From Ciphers To Cyber Security

Traditional secretive government intelligence services must become more transparent to win the confidence of the national population.

For secret intelligence agencies to function in the digital world and remain secure against cyber threats they will need the trust of citizens.  Director of GCHQ Jeremy Fleming (pictured) made theses comments at the launch of a new exhibition at London's Science Museum which explores the history of ciphers, codebreaking and cyber-security from the First World War to the present. 

Top Secret: From Ciphers to Cybersecurity coincidences with the 100th anniversary of GCHQ and allows the general public to see documents, devices and appliances from the agency's hundred years of history. 

This is very significant as many of these files and were previously hidden behind closed doors, as well as other items relating to security and communications.

Items on display are cipher machines from the early 1900s, info from the 1st World War trenches, and Second World War codebreaking machines used at Bletchley Park. All of this to a current laptop infected with WannaCry ransomware, and the destroyed hard drive alleged to contain secret information that Edward Snowden provided to the media.

The work of the cyber arm of GCHQ, the National Cyber Security Centre (NCSC), is also explored as part of the exhibit.

"I welcome this transparency because the world has changed. It's no longer enough got us to serve in secret, we must justify the trust of the people we seek to protect," said Fleming, who argued that transparency is key to GCHQ serving in one of its key roles, protecting organisations and the public from cyberattacks.

"If we're to prosper as a democratic nation in the digital age, openness is our strength. Openness that fosters the innovation and enterprise that allows us to harness the benefits of the technological revolution and openness that will give everyone access to the tools and knowledge to keep themselves and their families secure in the digital world".

One way GCHQ has already done that is with its cyber security accelerator programme, where intelligence officials and members of the cybersecurity industry mentor startups that are working to prevent cyberattacks and data breaches, using technology to help protect against threats posed by technology.

"Technology will surely become even more central to our economic prosperity and to the development of our society," said Fleming.

"The digital era is already bringing new and unprecedented challenges as we try to ensure that everyone can live and do business safely online," he added.

It's hoped that the free exhibition, which runs until February 2020, will provide inspiration for young people to think about a role in cyber-security and similar areas, paving the way for the country to be protected against future digital threats.

"We need to inspire the next generation of brilliant minds, so that our children can see themselves working in this world, understand what they bring to it and make them able to shape our digital future," said Fleming.

"That's why this collaboration with the Science Museum is so important. If it results in a greater interest in STEM and cyber, a broader understanding of the difficult work we do, or causes a few young people to want to find out more, then it will have been a success."

The exhibition has opened shortly after the end of a 5 year legal, with the UK supreme court ruling that the UK's spy agencies and their hacking activities can be made subject to court challenges. 

ZDNet:             Science Museum

You Might Also Read:

GCHQ Certified Training:

GCHQ Data Collection Violated Rights To Privacy:

 


 

 

« Business Leaders Are Ignoring Cyber Risks
Most Organisations Lack Cyber Resilience »

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / Zero Trust Network Access Guide

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this free report for a limited time only.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CoreSite

CoreSite

CoreSite Realty Corporation (NYSE: COR) delivers secure, reliable, high-availability data center products and services across eight key North American

Alert Logic

Alert Logic

Alert Logic has more than a decade of experience pioneering and refining cloud solutions that are secure, flexible and designed to work with hosting and cloud service providers.

Global Digital Forensics (GDF)

Global Digital Forensics (GDF)

GDF specialise in Digital Forensics and e-Discovery. Other services include Data Breach Response and Cyber Security.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

CodeHunter

CodeHunter

CodeHunter is a malware hunting SaaS platform designed to detect all variations of malware, known and unknown, without the need for source code or signatures.