British Spies Must Adapt to Survive

Britain's senior spy chief says that ‘the digital era has profoundly changed our operating environment’.  Britain's Secret Intelligence Service, better known as MI6, must become more open in order to do its secret work effectively. That's according to its chief, Richard Moore, in his first major public speech since taking on the role in October 2020.

Artificial Intelligence (AI), quantum computing and digital technology have combined to completely transform the way human intelligence is gathered by spies, presenting MI6 with major challenges in the digital age.

The West's adversaries such as China and Russia are racing to master Artificial Intelligence (AI) in a way which could revolutionise geopolitics over the next ten years Moors said, in a rare public appearance at the London-based think tank the International Institute for Strategic Studies.

As one of Britain's three intelligence agencies, along with the domestic security service (MI5) and GCHQ, MI6's role has always been to acquire secrets from overseas targets to help protect Britain's national security. While human intelligence - old-fashioned spying - is central to its work, the MI6 chief points to his service's innovations over time. Examples range "from the chemistry that enabled us to produce secret writing technologies in the early days, to the wireless and secure speech technologies we developed during the Second World War".

Inside the MI6 London HQ there is a real-life 'Q Section' that works to provide Britain's spies with the latest gadgets to keep them safe and secret, although mastering intelligence in the age of rapidly accelerating technology is no longer  something the British spy agency can do by itself. 

Moore said that the rapid speed of technological development has been a key contributing factor in making the world a “dramatically more complicated” place. 

MI6 is growing is cyber directorate faster than any other unit and is setting up partnerships with technology companies and experts across industry and academia. To help cultivate innovation, there is also a focus on recruiting people from a wide range of backgrounds and in possession of a diverse array of skills.

Biometric data and facial recognition have made it far harder for intelligence officers to assume false identities in hostile countries without being recognised and exposed. Furthermore,  the traditional boundaries between virtual and real; the domestic and the international; between states and non-state actors and between war and peace have grown opaque. 

Britain's  Adversaries

Russia has been rapidly developing its hacking capabilities and has been accused of perpetrating a wide range of large scale, sophisticated, hacking activities directed against critical infrastructure, the private sector and numerous Western government agencies.There have been powerful attempts by hackers under Russian protection to extort money from UK businesses in ransomware attacks. "Our adversaries are pouring money and ambition into mastering artificial intelligence, quantum computing and synthetic biology because they know... this will give them leverage" Moore said.

MI6 will have to become “more open to stay secret” and work with tech companies to counter threats posed by China and Russia who seek to gain advantage by mastering artificial intelligence and other emerging technologies. Despite the importance of cutting edeg technologies “I do not expect our human intelligence role will ever change fundamentally,” Moore said.

“We will always need to understand the motivations, intentions and aspirations of people in other countries. Even in an era of artificial intelligence, you need human intelligence. In fact, it will become even more important in a more complex world.” 

BBC:      Reuters:    Civil Service World:    Business Telegraph:     Newsbreak:    Guardian:    Flipboard:   Reddit:     

You Might Also Read: 

Cyber Warfare, Intelligence & Malware:

 

« Britain Is Fighting A Ransomware Epidemic
Clearview Faces £17 Million Penalty For Breaching Data Laws »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

British Insurance Brokers’ Association (BIBA)

British Insurance Brokers’ Association (BIBA)

BIBA is the UK’s leading general insurance intermediary organisation. Use the ‘Find Insurance‘ section of the BIBA website to find providers of cyber risk insurance in the UK.

RSA Insurance Group

RSA Insurance Group

RSA is one of the world’s leading multinational quoted insurance groups. Commercial services include cyber risk insurance.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

DomainTools

DomainTools

DomainTools helps security analysts turn threat data into threat intelligence.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

Incopro

Incopro

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Inspectiv

Inspectiv

Inspectiv offers a turn-key solution to continuously identify security vulnerabilities and provide security assurance.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.