MI6 Used Information From The Trump Dossier

The head of MI6 used information gathered by former officer Christopher Steele in his Trump investigation, as a warning against Russian cyber-attacks and attempts to subvert Western democracies.

Sir Alex Younger’s briefing notes for his first public speech as head of the Secret Intelligence Service contained some of the material supplied by Mr Steele, according to security sources.

Drawing on the alleged hacking carried out by Moscow in the US presidential campaign, he warned of the danger facing Britain and Western European allies, and especially to elections due to be held next year.

Security sources stress that MI6 had extensive information, British and international, on the Russian threat apart from that of Mr Steele. But they pointed out that he is held in high regard and the contribution he provided was valuable.

In one of his recent tweets, Mr Trump described Mr Steele as a “failed spy”. He also claimed in another tweet that “James Clapper [director of national intelligence] called me yesterday to denounce the false and fictitious report that was illegally circulated. Made up, phony facts. Too bad!”

Mr Steele had, in fact, a highly successful career in MI6, received a number of commendations and is highly regarded by both British and American intelligence agencies. Mr Clapper pointed out that what he had actually said was that the intelligence service “has not made any judgement that the information in this document is reliable”.

The information Mr Steele, who had been hired by political opponents of Mr Trump, gave to MI6 was disseminated through the UK’s intelligence agencies including GCHQ who provided assessment to their American counterparts, the National Security Agency (NSA).

Security sources stress that the material Mr Steele had provided was very much “raw humint” (human intelligence) and that GCHQ had used its technological means to carry out its investigation. However, it enabled tracking of hackers outside Russia, in Eastern Europe, who may also have been used in the Kremlin’s American operation.

Senior officials could not confirm media reports at the weekend that reassurance has been sought by London from the CIA that the identities of British agents in Russia will be protected in shared intelligence, with concerns about links between Mr Trump’s team and Moscow. One official said that the understanding was that unauthorised people should not have access to such detail in anything classified which is passed on.

The threat of outside interference in coming elections in France, Germany and, possibly, Italy, has led to greater liaison between Western intelligence services in which, say officials, US agencies continue to play a full part.

There were two strands to the investigation carried out by Mr Steele, Mr Trump’s alleged susceptibility to blackmail and a cyber operation carried out by the Russians which benefited Mr Trump and damaged Hillary Clinton’s campaign. The intelligence agencies in the UK, it is believed, have focused on the cyber aspect of the dossier, rather than blackmail claims, because of the immediate threat it presents to this country.

In his December speech, at MI6’s headquarters in London, Sir Alex scathingly criticised what he termed the brutality of the military offensive then being undertaken by the forces of President Bashar al-Assad and his Russian allies in Aleppo.

On cyber warfare and associated subversion, he said: “The connectivity that is at the heart of globalisation can be exploited by states with hostile intent to further their aims deniably. They do this through means as varied as cyberattacks, propaganda, or subversion of democratic process.

“Our job is to give the Government the information advantage: to shine a light on those activities and help our country and our allies. The risks are profound and represent a fundamental threat to sovereignty: they should be a concern to all those who share democratic values”.

Mr Steele was initially hired by Republican opponents of Mr Trump and, after he won the Republican nomination, the Democrats.

After Mr Trump’s surprise election win their services were no longer required by the Democrats. However, Mr Steele and, it is believed, one of his American colleagues, continued to work without pay because they felt that what they were uncovering should see the light of day. Mr Steele passed on what he had found to the FBI and MI6 because he believed such material was a matter of national security for both countries.

Independent:      The Trump Dossier

Ex-MI6 Chief Warns Over Electronic Voting:  

 

« Facebook To Introduce Fake News Tools
Twelve Things To Know About Self Driving Cars »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

Ergo

Ergo

Ergo is a world-class IT Partner of choice, leveraging the latest technology available in cloud, mobility, big data, analytics, and social media.

DataEndure

DataEndure

DataEndure helps companies build digital resilience so that their critical information assets are protected and available to the right people, at the right time.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

DNSFilter

DNSFilter

DNSFilter is the most accurate threat detection and content filtering tool on the market today.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.