British Spy Chief Says War In Ukraine Is Changing Intelligence Gathering

For a long time cyber attacks were believed to be the command of criminals seeking to steal or extort money, but now it’s become clear that nations are using cyber crime as a part of their offensive military  operations.

Now, nation-state sponsored cyber attacks by professional hacking groups are being widely used by governments, including as Russia and China, to take advantage of their diplomatic adversaries’ digital security weaknesses.

Ransomware, phishing and distributed denial-of-service (DDoS) attacks are just a few of the many weapons that states are now using in geopolitical conflicts that are increasingly playing out in cyberspace rather than on the battlefield.

In particular, the Ukraine conflict has marked a sea-change for the release of secret intelligence, the head of the spy agency GCHQ Sir Jeremy Fleming has said.

Washington and London took the unusual step of publicising their knowledge of Russia's plans ahead of its invasion. The head of US intelligence, Avril Haines, said lessons had been learned including the limits of such moves to publicise intelligence. Displaying an unprecedented degree of transparency, the British GCHQ spy chief, Sir Jeremy Fleming recently interviewed her for BBC Radio 4's Today news programme. As a 30-year veteran of the secret world, Sir Jeremy Fleming said the act of declassifying intelligence was "quite hard in many ways" because a lot of effort went into getting secret intelligence - but there was no point collecting it unless it could be used.

He said he agreed with the sea-change of getting intelligence out there and using it to undermine a narrative, but much of the world had not completely bought into the argument. He also said that Ukraine had seen a new type of conflict in which intelligence was at the forefront. "Keeping the population up-to-date on what we're seeing and involving them in the conversation in a more significant way is crucial," Ms Haines added in her conversation with Sir Jeremy, who is guest-editing the Today programme. As director of national intelligence, Ms Haines co-ordinates all America's spy agencies - and she played a pivotal role in pushing for sensitive intelligence to be declassified and published in the run-up to Russia's February invasion. 

This unusual step was designed to deter Russia and counter its claims it was acting defensively. "We were able to have an impact," Ms Haines said, "at the same times what also is clear… is that our impact was far greater in the West than it was in other places in the world." In Russia, she said the efforts had "basically no impact" because of the control the Kremlin exerted over information flows inside the country. "Authoritarian states have this kind of asymmetric advantage where they're effectively controlling the information to their populations," Ms Haines said. 

She then added that Russia also tried to take advantage of the open information flow in western societies to promote their narratives and exacerbate divisions in society. 

Working out how to understand and counter this foreign influence was a growing area for Western intelligence communities. "The Russians engaged in a very concerted information campaign around the world on these issues... One of their main narratives is the United States is provoking this conflict, and that Nato and Ukraine are setting the conditions and threatening Russia and that sort of forced them into this position." she said

Jeremy Fleming also said that "much of the world" had not completely bought the Western side of the argument. The GCHQ chief said it was important that it was not just government or intelligence agency voices in the debate.  "There are different alliances, which enable us to show and demonstrate that we are more trusted," he said.

Sir Jeremy said the private sector had played an important part in the conflict, including satellite imagery from private providers, or the work of companies like Microsoft in providing cyberdefences for Ukraine. 

Asked if his successor could be the first woman to lead GCHQ, Sir Jeremy said "let's hope so" noting the organisation had not been led by either a woman or someone from an ethnic minority background and that it was time to "show a difference at the top" of intelligence agencies.

BBC:      Gov.UK:      GCHQ:    Raconteur:    Independent:  

You Might Also Read: 

Britain Has Secretly Contributed £6m To Ukraine’s Cyber Defence:
 


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


« Spying On Mobile Phone Calls
Five Data Security Trends Organisations Must Deal With »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

SecureWorks

SecureWorks

SecureWorks provides intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

RiskLens

RiskLens

RiskLens is a software company that specializes in the quantification of cybersecurity risk.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

Cognyte

Cognyte

Cognyte is a global leader in investigative analytics software that empowers a variety of government and other organizations with Actionable Intelligence for a Safer World.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Winbond Electronics

Winbond Electronics

Winbond is a Specialty memory IC company. Product lines include Code Storage Flash Memory, TrustME® Secure Flash, Specialty DRAM and Mobile DRAM.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Material Security

Material Security

Material is solving one of the most fundamental problems in security: protecting the data sitting in mailboxes.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.