MI6 Chief Says Cyber Brings ‘potentially existential challenge’

In his second public speech in more than four years, the head of the British intelligence service said that a fourth industrial revolution is blurring the lines between the physical, digital and biological domains, a change that could present a “potentially existential challenge” to liberal democracies.

The rise of big data and other technologies present a call to arms for MI6 and its allies, Alex Younger, the chief of the Secret Intelligence Service, said during a Dec. 3 speech at St. Andrews University in Scotland.

“We and our allies face a battle to make sure technology works to our advantage, not to that of our opponents,” Younger said. “There will be a dividing line between those intelligence services that grasp this, as the UK agencies have, and those services that don’t.

Younger presented MI6 as an organisation in the midst of transforming from a human intelligence agency to one that embraces technological innovation.

“We are evolving rapidly. Cyber is now our fastest-growing directorate. We are shifting our focus to the nexus between humans and technology.”

As a result, the British intelligence agency has bolstered its collaboration with the private sector though a new investment fund, according to the British intelligence head.

The speech was rare for Younger, who is also known as “C” in his official capacity, and just the second since he took the service’s top job in 2014. 

“In the cyber age, newcomers will often be better equipped to solve problems than those, like me, steeped in experience can be,” Younger said.

The head of MI6 presented the world as one of liberal democracies fighting for order against an unnamed “skilled opponent unrestrained by any notion of law or morality.”

“Simply put, we’ve got to innovate faster than they can. Indeed, future generations would not forgive us if it were otherwise,” Younger said.

However, the British spy chief took square aim at one state who appears to be a member of this ideological opposition. Younger said that the British government’s use of bulk data and modern analysts contributed to embarrassing Russia after the poisoning of a former Kremlin spy in Salisbury.

Younger’s speech comes amid what US officials have called in conversations with Fifth Domain an unprecedented intelligence cooperation between the British and American governments. They point to recent Five Eyes agreements that have bolstered cyber threat sharing and the joint attribution of malicious actors.

Younger described the British government’s attribution of the NotPetya attack by the Russian government on Ukraine as “attaching a cost to malign cyber activity.”

“Much of the evolving state threat is about our opponents’ increasingly innovative exploitation of modern technology.”

Fifth Domain:

You Might Also Read:

Is Technology Undermining Democracy?

« Germany Detects New Russian Cyber-Attack
Darktrace CEO Says Cyber Security Is A Global Arms Race »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

National Center for Manufacturing Sciences (NCMS) - USA

National Center for Manufacturing Sciences (NCMS) - USA

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

DarkOwl

DarkOwl

DarkOwl provides the world’s largest index of darknet content and the tools to efficiently find leaked or otherwise compromised sensitive data.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

Halborn

Halborn

Elite blockchain cybersecurity. Award-winning ethical blockchain hackers to secure your stack end-to-end. Far beyond smart contracts.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

SPIE Switzerland

SPIE Switzerland

SPIE Switzerland AG, a subsidiary of the SPIE Group, is a Swiss full-service provider of ICT, multi-technical and integral facility services.