MI6 Chief Says Cyber Brings ‘potentially existential challenge’

In his second public speech in more than four years, the head of the British intelligence service said that a fourth industrial revolution is blurring the lines between the physical, digital and biological domains, a change that could present a “potentially existential challenge” to liberal democracies.

The rise of big data and other technologies present a call to arms for MI6 and its allies, Alex Younger, the chief of the Secret Intelligence Service, said during a Dec. 3 speech at St. Andrews University in Scotland.

“We and our allies face a battle to make sure technology works to our advantage, not to that of our opponents,” Younger said. “There will be a dividing line between those intelligence services that grasp this, as the UK agencies have, and those services that don’t.

Younger presented MI6 as an organisation in the midst of transforming from a human intelligence agency to one that embraces technological innovation.

“We are evolving rapidly. Cyber is now our fastest-growing directorate. We are shifting our focus to the nexus between humans and technology.”

As a result, the British intelligence agency has bolstered its collaboration with the private sector though a new investment fund, according to the British intelligence head.

The speech was rare for Younger, who is also known as “C” in his official capacity, and just the second since he took the service’s top job in 2014. 

“In the cyber age, newcomers will often be better equipped to solve problems than those, like me, steeped in experience can be,” Younger said.

The head of MI6 presented the world as one of liberal democracies fighting for order against an unnamed “skilled opponent unrestrained by any notion of law or morality.”

“Simply put, we’ve got to innovate faster than they can. Indeed, future generations would not forgive us if it were otherwise,” Younger said.

However, the British spy chief took square aim at one state who appears to be a member of this ideological opposition. Younger said that the British government’s use of bulk data and modern analysts contributed to embarrassing Russia after the poisoning of a former Kremlin spy in Salisbury.

Younger’s speech comes amid what US officials have called in conversations with Fifth Domain an unprecedented intelligence cooperation between the British and American governments. They point to recent Five Eyes agreements that have bolstered cyber threat sharing and the joint attribution of malicious actors.

Younger described the British government’s attribution of the NotPetya attack by the Russian government on Ukraine as “attaching a cost to malign cyber activity.”

“Much of the evolving state threat is about our opponents’ increasingly innovative exploitation of modern technology.”

Fifth Domain:

You Might Also Read:

Is Technology Undermining Democracy?

« Germany Detects New Russian Cyber-Attack
Darktrace CEO Says Cyber Security Is A Global Arms Race »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

ProfitBricks

ProfitBricks

ProfitBricks is a secure cloud computing infrastructure-as-a-service (IaaS) solution.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

QA Consultants

QA Consultants

QA Consultants is North America’s largest software quality engineering services firm, an award-winning onshore provider of software testing and quality assurance solutions.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

Cyberlocke

Cyberlocke

Cyberlocke is dedicated to finding inventive solutions to meet the distinct IT obstacles of each organization we support.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.