From Ciphers To Cyber Security

Traditional secretive government intelligence services must become more transparent to win the confidence of the national population.

For secret intelligence agencies to function in the digital world and remain secure against cyber threats they will need the trust of citizens.  Director of GCHQ Jeremy Fleming (pictured) made theses comments at the launch of a new exhibition at London's Science Museum which explores the history of ciphers, codebreaking and cyber-security from the First World War to the present. 

Top Secret: From Ciphers to Cybersecurity coincidences with the 100th anniversary of GCHQ and allows the general public to see documents, devices and appliances from the agency's hundred years of history. 

This is very significant as many of these files and were previously hidden behind closed doors, as well as other items relating to security and communications.

Items on display are cipher machines from the early 1900s, info from the 1st World War trenches, and Second World War codebreaking machines used at Bletchley Park. All of this to a current laptop infected with WannaCry ransomware, and the destroyed hard drive alleged to contain secret information that Edward Snowden provided to the media.

The work of the cyber arm of GCHQ, the National Cyber Security Centre (NCSC), is also explored as part of the exhibit.

"I welcome this transparency because the world has changed. It's no longer enough got us to serve in secret, we must justify the trust of the people we seek to protect," said Fleming, who argued that transparency is key to GCHQ serving in one of its key roles, protecting organisations and the public from cyberattacks.

"If we're to prosper as a democratic nation in the digital age, openness is our strength. Openness that fosters the innovation and enterprise that allows us to harness the benefits of the technological revolution and openness that will give everyone access to the tools and knowledge to keep themselves and their families secure in the digital world".

One way GCHQ has already done that is with its cyber security accelerator programme, where intelligence officials and members of the cybersecurity industry mentor startups that are working to prevent cyberattacks and data breaches, using technology to help protect against threats posed by technology.

"Technology will surely become even more central to our economic prosperity and to the development of our society," said Fleming.

"The digital era is already bringing new and unprecedented challenges as we try to ensure that everyone can live and do business safely online," he added.

It's hoped that the free exhibition, which runs until February 2020, will provide inspiration for young people to think about a role in cyber-security and similar areas, paving the way for the country to be protected against future digital threats.

"We need to inspire the next generation of brilliant minds, so that our children can see themselves working in this world, understand what they bring to it and make them able to shape our digital future," said Fleming.

"That's why this collaboration with the Science Museum is so important. If it results in a greater interest in STEM and cyber, a broader understanding of the difficult work we do, or causes a few young people to want to find out more, then it will have been a success."

The exhibition has opened shortly after the end of a 5 year legal, with the UK supreme court ruling that the UK's spy agencies and their hacking activities can be made subject to court challenges. 

ZDNet:             Science Museum

You Might Also Read:

GCHQ Certified Training:

GCHQ Data Collection Violated Rights To Privacy:

 


 

 

« Business Leaders Are Ignoring Cyber Risks
Most Organisations Lack Cyber Resilience »

Directory of Suppliers

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CyberPolicy

CyberPolicy

CyberPolicy is a cyber protection solution for small businesses. It combines three important components against cyber threats - Cyber Plan, Cybersecurity and Cyber Insurance.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Secure-NOK

Secure-NOK

Secure-NOK provides products and solutions that detect and remove security attacks and harmful events in industrial networks and control systems.

TEISS

TEISS

Teiss.co.uk is a website dedicated to providing information about cyber security. TEISS also provide a series of conferences and events focused on cyber security.

IQ Solutions

IQ Solutions

IQ Solutions is a Digital Integrator and an ICT Services Provider, focusing on innovative Cyber Secured ICT managed solutions tailored to the needs of the Maritime Industry.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

Intel Capital

Intel Capital

Intel Capital, Intel's strategic investment organization, backs innovative technology startups and companies worldwide. We invest in a broad range of hardware, software, and services.