From Ciphers To Cyber Security

Traditional secretive government intelligence services must become more transparent to win the confidence of the national population.

For secret intelligence agencies to function in the digital world and remain secure against cyber threats they will need the trust of citizens.  Director of GCHQ Jeremy Fleming (pictured) made theses comments at the launch of a new exhibition at London's Science Museum which explores the history of ciphers, codebreaking and cyber-security from the First World War to the present. 

Top Secret: From Ciphers to Cybersecurity coincidences with the 100th anniversary of GCHQ and allows the general public to see documents, devices and appliances from the agency's hundred years of history. 

This is very significant as many of these files and were previously hidden behind closed doors, as well as other items relating to security and communications.

Items on display are cipher machines from the early 1900s, info from the 1st World War trenches, and Second World War codebreaking machines used at Bletchley Park. All of this to a current laptop infected with WannaCry ransomware, and the destroyed hard drive alleged to contain secret information that Edward Snowden provided to the media.

The work of the cyber arm of GCHQ, the National Cyber Security Centre (NCSC), is also explored as part of the exhibit.

"I welcome this transparency because the world has changed. It's no longer enough got us to serve in secret, we must justify the trust of the people we seek to protect," said Fleming, who argued that transparency is key to GCHQ serving in one of its key roles, protecting organisations and the public from cyberattacks.

"If we're to prosper as a democratic nation in the digital age, openness is our strength. Openness that fosters the innovation and enterprise that allows us to harness the benefits of the technological revolution and openness that will give everyone access to the tools and knowledge to keep themselves and their families secure in the digital world".

One way GCHQ has already done that is with its cyber security accelerator programme, where intelligence officials and members of the cybersecurity industry mentor startups that are working to prevent cyberattacks and data breaches, using technology to help protect against threats posed by technology.

"Technology will surely become even more central to our economic prosperity and to the development of our society," said Fleming.

"The digital era is already bringing new and unprecedented challenges as we try to ensure that everyone can live and do business safely online," he added.

It's hoped that the free exhibition, which runs until February 2020, will provide inspiration for young people to think about a role in cyber-security and similar areas, paving the way for the country to be protected against future digital threats.

"We need to inspire the next generation of brilliant minds, so that our children can see themselves working in this world, understand what they bring to it and make them able to shape our digital future," said Fleming.

"That's why this collaboration with the Science Museum is so important. If it results in a greater interest in STEM and cyber, a broader understanding of the difficult work we do, or causes a few young people to want to find out more, then it will have been a success."

The exhibition has opened shortly after the end of a 5 year legal, with the UK supreme court ruling that the UK's spy agencies and their hacking activities can be made subject to court challenges. 

ZDNet:             Science Museum

You Might Also Read:

GCHQ Certified Training:

GCHQ Data Collection Violated Rights To Privacy:

 


 

 

« Business Leaders Are Ignoring Cyber Risks
Most Organisations Lack Cyber Resilience »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

Network Box

Network Box

Network Box is one of the world's leading Managed Security Service Providers.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

Spire Solutions

Spire Solutions

Spire Solutions is the Middle East & Africa region’s leading cybersecurity solution provider and value-added distributor (VAD).

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

CertiK

CertiK

CertiK uses rigorous Formal Verification technology to provide hacker-resistant smart contract and blockchain audits, thorough penetration testing, and customized security integrations.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.