From Ciphers To Cyber Security

Traditional secretive government intelligence services must become more transparent to win the confidence of the national population.

For secret intelligence agencies to function in the digital world and remain secure against cyber threats they will need the trust of citizens.  Director of GCHQ Jeremy Fleming (pictured) made theses comments at the launch of a new exhibition at London's Science Museum which explores the history of ciphers, codebreaking and cyber-security from the First World War to the present. 

Top Secret: From Ciphers to Cybersecurity coincidences with the 100th anniversary of GCHQ and allows the general public to see documents, devices and appliances from the agency's hundred years of history. 

This is very significant as many of these files and were previously hidden behind closed doors, as well as other items relating to security and communications.

Items on display are cipher machines from the early 1900s, info from the 1st World War trenches, and Second World War codebreaking machines used at Bletchley Park. All of this to a current laptop infected with WannaCry ransomware, and the destroyed hard drive alleged to contain secret information that Edward Snowden provided to the media.

The work of the cyber arm of GCHQ, the National Cyber Security Centre (NCSC), is also explored as part of the exhibit.

"I welcome this transparency because the world has changed. It's no longer enough got us to serve in secret, we must justify the trust of the people we seek to protect," said Fleming, who argued that transparency is key to GCHQ serving in one of its key roles, protecting organisations and the public from cyberattacks.

"If we're to prosper as a democratic nation in the digital age, openness is our strength. Openness that fosters the innovation and enterprise that allows us to harness the benefits of the technological revolution and openness that will give everyone access to the tools and knowledge to keep themselves and their families secure in the digital world".

One way GCHQ has already done that is with its cyber security accelerator programme, where intelligence officials and members of the cybersecurity industry mentor startups that are working to prevent cyberattacks and data breaches, using technology to help protect against threats posed by technology.

"Technology will surely become even more central to our economic prosperity and to the development of our society," said Fleming.

"The digital era is already bringing new and unprecedented challenges as we try to ensure that everyone can live and do business safely online," he added.

It's hoped that the free exhibition, which runs until February 2020, will provide inspiration for young people to think about a role in cyber-security and similar areas, paving the way for the country to be protected against future digital threats.

"We need to inspire the next generation of brilliant minds, so that our children can see themselves working in this world, understand what they bring to it and make them able to shape our digital future," said Fleming.

"That's why this collaboration with the Science Museum is so important. If it results in a greater interest in STEM and cyber, a broader understanding of the difficult work we do, or causes a few young people to want to find out more, then it will have been a success."

The exhibition has opened shortly after the end of a 5 year legal, with the UK supreme court ruling that the UK's spy agencies and their hacking activities can be made subject to court challenges. 

ZDNet:             Science Museum

You Might Also Read:

GCHQ Certified Training:

GCHQ Data Collection Violated Rights To Privacy:

 


 

 

« Business Leaders Are Ignoring Cyber Risks
Most Organisations Lack Cyber Resilience »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

Seadot Cybersecurity

Seadot Cybersecurity

Seadot offer cybersecurity services to organizations with a high demand for regulatory compliance and security.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Datastream Cyber Insurance

Datastream Cyber Insurance

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.