MI6 Spies Infiltrate ISIS HQ

British spies are risking their lives daily in Islamic State heartlands to “take the fight to the enemy,” the head of MI6 said recently.

Alex Younger stressed agents recruited by the Secret Intelligence Service had penetrated IS “upstream” to stop terror attacks on Britain’s streets.

But in his first public speech, the SIS chief laid bare the perils these individuals faced operating in “the most dangerous and hostile environments on earth”, where paranoid IS fanatics have executed hundreds of people wrongly suspected of being spies.

Speaking at MI6 headquarters in Vauxhall, central London (pictured)  Mr Younger, known as “C”, said: “They know that the result of being identified as an MI6 agent could be their death.

“But they do what they do because they believe in protecting their country and religion from the evil that Daesh (Islamic State) and other, terrorist organisations represent.”

He told how MI6 and GCHQ intelligence had on “numerous occasions” given MI5 and the police vital information to identify and stop threats in the UK and its allies. They had disrupted 12 terrorist plots in the UK since June 2013.

In a wide-ranging address, Mr Younger also: Accused Russia and Syrian tyrant Bashar Assad’s regime of seeking to “make a desert” of Aleppo and to “call it peace”. And warned Moscow that it was committing a “tragic example of the perils of forfeiting legitimacy” in the battle against terrorism.

He highlighted the “increasingly dangerous phenomenon” of hybrid warfare with states using cyber-attacks, propaganda or the subversion of democratic process, though he stopped short of naming Russia or China in this context.

He also stressed the strength of intelligence ties with the US and “quality work” with European allies, particularly France and Germany, and expects “continuity” after Brexit and Donald Trump’s election as president.

And explained that mastering new technologies was key to MI6 remaining at the cutting edge of intelligence gathering.

Described the data revolution and Internet as an “existential threat combined with a golden opportunity” for intelligence services.

Emphasised that “we need to be as fleet of foot on the highways and byways of cyberspace as we are on the streets of Raqqa”.

Made the case for new IT powers to spy on terror suspects while stressing restrictions to protect civil liberties.

Told how MI6 wants to recruit the “best from the widest range of backgrounds”, partly to avoid “group think”.

Describing James Bond’s “fierce dedication to the defence of Britain” as reflecting real-life MI6, but said the fictional character would have to “change his ways” to join it now.

Warning of the dangers of failed states providing a safe haven for terrorists, Mr Younger spoke out against Britain simply trying to “pull up the draw bridge” in the hope of preventing terror attacks. “We need to take the fight to the enemy, penetrating terrorist organisations ‘upstream’,” he added. “By that I mean as close to the source as possible. In footballing terms, it’s about always ensuring you are playing in the opponent’s half…The emphasis now is not just on finding things out, but on taking action against what we find.”

British intelligence has proved vital in the military advances against IS strongholds in Raqqa, Syria, and Mosul in Iraq. Agents recruited were not normally MI6 staff members or British but the latter were also deployed to “some of the most challenging locations imaginable”.

But Mr Younger, who led MI6’s work on counter-terrorism ahead of the London Olympics, also argued that “ultimate protection” lies in values. “If you doubt the link between legitimacy and effective counter-terrorism, then, albeit negatively, the unfolding tragedy in Syria will, I fear, provide proof.

"I believe the Russian conduct in Syria, allied with that of Assad’s discredited regime, will, if they do not change course, provide a tragic example of the perils of forfeiting legitimacy,” he explained.

“In defining as a terrorist anyone who opposes a brutal government, they alienate precisely that group that has to be on side if the extremists are to be defeated.” He believes the IS terror threat will not be neutered unless the civil war raging in Syria ends.

While counter-terrorism represented the “urgent” problem, he argued that the “important” longer-term one was the “preservation of Britain’s capacity to take the right decisions in an increasingly complex, multi-polar and opaque” international order. This strand of MI6’s work had “taken on a new edge” in combating the “increasingly dangerous phenomenon” of hybrid warfare. 

While not mentioning claims that Russia sought to interfere in the US elections, he added: “The connectivity that is at the heart of globalisation can be exploited by states with hostile intent to further their aims deniably. 

“They do this through means as varied as cyber-attacks, propaganda or subversion of democratic process.”

The risks at stake were profound and represented a fundamental threat British sovereignty, he added.

Standard:                    Islamic State Cyber Attacks:
 

« Japan Aims For No.1 Supercomputer In 2017
Putin Personally Interfered With The US Election »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

BooleBox

BooleBox

Boolebox is the innovative suite of enterprise data protection applications that preserve the integrity and confidentiality of data from any unauthorized access.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

LTIMindtree

LTIMindtree

LTIMindtree is a new kind of technology consulting firm. We help businesses transform – from core to experience – to thrive in the marketplace of the future.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

Anch.AI

Anch.AI

Anch.AI is an Ethical AI Governance platform that helps you comply with EU regulations and avoid risks and penalties when developing and using AI as part of your business.