MI6 is in a Technology Race with Terrorists and Criminals

aa7c2ff01259dd1d2fc33110f10c1be2.jpg?itok=wqlt8LoT

Britain’s intelligence agencies are engaged in a “technology arms race” with terrorists, cybercriminals and other “malicious actors” bent on causing the country harm, the head of MI6 has warned.

Alex Younger said the agencies were facing opponents “unconstrained by consideration of ethics and law” who were exploiting Internet technology to put lives at risk.
 MI6 
In his first public comments since taking over last year as chief of the Secret Intelligence Service (SIS) – as MI6 is more properly known – Younger said traditional human espionage was becoming increasing intertwined with “technical operations”.

Speaking to an invited audience in London, he said that using the Internet and big data had enabled the agencies to “sharpen some very human characteristics” of their work.
“Using data appropriately and proportionately offers us a priceless opportunity to be even more deliberate and targeted in what we do, and so to be better at protecting our agents and this country,” he said. However he said that technology had also created new vulnerabilities, which enemies could exploit. “The bad news is the same technology in opposition hands, an opposition often unconstrained by consideration of ethics and law, allows them to see what we are doing and to put our people and agents at risk,” he said. “So we find ourselves in a technology arms race. Contrary to myth, human intelligence operations are not an alternative to technical operations – the two are interdependent and set to become more so.”

Younger described the threat faced by agencies as the “dark side of globalisation” – including “terrorists, malicious actors in cyberspace and criminals” as he paid tribute to the bravery of his officers.
“As I speak there are SIS officers serving in some of the most dangerous and forbidding places on the planet,” he said. “Others are operating under deep cover, unable to reveal the real nature of their work, or sometimes even their identity. This takes a particular type of bravery and resilience.” He added: “I am particularly proud of the way in which our work with the military developed in Iraq and Afghanistan. Put bluntly, work done by SIS and GCHQ saved many British and coalition lives.”
 “The guiding principle is clear – we cannot protect the values this country represents if we undermine them in the process. And we cannot hope to hold the public’s trust unless they know this principle is effectively overseen.”

Guardian http://bit.ly/1HZrJZ4

« Talk of Cyber Attack as Huge Power Outages Hit Turkey
Will New US Cybersecurity Laws Actually Improve Security? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

Guardsquare

Guardsquare

GuardSquare is the global reference in mobile application protection. We develop premium software for the protection of mobile applications against reverse engineering and hacking.

Meiya Pico Information Co

Meiya Pico Information Co

Meiya Pico is the leading digital forensics and information security products and service provider in China.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Data Priva

Data Priva

Data Priva is the UK's leading subscription-based data protection, governance, risk and and compliance service.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

Amtivo Ireland

Amtivo Ireland

Amtivo Ireland (formerly Certification Europe and EQA) offers a range of certifications and related services.