British Spies Looking For Private AI

The British domestic spy agency MI5, wants to strengthen its collaboration with the private sector in harnessing artificial intelligence to help combat hostile state and terrorist activity.

The agency no longer believes it has the in-house talent to develop what it needs in areas such as artificial intelligence and data analysis and the newly appointed chief Ken McCallum, has expressed a desire to partner with technology companies to better exploit cutting-edge tech. 

MI5 is promising  to work more closely with the private sector in harnessing artificial intelligence in tackling hostile state and terrorist activity.

Insiders said that McCallum wanted to be clearer about the threat posed by China, particularly in terms of industrial espionage and cyberwarfare, in the belief that the level of spying by Beijing in the UK was not appreciated more widely. In particular,
the organisation wants to use machine learning to extract useful intelligence from vast datasets held by the private sector, according to tech.newstatesman.com.

Since the 9/11 attacks, terrorism has dominated MI5’s agenda, but that threat is now diversifying, with an increase in far-right activity, which the intelligence agency has now begun to monitor. The organization established in 1909 to counter German espionage ahead of World War I, is the agency tasked with protecting British national security.

The UK Treasury has already established a security investment fund so that the UK intelligence agencies can nurture startups developing in-demand tools. Government agencies would have to explain to the public when they are using AI and or Machine Learning to fight crime.  

GOV.UK:         I-HLS:        Guardian:       New Statesman:

You  Might Also Read: 

GCHQ Doesn't Always Tell Vendors If Their Software Is Vulnerable:

 

 

 

 

« Addressing Cyber Threats With Positive Action
Business Needs To Lock Down Cyber Security »

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Pro2col Limited

Pro2col Limited

Pro2col is an independent consultancy specialising in secure managed file transfer solutions.

Marclay Associates

Marclay Associates

Marclay are specialists in cyber and information security consulting and services.

SK-CERT

SK-CERT

SK-CERT National Computer Computer Emergency Response Team of Slovakia.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

Arm

Arm

Arm delivers a complete IoT solution, from providing the IP for the chip to delivering the cloud services to securely manage the deployment of products throughout their lifecycle.

Fortalice

Fortalice

Fortalice provide customizable consulting services built on proven methodology to strengthen your business cyber security defenses.

Valen Solutions

Valen Solutions

Valen Solutions is a specialist cybersecurity recruitment firm.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.