Technology Is Disrupting Intelligence & Espionage

Technology has long been seen as a source of disruption to our lives, communities and civilisations, provoking disruptive change at all scales, from individuals' routine daily activities to dramatic competition between global superpowers. This disruption can have both positive and negative effects, although they are often unevenly distributed across different groups. 

New technologies like Artificial IntelligenceQuantum computing and social media have transformed the intelligence community and given the United States’ adversaries new tools to observe and influence global politics. 

The recent Chinese surveillance balloon that was seen floating over the United States has generated a  vigorous debate which opened a window to the secret world of intelligence gathering as many countries use new technologies to get a political advantage. These disruptive technologies are now making spying far more difficult for Western nations.

In particular, the war in Ukraine is showing the espionage and intelligence worlds the risks and opportunities of open-source intelligence and that the US intelligence operation needs to wise-up to this or risk losing their way.

Professor Amy Zegart of Stanford University is the author of the book Spies, Lies and Algorithms in which she argues that the US government should change the way the intelligence community is organized. She proposes that a new US intelligence agency dedicated to open-source intelligence is needed to keep pace with the technology-driven intelligence revolution.  

In confirmation of this view, Jeremy Fleming, director of the British GCHQ spy agency, has said the West faces a battle for control of technologies such as artificial intelligence, synthetic biology and genetics.  Fleming has said quantum computing, which uses the phenomena of quantum mechanics to deliver a leap forward in computation, was getting closer and posed huge opportunities but also great risks.

The power balance in the spy world is changing and closed societies now have the edge over open ones. It has become harder for Western countries to spy on places such as China, Iran, and Russia and easier for those countries’ intelligence 

Foreign Affairs:    European Parliament:   Australian Financial Review:    Reuters:   Council on Global Affairs

You Might Also Read: 

From Ciphers To Cyber Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« How You Can Experience Safe Streaming With A Free VPN
Cyber Criminals' Earnings Fall As More Ransom Victims Refuse Payment  »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

Ross & Baruzzini

Ross & Baruzzini

Ross & Baruzzini delivers integrated technology, consulting, and engineering solutions for safe, sustainable, and resilient facilities.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

Globesecure Technologies

Globesecure Technologies

Globesecure Technologies is a networks and cyber security company. We are here to resolve business security challenges and secure the digital transformation journey of our clients.

Board of Cyber

Board of Cyber

Board of Cyber offers Security Rating: a fast, non-intrusive, continuous, 100% automated solution to evaluate the cyber performance of an organization.

BTQ Technologies

BTQ Technologies

BTQ is a global quantum technology company focused on securing mission critical networks.

Defend

Defend

DEFEND are 100% focused on providing managed cybersecurity solutions and services that make a real difference to the cyber resilience of your organisation.

Scytale

Scytale

Scytale is the global leader in security compliance automation, helping companies get compliant and stay compliant.