The Spycraft Revolution

As modern life is being reshaped by technology, climate, social, and commercial changes, so is one of the world’s oldest professions, espionage is facing tremendous technological, political, legal, social, and commercial changes. 
 
According to Edward Lucas of the Economist, global changes are forcing the intelligence community to face various challenges such as:
 

The balance of power in the spy world is shifting because espionage has become easier for authoritarian states like China, Iran, and Russia, and more difficult for democratic countries where the legitimacy of espionage operations is being questioned to a larger extent than ever before as citizens are becoming more aware and increasingly protective of their privacy.

• Technological advancems have made technical knowledge and skills far more important for successful espionage operations than in the past.  In this context, countries with the most advanced espionage technologies, such as United States, United Kingdom, France, Israel, China, and Russia, have an increasing advantage over countries that cannot be considered a “cryptographic superpower.”
 
• The mobile phone is a game-changer that has made it very easy to spy on people, but incredibly difficult to create cover identities for spies that can withstand extensive scrutiny from suspicious actors.
 
• The growing importance of digital espionage operations is blurring the lines between espionage and warfare, since it is often hard to distinguish between cyber espionage operations and cyber-attacks.
 
• The private intelligence sector is becoming increasingly important, as governments outsource operations to intelligence officials that have retired from the public sector. This is further undermining the public legitimacy of espionage in open societies.
 
• In the digital era, the proliferation of computers, smartphones and other devices that can be used for spy-craft, together with the rise of social media, have decreased the cost of cyber espionage operations. 
As a result, people in charge of security at organisations need to adopt the mindset of counter-intelligence operations.
 
• The “agonizing slowness” of the security clearance industry in the US and other countries” is “hampering the recruitment of useful people, such as the multilingual children of immigrants, and letting through liabilities, such as Edward Snowden,” Lucas believes.
 
• Weary of public scrutiny, intelligence agencies in open societies are overly secretive about their operations. This does not protect them from their adversaries and actually undermines the effectiveness of their efforts. 
 
This only benefits spies of authoritarian states since they don’t have to worry much about running into trouble if they break
some rules.
 
Lucas fears that in the coming years, the trend toward excessive caution by intelligence agencies in open societies could be reversed in countries under active threat from hostile influence operations, like Australia with China and Ukraine with Russia. 
 
Rather than acting with excessive prudence out of fear of public scrutiny, intelligence agencies in such countries may become overly intrusive in the face of a growing foreign threat and start relying too much on “intelligence-led criminal justice sanctions and regulatory sanctions” such as arrests, asset freezes, deportations and bans of media outlets.
 
Oodaloop:        Foreign Policy
 
You Might Also Read:
 
How Uber Could Help Change Spycraft:
 
 
 
« DDoS Attacks Up By 84% In Q1
TalkTalk Hacker Jailed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

Gigasoft

Gigasoft

Gigasoft provide secure online data backup & cloud backup services for the education sector and businesses.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

Bridewell

Bridewell

Bridewell provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

Perseus Cyber Security

Perseus Cyber Security

Perseus provides all-around digital protection for small and medium-sized businesses through state-of-the-art software solutions, flexible online training and emergency response.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.