The Spycraft Revolution

As modern life is being reshaped by technology, climate, social, and commercial changes, so is one of the world’s oldest professions, espionage is facing tremendous technological, political, legal, social, and commercial changes. 
 
According to Edward Lucas of the Economist, global changes are forcing the intelligence community to face various challenges such as:
 

The balance of power in the spy world is shifting because espionage has become easier for authoritarian states like China, Iran, and Russia, and more difficult for democratic countries where the legitimacy of espionage operations is being questioned to a larger extent than ever before as citizens are becoming more aware and increasingly protective of their privacy.

• Technological advancems have made technical knowledge and skills far more important for successful espionage operations than in the past.  In this context, countries with the most advanced espionage technologies, such as United States, United Kingdom, France, Israel, China, and Russia, have an increasing advantage over countries that cannot be considered a “cryptographic superpower.”
 
• The mobile phone is a game-changer that has made it very easy to spy on people, but incredibly difficult to create cover identities for spies that can withstand extensive scrutiny from suspicious actors.
 
• The growing importance of digital espionage operations is blurring the lines between espionage and warfare, since it is often hard to distinguish between cyber espionage operations and cyber-attacks.
 
• The private intelligence sector is becoming increasingly important, as governments outsource operations to intelligence officials that have retired from the public sector. This is further undermining the public legitimacy of espionage in open societies.
 
• In the digital era, the proliferation of computers, smartphones and other devices that can be used for spy-craft, together with the rise of social media, have decreased the cost of cyber espionage operations. 
As a result, people in charge of security at organisations need to adopt the mindset of counter-intelligence operations.
 
• The “agonizing slowness” of the security clearance industry in the US and other countries” is “hampering the recruitment of useful people, such as the multilingual children of immigrants, and letting through liabilities, such as Edward Snowden,” Lucas believes.
 
• Weary of public scrutiny, intelligence agencies in open societies are overly secretive about their operations. This does not protect them from their adversaries and actually undermines the effectiveness of their efforts. 
 
This only benefits spies of authoritarian states since they don’t have to worry much about running into trouble if they break
some rules.
 
Lucas fears that in the coming years, the trend toward excessive caution by intelligence agencies in open societies could be reversed in countries under active threat from hostile influence operations, like Australia with China and Ukraine with Russia. 
 
Rather than acting with excessive prudence out of fear of public scrutiny, intelligence agencies in such countries may become overly intrusive in the face of a growing foreign threat and start relying too much on “intelligence-led criminal justice sanctions and regulatory sanctions” such as arrests, asset freezes, deportations and bans of media outlets.
 
Oodaloop:        Foreign Policy
 
You Might Also Read:
 
How Uber Could Help Change Spycraft:
 
 
 
« DDoS Attacks Up By 84% In Q1
TalkTalk Hacker Jailed »

Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cybereason

Cybereason

Cybereason provides real-time detection of malicious activity enabling you to identify the cause and scope of an attack and ensure an effective response.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services business offering legal services in specialist areas including cyber security.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

Meditology

Meditology

Meditology Services is a top-ranked provider of information risk management, cybersecurity, privacy, and regulatory compliance consulting services exclusively for healthcare organizations.