MI6 Spies Infiltrate ISIS HQ

British spies are risking their lives daily in Islamic State heartlands to “take the fight to the enemy,” the head of MI6 said recently.

Alex Younger stressed agents recruited by the Secret Intelligence Service had penetrated IS “upstream” to stop terror attacks on Britain’s streets.

But in his first public speech, the SIS chief laid bare the perils these individuals faced operating in “the most dangerous and hostile environments on earth”, where paranoid IS fanatics have executed hundreds of people wrongly suspected of being spies.

Speaking at MI6 headquarters in Vauxhall, central London (pictured)  Mr Younger, known as “C”, said: “They know that the result of being identified as an MI6 agent could be their death.

“But they do what they do because they believe in protecting their country and religion from the evil that Daesh (Islamic State) and other, terrorist organisations represent.”

He told how MI6 and GCHQ intelligence had on “numerous occasions” given MI5 and the police vital information to identify and stop threats in the UK and its allies. They had disrupted 12 terrorist plots in the UK since June 2013.

In a wide-ranging address, Mr Younger also: Accused Russia and Syrian tyrant Bashar Assad’s regime of seeking to “make a desert” of Aleppo and to “call it peace”. And warned Moscow that it was committing a “tragic example of the perils of forfeiting legitimacy” in the battle against terrorism.

He highlighted the “increasingly dangerous phenomenon” of hybrid warfare with states using cyber-attacks, propaganda or the subversion of democratic process, though he stopped short of naming Russia or China in this context.

He also stressed the strength of intelligence ties with the US and “quality work” with European allies, particularly France and Germany, and expects “continuity” after Brexit and Donald Trump’s election as president.

And explained that mastering new technologies was key to MI6 remaining at the cutting edge of intelligence gathering.

Described the data revolution and Internet as an “existential threat combined with a golden opportunity” for intelligence services.

Emphasised that “we need to be as fleet of foot on the highways and byways of cyberspace as we are on the streets of Raqqa”.

Made the case for new IT powers to spy on terror suspects while stressing restrictions to protect civil liberties.

Told how MI6 wants to recruit the “best from the widest range of backgrounds”, partly to avoid “group think”.

Describing James Bond’s “fierce dedication to the defence of Britain” as reflecting real-life MI6, but said the fictional character would have to “change his ways” to join it now.

Warning of the dangers of failed states providing a safe haven for terrorists, Mr Younger spoke out against Britain simply trying to “pull up the draw bridge” in the hope of preventing terror attacks. “We need to take the fight to the enemy, penetrating terrorist organisations ‘upstream’,” he added. “By that I mean as close to the source as possible. In footballing terms, it’s about always ensuring you are playing in the opponent’s half…The emphasis now is not just on finding things out, but on taking action against what we find.”

British intelligence has proved vital in the military advances against IS strongholds in Raqqa, Syria, and Mosul in Iraq. Agents recruited were not normally MI6 staff members or British but the latter were also deployed to “some of the most challenging locations imaginable”.

But Mr Younger, who led MI6’s work on counter-terrorism ahead of the London Olympics, also argued that “ultimate protection” lies in values. “If you doubt the link between legitimacy and effective counter-terrorism, then, albeit negatively, the unfolding tragedy in Syria will, I fear, provide proof.

"I believe the Russian conduct in Syria, allied with that of Assad’s discredited regime, will, if they do not change course, provide a tragic example of the perils of forfeiting legitimacy,” he explained.

“In defining as a terrorist anyone who opposes a brutal government, they alienate precisely that group that has to be on side if the extremists are to be defeated.” He believes the IS terror threat will not be neutered unless the civil war raging in Syria ends.

While counter-terrorism represented the “urgent” problem, he argued that the “important” longer-term one was the “preservation of Britain’s capacity to take the right decisions in an increasingly complex, multi-polar and opaque” international order. This strand of MI6’s work had “taken on a new edge” in combating the “increasingly dangerous phenomenon” of hybrid warfare. 

While not mentioning claims that Russia sought to interfere in the US elections, he added: “The connectivity that is at the heart of globalisation can be exploited by states with hostile intent to further their aims deniably. 

“They do this through means as varied as cyber-attacks, propaganda or subversion of democratic process.”

The risks at stake were profound and represented a fundamental threat British sovereignty, he added.

Standard:                    Islamic State Cyber Attacks:
 

« Japan Aims For No.1 Supercomputer In 2017
Putin Personally Interfered With The US Election »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

PKWARE

PKWARE

PKWARE is a global leader in business data security, providing encryption and compression solutions to enterprise customers and government entities around the world.

Magtech Solutions

Magtech Solutions

Magtech Solutions is a one-stop IT Solutions provider offering Cloud Computing, IT Security, Unified Email Solutions and ERP systems.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

Vigilant Technology Solutions

Vigilant Technology Solutions

Vigilant is a global cyber security technology company offering solutions to manage entire IT & cyber security lifecycles.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

ESC - Enterprise Security Center

ESC - Enterprise Security Center

ESC is a system house specializing exclusively in IT security - Security Implementation & Optimization, Operations, Managed Security Services.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.

Concorde Technology Group

Concorde Technology Group

Concorde Technology Group is one of the UK’s leading IT support and services providers, delivering cost-effective and innovative IT solutions to businesses across the country.

Intuitive Research & Technology Corp

Intuitive Research & Technology Corp

Intuitive Research and Technology is an aerospace engineering and analysis firm providing services to the Department of Defense, government agencies, and commercial companies.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.

Sonar

Sonar

AI generated or written by humans, Sonar’s Clean Code Solutions cover your code quality needs, improving code reliability, maintainability, and security.