MI6 is in a Technology Race with Terrorists and Criminals

aa7c2ff01259dd1d2fc33110f10c1be2.jpg?itok=wqlt8LoT

Britain’s intelligence agencies are engaged in a “technology arms race” with terrorists, cybercriminals and other “malicious actors” bent on causing the country harm, the head of MI6 has warned.

Alex Younger said the agencies were facing opponents “unconstrained by consideration of ethics and law” who were exploiting Internet technology to put lives at risk.
 MI6 
In his first public comments since taking over last year as chief of the Secret Intelligence Service (SIS) – as MI6 is more properly known – Younger said traditional human espionage was becoming increasing intertwined with “technical operations”.

Speaking to an invited audience in London, he said that using the Internet and big data had enabled the agencies to “sharpen some very human characteristics” of their work.
“Using data appropriately and proportionately offers us a priceless opportunity to be even more deliberate and targeted in what we do, and so to be better at protecting our agents and this country,” he said. However he said that technology had also created new vulnerabilities, which enemies could exploit. “The bad news is the same technology in opposition hands, an opposition often unconstrained by consideration of ethics and law, allows them to see what we are doing and to put our people and agents at risk,” he said. “So we find ourselves in a technology arms race. Contrary to myth, human intelligence operations are not an alternative to technical operations – the two are interdependent and set to become more so.”

Younger described the threat faced by agencies as the “dark side of globalisation” – including “terrorists, malicious actors in cyberspace and criminals” as he paid tribute to the bravery of his officers.
“As I speak there are SIS officers serving in some of the most dangerous and forbidding places on the planet,” he said. “Others are operating under deep cover, unable to reveal the real nature of their work, or sometimes even their identity. This takes a particular type of bravery and resilience.” He added: “I am particularly proud of the way in which our work with the military developed in Iraq and Afghanistan. Put bluntly, work done by SIS and GCHQ saved many British and coalition lives.”
 “The guiding principle is clear – we cannot protect the values this country represents if we undermine them in the process. And we cannot hope to hold the public’s trust unless they know this principle is effectively overseen.”

Guardian http://bit.ly/1HZrJZ4

« Talk of Cyber Attack as Huge Power Outages Hit Turkey
Will New US Cybersecurity Laws Actually Improve Security? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ControlCase

ControlCase

ControlCase provide solutions that address all aspects of IT-GRCM (Governance, Risk Management and Compliance Management).

Ubisecure

Ubisecure

Ubisecure provide Identity & Access Management solutions.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

G DATA CyberDefense

G DATA CyberDefense

G Data developed the world's first antivirus software. We now ensure the security of small, large and medium-sized companies all over the world.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

Pionen

Pionen

Pionen are a specialist information security consultancy with excellent people and proven security delivery methodologies at its core.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Cybertech Nepal

Cybertech Nepal

Cybertech Nepal is committed to provide high-quality cyber security solutions, including server assessment and hardening, forensics and malware analysis, end-point threat analysis, and VAPT.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.

Internet Watch Foundation (IWF)

Internet Watch Foundation (IWF)

Since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing any online record of the abuse.

Prowler

Prowler

Prowler is at the forefront of the Open Cloud Security movement, championing a new era of transparency, customizability, and community-driven security for cloud environments.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.