MI6 Used Information From The Trump Dossier

The head of MI6 used information gathered by former officer Christopher Steele in his Trump investigation, as a warning against Russian cyber-attacks and attempts to subvert Western democracies.

Sir Alex Younger’s briefing notes for his first public speech as head of the Secret Intelligence Service contained some of the material supplied by Mr Steele, according to security sources.

Drawing on the alleged hacking carried out by Moscow in the US presidential campaign, he warned of the danger facing Britain and Western European allies, and especially to elections due to be held next year.

Security sources stress that MI6 had extensive information, British and international, on the Russian threat apart from that of Mr Steele. But they pointed out that he is held in high regard and the contribution he provided was valuable.

In one of his recent tweets, Mr Trump described Mr Steele as a “failed spy”. He also claimed in another tweet that “James Clapper [director of national intelligence] called me yesterday to denounce the false and fictitious report that was illegally circulated. Made up, phony facts. Too bad!”

Mr Steele had, in fact, a highly successful career in MI6, received a number of commendations and is highly regarded by both British and American intelligence agencies. Mr Clapper pointed out that what he had actually said was that the intelligence service “has not made any judgement that the information in this document is reliable”.

The information Mr Steele, who had been hired by political opponents of Mr Trump, gave to MI6 was disseminated through the UK’s intelligence agencies including GCHQ who provided assessment to their American counterparts, the National Security Agency (NSA).

Security sources stress that the material Mr Steele had provided was very much “raw humint” (human intelligence) and that GCHQ had used its technological means to carry out its investigation. However, it enabled tracking of hackers outside Russia, in Eastern Europe, who may also have been used in the Kremlin’s American operation.

Senior officials could not confirm media reports at the weekend that reassurance has been sought by London from the CIA that the identities of British agents in Russia will be protected in shared intelligence, with concerns about links between Mr Trump’s team and Moscow. One official said that the understanding was that unauthorised people should not have access to such detail in anything classified which is passed on.

The threat of outside interference in coming elections in France, Germany and, possibly, Italy, has led to greater liaison between Western intelligence services in which, say officials, US agencies continue to play a full part.

There were two strands to the investigation carried out by Mr Steele, Mr Trump’s alleged susceptibility to blackmail and a cyber operation carried out by the Russians which benefited Mr Trump and damaged Hillary Clinton’s campaign. The intelligence agencies in the UK, it is believed, have focused on the cyber aspect of the dossier, rather than blackmail claims, because of the immediate threat it presents to this country.

In his December speech, at MI6’s headquarters in London, Sir Alex scathingly criticised what he termed the brutality of the military offensive then being undertaken by the forces of President Bashar al-Assad and his Russian allies in Aleppo.

On cyber warfare and associated subversion, he said: “The connectivity that is at the heart of globalisation can be exploited by states with hostile intent to further their aims deniably. They do this through means as varied as cyberattacks, propaganda, or subversion of democratic process.

“Our job is to give the Government the information advantage: to shine a light on those activities and help our country and our allies. The risks are profound and represent a fundamental threat to sovereignty: they should be a concern to all those who share democratic values”.

Mr Steele was initially hired by Republican opponents of Mr Trump and, after he won the Republican nomination, the Democrats.

After Mr Trump’s surprise election win their services were no longer required by the Democrats. However, Mr Steele and, it is believed, one of his American colleagues, continued to work without pay because they felt that what they were uncovering should see the light of day. Mr Steele passed on what he had found to the FBI and MI6 because he believed such material was a matter of national security for both countries.

Independent:      The Trump Dossier

Ex-MI6 Chief Warns Over Electronic Voting:  

 

« Facebook To Introduce Fake News Tools
Twelve Things To Know About Self Driving Cars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

Technology Law Alliance (TLA)

Technology Law Alliance (TLA)

Technology Law Alliance is a specialist IT law firm focussed on the fields of technology, outsourcing and e-commerce.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

International Association of Security Awareness Professionals (IASAP)

International Association of Security Awareness Professionals (IASAP)

IASAP provides a members-only virtual sharing platform where security awareness professionals engage in a lively, year-round exchange of information and ideas.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

North West Cyber Resilience Centre (NWCRC)

North West Cyber Resilience Centre (NWCRC)

The North West Cyber Resilience Centre is a trusted, not-for-profit venture between Greater Manchester Police and Manchester Digital.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

P3M Works

P3M Works

P3M Works delivers Cyber Security and Digital Transformation projects across both private and public sector clients.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.