MI5 Joins Instagram

Instagram’s reputation as the home of recipe shots, makeup tips and holiday boasts may have to be reassessed as MI5, the domestic spy agency, joins the social networking site. 

British security service MI5 is joining Instagram in a bid to increase its transparency and content posted on social media by security service will include previously undisclosed archive documents.

The MI5 account, @mi5official, will host Q&As with serving intelligence officers and promote career opportunities.
In an intriguing first post, the service said the secret to successful spying was to "consider all angles".

MI5 spy agency chief,  Ken McCallum said "being more open" was key to MI5's approach to the 2020s.
Urging people to follow the service, Mr McCallum added: "You can insert your own joke about whether we will be following you." McCallum said in The Telegraph that joining the Instagram platform was "a routine step for most organisations, but more interesting when you're in the business of keeping secrets." He also said the intelligence service was facing a dilemma: "On the one hand, our ability to serve the public and keep the country safe depends critically on operating covertly."

Replying to its first Instagram update, which showed the secure "pods" used by MI5 staff to enter its London HQ - Home Secretary Priti Patel said: "Thank you for your exceptional work in keeping our country safe."

MI5 plans to use the platform to debunk popular myths about its work and reveal never-before-seen material from the archives of its 112-year past.It also promises to show what it's like to be an agent runner and surveillance officer, though Mr McCallum says their operations will not become "an open book".

MI5 is relatively late to the party when it comes to spies on social media. GCHQ launched its Instagram account in 2018, while the US intelligence agency the CIA has 3.2 million followers on Twitter. The recently-appointed head of MI6 Richard Moore tweets regularly.

Outlining his strategy as MI5's new boss in October last year, Mr McCallum said: "If I want one thing to characterise my tenure in this role, it's for MI5 to open up and reach out in new ways. "Much of what we do needs to remain invisible, but what we are doesn't have to be. In fact, opening up is key to our future success."

@ChiefMI6:      BBC:       Telegraph:        Independent:     The Times:      

You Might Also Read:

Spies In Cyberspace:

 

« Western Nations Face A ‘moment of reckoning’ Over Cyber Security
The US Suffers Multiple Attacks By Russian Hackers »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

SecureAppbox

SecureAppbox

SecureAppbox provide solutions that protects the communication of sensitive data as well as advice on data security and compliance with GDPR.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

Cloudsec Asia

Cloudsec Asia

Cloudsec Asia is Thailand's top-ranked cybersecurity consultant company. We offers security services to ensure that all your IT assets are reliable, accessible, and secure.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.