From Ciphers To Cyber Security

Traditional secretive government intelligence services must become more transparent to win the confidence of the national population.

For secret intelligence agencies to function in the digital world and remain secure against cyber threats they will need the trust of citizens.  Director of GCHQ Jeremy Fleming (pictured) made theses comments at the launch of a new exhibition at London's Science Museum which explores the history of ciphers, codebreaking and cyber-security from the First World War to the present. 

Top Secret: From Ciphers to Cybersecurity coincidences with the 100th anniversary of GCHQ and allows the general public to see documents, devices and appliances from the agency's hundred years of history. 

This is very significant as many of these files and were previously hidden behind closed doors, as well as other items relating to security and communications.

Items on display are cipher machines from the early 1900s, info from the 1st World War trenches, and Second World War codebreaking machines used at Bletchley Park. All of this to a current laptop infected with WannaCry ransomware, and the destroyed hard drive alleged to contain secret information that Edward Snowden provided to the media.

The work of the cyber arm of GCHQ, the National Cyber Security Centre (NCSC), is also explored as part of the exhibit.

"I welcome this transparency because the world has changed. It's no longer enough got us to serve in secret, we must justify the trust of the people we seek to protect," said Fleming, who argued that transparency is key to GCHQ serving in one of its key roles, protecting organisations and the public from cyberattacks.

"If we're to prosper as a democratic nation in the digital age, openness is our strength. Openness that fosters the innovation and enterprise that allows us to harness the benefits of the technological revolution and openness that will give everyone access to the tools and knowledge to keep themselves and their families secure in the digital world".

One way GCHQ has already done that is with its cyber security accelerator programme, where intelligence officials and members of the cybersecurity industry mentor startups that are working to prevent cyberattacks and data breaches, using technology to help protect against threats posed by technology.

"Technology will surely become even more central to our economic prosperity and to the development of our society," said Fleming.

"The digital era is already bringing new and unprecedented challenges as we try to ensure that everyone can live and do business safely online," he added.

It's hoped that the free exhibition, which runs until February 2020, will provide inspiration for young people to think about a role in cyber-security and similar areas, paving the way for the country to be protected against future digital threats.

"We need to inspire the next generation of brilliant minds, so that our children can see themselves working in this world, understand what they bring to it and make them able to shape our digital future," said Fleming.

"That's why this collaboration with the Science Museum is so important. If it results in a greater interest in STEM and cyber, a broader understanding of the difficult work we do, or causes a few young people to want to find out more, then it will have been a success."

The exhibition has opened shortly after the end of a 5 year legal, with the UK supreme court ruling that the UK's spy agencies and their hacking activities can be made subject to court challenges. 

ZDNet:             Science Museum

You Might Also Read:

GCHQ Certified Training:

GCHQ Data Collection Violated Rights To Privacy:

 


 

 

« Business Leaders Are Ignoring Cyber Risks
Most Organisations Lack Cyber Resilience »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

Niagara Networks

Niagara Networks

Niagara Networks is a Network Visibility industry leader, with emphasis in 1/10/40/100 Gigabit systems and mission-critical IT and security appliances.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

TechBase

TechBase

TechBase is an innovation and start-up center offering technology-oriented start-ups optimal conditions for successful business development.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.

Positiwise Software Pvt Ltd

Positiwise Software Pvt Ltd

Positiwise Software offers end-to-end software development solutions to accelerate the digital growth of businesses.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.