MI6 is in a Technology Race with Terrorists and Criminals

aa7c2ff01259dd1d2fc33110f10c1be2.jpg?itok=wqlt8LoT

Britain’s intelligence agencies are engaged in a “technology arms race” with terrorists, cybercriminals and other “malicious actors” bent on causing the country harm, the head of MI6 has warned.

Alex Younger said the agencies were facing opponents “unconstrained by consideration of ethics and law” who were exploiting Internet technology to put lives at risk.
 MI6 
In his first public comments since taking over last year as chief of the Secret Intelligence Service (SIS) – as MI6 is more properly known – Younger said traditional human espionage was becoming increasing intertwined with “technical operations”.

Speaking to an invited audience in London, he said that using the Internet and big data had enabled the agencies to “sharpen some very human characteristics” of their work.
“Using data appropriately and proportionately offers us a priceless opportunity to be even more deliberate and targeted in what we do, and so to be better at protecting our agents and this country,” he said. However he said that technology had also created new vulnerabilities, which enemies could exploit. “The bad news is the same technology in opposition hands, an opposition often unconstrained by consideration of ethics and law, allows them to see what we are doing and to put our people and agents at risk,” he said. “So we find ourselves in a technology arms race. Contrary to myth, human intelligence operations are not an alternative to technical operations – the two are interdependent and set to become more so.”

Younger described the threat faced by agencies as the “dark side of globalisation” – including “terrorists, malicious actors in cyberspace and criminals” as he paid tribute to the bravery of his officers.
“As I speak there are SIS officers serving in some of the most dangerous and forbidding places on the planet,” he said. “Others are operating under deep cover, unable to reveal the real nature of their work, or sometimes even their identity. This takes a particular type of bravery and resilience.” He added: “I am particularly proud of the way in which our work with the military developed in Iraq and Afghanistan. Put bluntly, work done by SIS and GCHQ saved many British and coalition lives.”
 “The guiding principle is clear – we cannot protect the values this country represents if we undermine them in the process. And we cannot hope to hold the public’s trust unless they know this principle is effectively overseen.”

Guardian http://bit.ly/1HZrJZ4

« Talk of Cyber Attack as Huge Power Outages Hit Turkey
Will New US Cybersecurity Laws Actually Improve Security? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

OneSpan

OneSpan

OneSpan (formerly Vasco Data Security) is a global leader in digital identity security, transaction security and business productivity.

Zerocopter

Zerocopter

Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Ergo

Ergo

Ergo is a world-class IT Partner of choice, leveraging the latest technology available in cloud, mobility, big data, analytics, and social media.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Cytenna

Cytenna

Cytenna Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

National Academy of Cyber Security (NACS)

National Academy of Cyber Security (NACS)

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

Ankura Consulting Group

Ankura Consulting Group

Ankura is a global expert services and advisory firm that delivers services and end-to-end solutions in a wide range of areas including cybersecurity and digital transformation.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.