The Spycraft Revolution

As modern life is being reshaped by technology, climate, social, and commercial changes, so is one of the world’s oldest professions, espionage is facing tremendous technological, political, legal, social, and commercial changes. 
 
According to Edward Lucas of the Economist, global changes are forcing the intelligence community to face various challenges such as:
 

The balance of power in the spy world is shifting because espionage has become easier for authoritarian states like China, Iran, and Russia, and more difficult for democratic countries where the legitimacy of espionage operations is being questioned to a larger extent than ever before as citizens are becoming more aware and increasingly protective of their privacy.

• Technological advancems have made technical knowledge and skills far more important for successful espionage operations than in the past.  In this context, countries with the most advanced espionage technologies, such as United States, United Kingdom, France, Israel, China, and Russia, have an increasing advantage over countries that cannot be considered a “cryptographic superpower.”
 
• The mobile phone is a game-changer that has made it very easy to spy on people, but incredibly difficult to create cover identities for spies that can withstand extensive scrutiny from suspicious actors.
 
• The growing importance of digital espionage operations is blurring the lines between espionage and warfare, since it is often hard to distinguish between cyber espionage operations and cyber-attacks.
 
• The private intelligence sector is becoming increasingly important, as governments outsource operations to intelligence officials that have retired from the public sector. This is further undermining the public legitimacy of espionage in open societies.
 
• In the digital era, the proliferation of computers, smartphones and other devices that can be used for spy-craft, together with the rise of social media, have decreased the cost of cyber espionage operations. 
As a result, people in charge of security at organisations need to adopt the mindset of counter-intelligence operations.
 
• The “agonizing slowness” of the security clearance industry in the US and other countries” is “hampering the recruitment of useful people, such as the multilingual children of immigrants, and letting through liabilities, such as Edward Snowden,” Lucas believes.
 
• Weary of public scrutiny, intelligence agencies in open societies are overly secretive about their operations. This does not protect them from their adversaries and actually undermines the effectiveness of their efforts. 
 
This only benefits spies of authoritarian states since they don’t have to worry much about running into trouble if they break
some rules.
 
Lucas fears that in the coming years, the trend toward excessive caution by intelligence agencies in open societies could be reversed in countries under active threat from hostile influence operations, like Australia with China and Ukraine with Russia. 
 
Rather than acting with excessive prudence out of fear of public scrutiny, intelligence agencies in such countries may become overly intrusive in the face of a growing foreign threat and start relying too much on “intelligence-led criminal justice sanctions and regulatory sanctions” such as arrests, asset freezes, deportations and bans of media outlets.
 
Oodaloop:        Foreign Policy
 
You Might Also Read:
 
How Uber Could Help Change Spycraft:
 
 
 
« DDoS Attacks Up By 84% In Q1
TalkTalk Hacker Jailed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Asavie

Asavie

Asavie provide solutions for Enterprise Mobility Management and secure IoT Connectivity.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

Crypto4A Technologies

Crypto4A Technologies

Crypto4A quantum-ready cybersecurity solutions significantly improve protection for Cloud, loT, Blockchain, V2X, government and military application deployments.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

Kinetic Investments

Kinetic Investments

Kinetic Investments is a venture capital firm dedicated to early-stage companies that are transforming the digital landscape.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

CyberHunter Solutions

CyberHunter Solutions

CyberHunter is a leading website security company that provides penetration testing, Network Vulnerability Assessments, cyber security consulting services to prevent cyber attacks.

CrossCountry Consulting

CrossCountry Consulting

CrossCountry Consulting is a trusted business advisory firm that provides customized finance, accounting, human capital management, risk, operations and technology consulting services.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

KCS Group Europe

KCS Group Europe

KCS Group helps its clients to identify and deal with any risks, weaknesses and threats which could impact on the business financially or reputationally.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

Advanced IT

Advanced IT

Reliable managed IT Security & support services that will help you take your business operations to the next level without breaking the bank!