MI6 Chief Says Cyber Brings ‘potentially existential challenge’

In his second public speech in more than four years, the head of the British intelligence service said that a fourth industrial revolution is blurring the lines between the physical, digital and biological domains, a change that could present a “potentially existential challenge” to liberal democracies.

The rise of big data and other technologies present a call to arms for MI6 and its allies, Alex Younger, the chief of the Secret Intelligence Service, said during a Dec. 3 speech at St. Andrews University in Scotland.

“We and our allies face a battle to make sure technology works to our advantage, not to that of our opponents,” Younger said. “There will be a dividing line between those intelligence services that grasp this, as the UK agencies have, and those services that don’t.

Younger presented MI6 as an organisation in the midst of transforming from a human intelligence agency to one that embraces technological innovation.

“We are evolving rapidly. Cyber is now our fastest-growing directorate. We are shifting our focus to the nexus between humans and technology.”

As a result, the British intelligence agency has bolstered its collaboration with the private sector though a new investment fund, according to the British intelligence head.

The speech was rare for Younger, who is also known as “C” in his official capacity, and just the second since he took the service’s top job in 2014. 

“In the cyber age, newcomers will often be better equipped to solve problems than those, like me, steeped in experience can be,” Younger said.

The head of MI6 presented the world as one of liberal democracies fighting for order against an unnamed “skilled opponent unrestrained by any notion of law or morality.”

“Simply put, we’ve got to innovate faster than they can. Indeed, future generations would not forgive us if it were otherwise,” Younger said.

However, the British spy chief took square aim at one state who appears to be a member of this ideological opposition. Younger said that the British government’s use of bulk data and modern analysts contributed to embarrassing Russia after the poisoning of a former Kremlin spy in Salisbury.

Younger’s speech comes amid what US officials have called in conversations with Fifth Domain an unprecedented intelligence cooperation between the British and American governments. They point to recent Five Eyes agreements that have bolstered cyber threat sharing and the joint attribution of malicious actors.

Younger described the British government’s attribution of the NotPetya attack by the Russian government on Ukraine as “attaching a cost to malign cyber activity.”

“Much of the evolving state threat is about our opponents’ increasingly innovative exploitation of modern technology.”

Fifth Domain:

You Might Also Read:

Is Technology Undermining Democracy?

« Germany Detects New Russian Cyber-Attack
Darktrace CEO Says Cyber Security Is A Global Arms Race »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

CSIRT.CZ

CSIRT.CZ

CSIRT.CZ is the National Computer Security Incident Response Team of the Czech Republic.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

XLAB

XLAB

XLAB is an R&D company with a strong research background in the fields of distributed systems, cloud computing, security and dependability of systems.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Bfore.ai

Bfore.ai

Stop future attacks, today. Bfore.ai is an operational threat intelligence feed to add predictive technology to your security infrastructure.

Nemstar

Nemstar

Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.