The Spycraft Revolution

As modern life is being reshaped by technology, climate, social, and commercial changes, so is one of the world’s oldest professions, espionage is facing tremendous technological, political, legal, social, and commercial changes. 
 
According to Edward Lucas of the Economist, global changes are forcing the intelligence community to face various challenges such as:
 

The balance of power in the spy world is shifting because espionage has become easier for authoritarian states like China, Iran, and Russia, and more difficult for democratic countries where the legitimacy of espionage operations is being questioned to a larger extent than ever before as citizens are becoming more aware and increasingly protective of their privacy.

• Technological advancems have made technical knowledge and skills far more important for successful espionage operations than in the past.  In this context, countries with the most advanced espionage technologies, such as United States, United Kingdom, France, Israel, China, and Russia, have an increasing advantage over countries that cannot be considered a “cryptographic superpower.”
 
• The mobile phone is a game-changer that has made it very easy to spy on people, but incredibly difficult to create cover identities for spies that can withstand extensive scrutiny from suspicious actors.
 
• The growing importance of digital espionage operations is blurring the lines between espionage and warfare, since it is often hard to distinguish between cyber espionage operations and cyber-attacks.
 
• The private intelligence sector is becoming increasingly important, as governments outsource operations to intelligence officials that have retired from the public sector. This is further undermining the public legitimacy of espionage in open societies.
 
• In the digital era, the proliferation of computers, smartphones and other devices that can be used for spy-craft, together with the rise of social media, have decreased the cost of cyber espionage operations. 
As a result, people in charge of security at organisations need to adopt the mindset of counter-intelligence operations.
 
• The “agonizing slowness” of the security clearance industry in the US and other countries” is “hampering the recruitment of useful people, such as the multilingual children of immigrants, and letting through liabilities, such as Edward Snowden,” Lucas believes.
 
• Weary of public scrutiny, intelligence agencies in open societies are overly secretive about their operations. This does not protect them from their adversaries and actually undermines the effectiveness of their efforts. 
 
This only benefits spies of authoritarian states since they don’t have to worry much about running into trouble if they break
some rules.
 
Lucas fears that in the coming years, the trend toward excessive caution by intelligence agencies in open societies could be reversed in countries under active threat from hostile influence operations, like Australia with China and Ukraine with Russia. 
 
Rather than acting with excessive prudence out of fear of public scrutiny, intelligence agencies in such countries may become overly intrusive in the face of a growing foreign threat and start relying too much on “intelligence-led criminal justice sanctions and regulatory sanctions” such as arrests, asset freezes, deportations and bans of media outlets.
 
Oodaloop:        Foreign Policy
 
You Might Also Read:
 
How Uber Could Help Change Spycraft:
 
 
 
« DDoS Attacks Up By 84% In Q1
TalkTalk Hacker Jailed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

VIQU Recruitment

VIQU Recruitment

VIQU Recruitment was formed with the primary focus of providing 'Smarter People Solutions' to the UK’s professional IT & Cyber Security markets.

Dell Technologies Capital

Dell Technologies Capital

At Dell Technologies Capital we lead investment in disruptive, early-stage startups in enterprise and cloud infrastructure.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

Sikich

Sikich

Sikich LLP is a leading professional services firm specializing in accounting, advisory, technology and managed services.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

RightCue Assurance

RightCue Assurance

RightCue Assurance identify opportunities for improvement in the Information Security for your organisation and work with you to reduce cyber risk.

NoviFlow

NoviFlow

NoviFlow is a leading provider of terabit networking software solutions for Communication Service Providers (CSPs).

Centum Digital

Centum Digital

Centum Digital provide services, products and solutions specialized in communications engineering, control and signal intelligence.