ms Haines co-ordinates all America's spy agencies - and she played a pivotal role in pushing for sensitive intelligence to be declassified and published in the run-up to Russia's February invasion. 

This unusual step was designed to deter Russia and counter its claims it was acting defensively. "We were able to have an impact," Ms Haines said, "at the same times what also is clear… is that our impact was far greater in the West than it was in other places in the world." In Russia, she said the efforts had "basically no impact" because of the control the Kremlin exerted over information flows inside the country. "Authoritarian states have this kind of asymmetric advantage where they're effectively controlling the information to their populations," Ms Haines said. 

She then added that Russia also tried to take advantage of the open information flow in western societies to promote their narratives and exacerbate divisions in society. 

Working out how to understand and counter this foreign influence was a growing area for Western intelligence communities. "The Russians engaged in a very concerted information campaign around the world on these issues... One of their main narratives is the United States is provoking this conflict, and that Nato and Ukraine are setting the conditions and threatening Russia and that sort of forced them into this position." she said

Jeremy Fleming also said that "much of the world" had not completely bought the Western side of the argument. The GCHQ chief said it was important that it was not just government or intelligence agency voices in the debate.  "There are different alliances, which enable us to show and demonstrate that we are more trusted," he said.

Sir Jeremy said the private sector had played an important part in the conflict, including satellite imagery from private providers, or the work of companies like Microsoft in providing cyberdefences for Ukraine. 

Asked if his successor could be the first woman to lead GCHQ, Sir Jeremy said "let's hope so" noting the organisation had not been led by either a woman or someone from an ethnic minority background and that it was time to "show a difference at the top" of intelligence agencies.

BBC:      Gov.UK:      GCHQ:    Raconteur:    Independent:  

You Might Also Read: 

Britain Has Secretly Contributed £6m To Ukraine’s Cyber Defence:
 


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« Spying On Mobile Phone Calls
Five Data Security Trends Organisations Must Deal With »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

Fujitsu

Fujitsu

Fujitsu is the leading Japanese global information and communication technology company, offering a full range of products, solutions and services including Managed IT Services and Cyber Security.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

Arc4dia Labs

Arc4dia Labs

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats.

Bugraptors

Bugraptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

VISO Cyber Security

VISO Cyber Security

VISO provide Cyber Security Consulting and CISO as a Service to companies who need to augment their leadership teams with information security expertise.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

Cyclops

Cyclops

Cyclops is the first Contextual Search Platform for cybersecurity.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Surf Security

Surf Security

SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance.

BlackSwan Technologies

BlackSwan Technologies

BlackSwan Technologies is reinventing enterprise software through Agile Intelligence for the Enterprise – a fusion of data, artificial intelligence, and cloud technologies.