The Spycraft Revolution

As modern life is being reshaped by technology, climate, social, and commercial changes, so is one of the world’s oldest professions, espionage is facing tremendous technological, political, legal, social, and commercial changes. 
 
According to Edward Lucas of the Economist, global changes are forcing the intelligence community to face various challenges such as:
 

The balance of power in the spy world is shifting because espionage has become easier for authoritarian states like China, Iran, and Russia, and more difficult for democratic countries where the legitimacy of espionage operations is being questioned to a larger extent than ever before as citizens are becoming more aware and increasingly protective of their privacy.

• Technological advancems have made technical knowledge and skills far more important for successful espionage operations than in the past.  In this context, countries with the most advanced espionage technologies, such as United States, United Kingdom, France, Israel, China, and Russia, have an increasing advantage over countries that cannot be considered a “cryptographic superpower.”
 
• The mobile phone is a game-changer that has made it very easy to spy on people, but incredibly difficult to create cover identities for spies that can withstand extensive scrutiny from suspicious actors.
 
• The growing importance of digital espionage operations is blurring the lines between espionage and warfare, since it is often hard to distinguish between cyber espionage operations and cyber-attacks.
 
• The private intelligence sector is becoming increasingly important, as governments outsource operations to intelligence officials that have retired from the public sector. This is further undermining the public legitimacy of espionage in open societies.
 
• In the digital era, the proliferation of computers, smartphones and other devices that can be used for spy-craft, together with the rise of social media, have decreased the cost of cyber espionage operations. 
As a result, people in charge of security at organisations need to adopt the mindset of counter-intelligence operations.
 
• The “agonizing slowness” of the security clearance industry in the US and other countries” is “hampering the recruitment of useful people, such as the multilingual children of immigrants, and letting through liabilities, such as Edward Snowden,” Lucas believes.
 
• Weary of public scrutiny, intelligence agencies in open societies are overly secretive about their operations. This does not protect them from their adversaries and actually undermines the effectiveness of their efforts. 
 
This only benefits spies of authoritarian states since they don’t have to worry much about running into trouble if they break
some rules.
 
Lucas fears that in the coming years, the trend toward excessive caution by intelligence agencies in open societies could be reversed in countries under active threat from hostile influence operations, like Australia with China and Ukraine with Russia. 
 
Rather than acting with excessive prudence out of fear of public scrutiny, intelligence agencies in such countries may become overly intrusive in the face of a growing foreign threat and start relying too much on “intelligence-led criminal justice sanctions and regulatory sanctions” such as arrests, asset freezes, deportations and bans of media outlets.
 
Oodaloop:        Foreign Policy
 
You Might Also Read:
 
How Uber Could Help Change Spycraft:
 
 
 
« DDoS Attacks Up By 84% In Q1
TalkTalk Hacker Jailed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

Cyber Data-Risk Managers

Cyber Data-Risk Managers

Cyber Data-Risk Managers Pty Ltd is an insurance broker based in Melbourne, Australia specializing in Cyber insurance / Data breach insurance.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Bit Sentinel

Bit Sentinel

Bit Sentinel is an information security company. We help companies like yours discover, prioritize, and effectively remediate potential cybersecurity risks.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

QPoint Technologies

QPoint Technologies

QPoint provides solutions and consulting in areas including software engineering, testing, cybersecurity, ICT, web, mobile, project management, and complex integration processes.