MI6 | About MI6 | The History of the Secret Intellience Service

The Intelligence Network in the UK 

 

GCHQ (Government Communications Headquarters)

GCHQ (Government Communications Headquarters) employs more than 6,000 people. It works with Her Majesty’s Government (HMG) and industry to defend Government systems against cyber threats and provides support to the Armed Forces. It gathers and analyses electronic communications intelligence both inside and outside the UK.

 

MI5 (the Security Service)

MI5 (the Security Service) employs around 4,000 staff and protects the UK against threats to national security. It gathers and analyses intelligence on national security threats to the UK.

 

SIS (Secret Intelligence Service)

SIS (Secret Intelligence Service) employs around 2,500 staff and works secretly overseas, developing foreign contacts and gathering intelligence. It operates across the globe to counter terrorism, resolve international conflict and prevent the spread of nuclear and other non-conventional weapons.

 

DI (Defence Intelligence)

DI (Defence Intelligence) is part of the Ministry of Defence (MOD) and has a workforce in the region of 4,000 staff, over 65% of whom are military personnel. It gathers and analyses intelligence for military and national security purposes.

 

NSS (National Security Secretariat)

NSS (National Security Secretariat) employs around 150 staff and co-ordinates security and intelligence matters across Government. It also directly supports the National Security Council (NSC), which provides political leadership and high-level strategy for intelligence and security activities.

OSCT (Office for Security and Counter-Terrorism)

OSCT (Office for Security and Counter-Terrorism) employs more than 600 staff and is part of the Home Office. It provides co-ordination and strategic direction for, and delivery of, the UK’s counter-terrorism strategy.

 

JIO (Joint Intelligence Organisation)

JIO (Joint Intelligence Organisation) employs fewer than 100 staff. It supports the Joint Intelligence Committee, which comprises senior intelligence and policy officials and produces all-source intelligence assessments for Government.

 

 

 

 

History of The Secret Intelligence Service - MI6

Foundation

The service derived from the Secret Service Bureau, which was founded in 1909. The Bureau was a joint initiative of the Admiralty and the War Office to control secret intelligence operations in the UK and overseas, particularly concentrating on the activities of the Imperial German government. The bureau was split into naval and army sections which, over time, specialised in foreign espionage and internal counter-espionage activities, respectively. This specialisation was because the Admiralty wanted to know the maritime strength of the Imperial German Navy. This specialisation was formalised before 1914. During the First World War in 1916, the two sections underwent administrative changes so that the foreign section became the section MI1(c) of the Directorate of Military Intelligence.

 

Its first director was Captain Sir Mansfield George Smith-Cumming, who often dropped the Smith in routine communication. He typically signed correspondence with his initial C in green ink. This usage evolved as a code name, and has been adhered to by all subsequent directors of SIS when signing documents to retain anonymity.

First World War

The service's performance during the First World War was mixed, because it was unable to establish a network in Germany itself. Most of its results came from military and commercial intelligence collected through networks in neutral countries, occupied territories, and Russia.

 

Inter-War period

After the war, resources were significantly reduced but during the 1920s, SIS established a close operational relationship with the diplomatic service. In August 1919, Cumming created the new passport control department, providing diplomatic cover for agents abroad. The post of Passport Control Officer provided operatives with diplomatic immunity Circulating Sections established intelligence requirements and passed the intelligence back to its consumer departments, mainly the War Office and Admiralty.

 

The debate over the future structure of British Intelligence continued at length after the end of hostilities but Cumming managed to engineer the return of the Service to Foreign Office control. At this time, the organisation was known in Whitehall by a variety of titles including the Foreign Intelligence Service, the Secret Service, MI1(c), the Special Intelligence Service and even C's organisation. Around 1920, it began increasingly to be referred to as the Secret Intelligence Service (SIS), a title that it has continued to use to the present day and which was enshrined in statute in the Intelligence Services Act 1994. During the Second World War, the name MI6 was used as a flag of convenience, the name by which it is frequently known in popular culture since.

In the immediate post-war years under Sir Mansfield George Smith-Cumming and throughout most of the 1920s, SIS was focused on Communism, in particular, Russian Bolshevism. Examples include a thwarted operation to overthrow the Bolshevik government in 1918 by SIS agents Sidney George Reilly and Sir Robert Bruce Lockhart, as well as more orthodox espionage efforts within early Soviet Russia headed by Captain George Hill.

Smith-Cumming died suddenly at his home on 14 June 1923, shortly before he was due to retire, and was replaced as C by Admiral Sir Hugh "Quex" Sinclair. Sinclair created the following sections:

  • A central foreign counter-espionage Circulating Section, Section V, to liaise with the Security Service to collate counter-espionage reports from overseas stations.

  • An economic intelligence section, Section VII, to deal with trade, industry and contraband.

  • A clandestine radio communications organisation, Section VIII, to communicate with operatives and agents overseas.

  • Section N to exploit the contents of foreign diplomatic bags

  • Section D to conduct political covert actions and paramilitary operations in time of war. Section D would organise the Home Defence Scheme resistance organisation in the UK and come to be the foundation of the Special Operations Executive (SOE) during the Second World War

 

With the emergence of Germany as a threat following the ascendence of the Nazis, in the early 1930s attention was shifted in that direction.

MI6 assisted the Gestapo, the Nazi secret police, with "the exchange of information about communism" as late as October 1937, well into the Nazi era; the head of the British agency's Berlin station, Frank Foley, was still able to describe his relationship with the Gestapo's so-called communism expert as "cordial".

Sinclair died in 1939, after an illness, and was replaced as C by Lt Col. Stewart Menzies (Horse Guards), who had been with the service since the end of World War I.

On 26 and 27 July 1939, in Pyry near Warsaw, British military intelligence representatives including Dilly KnoxAlastair Denniston and Humphrey Sandwith were introduced by their allied Polish counterparts into their Enigma-decryption techniques and equipment, including Zygalski sheets and the cryptologic "Bomba", and were promised future delivery of a reverse-engineered, Polish-built duplicate Enigma machine. The demonstration represented a vital basis for the later British continuation and effort. During the war, British cryptologists decrypted a vast number of messages enciphered on Enigma. The intelligence gleaned from this source, codenamed "Ultra" by the British, was a substantial aid to the Allied war effort.

 

Second World War

During the Second World War the human intelligence work of the service was complemented by several other initiatives:

GC&CS was the source of Ultra intelligence, which was very useful.

The chief of SIS, Stewart Menzies insisted on wartime control of codebreaking, and this gave him immense power and influence, which he used judiciously. By distributing the Ultra material collected by the Government Code & Cypher School, for the first time, MI6 became an important branch of the government. Extensive breaches of Nazi Enigma signals gave Menzies and his team enormous insight into Adolf Hitler's strategy, and this was kept a closely held secret.

The British intelligence services signed a special agreement with their allied Polish counterparts 1940. In July 2005, the British and Polish governments jointly produced a two-tome study of bilateral intelligence cooperation in the War, which revealed information that had until then been officially secret. The Report of the Anglo-Polish Historical Committee was written by leading historians and experts who had been granted unprecedented access to British intelligence archives, and concluded that 48 percent of all reports received by British secret services from continental Europe in 1939–45 had come from Polish sources. This was facilitated by the fact that occupied Poland had a tradition of insurgency organizations passed down through generations, with networks in emigre Polish communities in Germany and France; a major part of Polish resistance activity was clandestine and involved cellular intelligence networks; while Nazi Germany used Poles as forced labourers across the continent, putting them in a unique position to spy on the enemy. Liaison was undertaken by SIS officer Wilfred Dunderdale, and reports included advanced warning of the Afrikakorps' departure for Libya, awareness of the readiness of Vichy French units to fight against the Allies or switch sides in Operation Torch, and advance warning both of Operation Barbarossaand Operation Edelweiss, the German Caucasus campaign. Polish-sourced reporting on German secret weapons began in 1941, and Operation Wildhorn enabled a British special operations flight to airlift a V-2 Rocket that had been captured by the Polish resistance. Polish secret agent Jan Karski delivered the British the first Allied intelligence on the Holocaust. Via a female Polish agent, the British also had a channel to the anti-Nazi chief of the Abwehr, Admiral Wilhelm Canaris.

The most significant failure of the service during the war was known as the Venlo incident, named for the Dutch town where much of the operation took place. Agents of the German army secret service, the Abwehr, and the counter-espionage section of the Sicherheitsdienst (SD), posed as high-ranking officers involved in a plot to depose Hitler. In a series of meetings between SIS agents and the 'conspirators', SS plans to abduct the SIS team were shelved due to the presence of Dutch police. On the night of 8–9 November 1939, a meeting took place without police presence. There, the two SIS agents were duly abducted by the SS.

In 1940, journalist and Soviet agent Kim Philby applied for a vacancy in Section D of SIS, and was vetted by his friend and fellow Soviet agent Guy Burgess. When Section D was absorbed by Special Operations Executive (SOE) in summer of 1940, Philby was appointed as an instructor in the arts of "black propaganda" at the SOE's training establishment in Beaulieu, Hampshire.

In May 1940, MI6 set up British Security Co-ordination (BSC), on the authorisation of Prime Minister Winston Churchill over the objections of Stewart Menzies. This was a covert organisation based in New York City, headed by William Stephenson intended to investigate enemy activities, prevent sabotage against British interests in the Americas, and mobilise pro-British opinion in the Americas. BSC also founded Camp X in Canada to train clandestine operators and to establish (in 1942) a telecommunications relay station, code name Hydra, operated by engineer Benjamin deForest Bayly.

In early 1944 MI6 re-established Section IX, its prewar anti-Soviet section, and Philby took a position there. He was able to alert the NKVD about all British intelligence on the Soviets—including what the American OSS had shared with the British about the Soviets.

Despite these difficulties the service nevertheless conducted substantial and successful operations in both occupied Europe and in the Middle East and Far East where it operated under the cover name Interservice Liaison Department (ISLD).

 

Cold War

In August 1945 Soviet intelligence officer Konstantin Volkov tried to defect to the UK, offering the names of all Soviet agents working inside British intelligence. Philby received the memo on Volkov's offer and alerted the Soviets, so they could arrest him. In 1946, SIS absorbed the "rump" remnant of the Special Operations Executive (SOE), dispersing the latter's personnel and equipment between its operational divisions or "controllerates" and new Directorates for Training and Development and for War Planning. The 1921 arrangement was streamlined with the geographical, operational units redesignated "Production Sections", sorted regionally under Controllers, all under a Director of Production. The Circulating Sections were renamed "Requirements Sections" and placed under a Directorate of Requirements.

 

Operation Gold: the Berlin tunnel in 1956

SIS operations against the USSR were extensively compromised by the presence of an agent working for the Soviet Union, Harold Adrian Russell "Kim" Philby, in the post-war Counter-Espionage Section, R5. SIS suffered further embarrassment when it turned out that an officer involved in both the Viennaand Berlin tunnel operations had been turned as a Soviet agent during internment by the Chinese during the Korean War. This agent, George Blake, returned from his internment to be treated as something of a hero by his contemporaries in "the office". His security authorisation was restored, and in 1953 he was posted to the Vienna Station where the original Vienna tunnels had been running for years. After compromising these to his Soviet controllers, he was subsequently assigned to the British team involved on Operation Gold, the Berlin tunnel, and which was, consequently, blown from the outset. In 1956, SIS Director John Alexander Sinclair had to resign after the botched affair of the death of Lionel Crabb

SIS activities included a range of covert political actions, including the overthrow of Mohammed Mossadeq in Iran in the 1953 Iranian coup d'état (in collaboration with the US Central Intelligence Agency).

Despite earlier Soviet penetration, SIS began to recover as a result of improved vetting and security, and a series of successful penetrations. From 1958, SIS had three moles in the Polish UB, the most successful of which was codenamed NODDY. The CIA described the information SIS received from these Poles as "some of the most valuable intelligence ever collected", and rewarded SIS with $20 million to expand their Polish operation.[39] In 1961 Polish defector Michael Goleniewski exposed George Blake as a Soviet agent. Blake was identified, arrested, tried for espionage and sent to prison. He escaped and was exfiltrated to the USSR in 1966.

Also, in the GRU, they recruited Colonel Oleg Penkovsky. Penkovsky ran for two years as a considerable success, providing several thousand photographed documents, including Red Army rocketry manuals that allowed US National Photographic Interpretation Center (NPIC) analysts to recognise the deployment pattern of Soviet SS4 MRBMs and SS5 IRBMs in Cuba in October 1962. SIS operations against the USSR continued to gain pace through the remainder of the Cold War, arguably peaking with the recruitment in the 1970s of Oleg Gordievsky whom SIS ran for the better part of a decade, then successfully exfiltrated from the USSR across the Finnish border in 1985.

The real scale and impact of SIS activities during the second half of the Cold War remains unknown, however, because the bulk of their most successful targeting operations against Soviet officials were the result of "Third Country" operations recruiting Soviet sources travelling abroad in Asia and Africa. These included the defection to the SIS Tehran station in 1982 of KGB officer Vladimir Kuzichkin, the son of a senior Politburo member and a member of the KGB's internal Second Chief Directorate who provided SIS and the British government with warning of the mobilisation of the KGB's Alpha Force during the 1991 August Coup which briefly toppled Soviet leader Mikhail Gorbachev.

 

After the Cold War

The end of the Cold War led to a reshuffle of existing priorities. The Soviet Bloc ceased to swallow the lion's share of operational priorities, although the stability and intentions of a weakened but still nuclear-capable Federal Russia constituted a significant concern. Instead, functional rather than geographical intelligence requirements came to the fore such as counter-proliferation (via the agency's Production and Targeting, Counter-Proliferation Section) which had been a sphere of activity since the discovery of Pakistani physics students studying nuclear-weapons related subjects in 1974; counter-terrorism (via two joint sections run in collaboration with the Security Service, one for Irish republicanism and one for international terrorism); counter-narcotics and serious crime (originally set up under the Western Hemisphere controllerate in 1989); and a 'global issues' section looking at matters such as the environment and other public welfare issues. In the mid-1990s these were consolidated into a new post of Controller, Global and Functional.

During the transition, then-C Sir Colin McColl embraced a new, albeit limited, policy of openness towards the press and public, with 'public affairs' falling into the brief of Director, Counter-Intelligence and Security (renamed Director, Security and Public Affairs). McColl's policies were part and parcel with a wider 'open government initiative' developed from 1993 by the government of John Major. As part of this, SIS operations, and those of the national signals intelligence agency, GCHQ, were placed on a statutory footing through the 1994 Intelligence Services Act. Although the Act provided procedures for authorisations and warrants, this essentially enshrined mechanisms that had been in place at least since 1953 (for authorisations) and 1985 (under the Interception of Communications Act, for warrants). Under this Act, since 1994, SIS and GCHQ activities have been subject to scrutiny by Parliament's Intelligence and Security Committee.

During the mid-1990s the British intelligence community was subjected to a comprehensive costing review by the government. As part of broader defence cut-backs SIS had its resources cut back twenty-five percent across the board and senior management was reduced by forty percent. As a consequence of these cuts, the Requirements division (formerly the Circulating Sections of the 1921 Arrangement) were deprived of any representation on the board of directors. At the same time, the Middle East and Africa controllerates were pared back and amalgamated. According to the findings of Lord Butler of Brockwell's Review of Weapons of Mass Destruction, the reduction of operational capabilities in the Middle East and of the Requirements division's ability to challenge the quality of the information the Middle East Controllerate was providing weakened the Joint Intelligence Committee's estimates of Iraq's non-conventional weapons programmes. These weaknesses were major contributors to the UK's erroneous assessments of Iraq's 'weapons of mass destruction' prior to the 2003 invasion of that country.

 

War on Terror

During the Global War on Terror, SIS accepted information from the CIA that was obtained through torture, including the extraordinary rendition programme. Craig Murray, a UK ambassador to Uzbekistan, had written several memos critical of the UK's accepting this information; he was then sacked from his job.

SIS members were present in Afghanistan during the 2001 invasion following the September 11 attacks; after members of the 22nd Special Air Service (SAS) Regiment returned to the UK in mid-December 2001, members of both territorial SAS regiments remained in the country to provide close protection to SIS members.

In the run-up to the invasion of Iraq in 2003, it is alleged, although not confirmed, that some SIS conducted Operation Mass Appeal which was a campaign to plant stories about Iraq's WMDs in the media. The operation was exposed in The Sunday Times in December 2003. Claims by former weapons inspector Scott Ritter suggest that similar propaganda campaigns against Iraq date back well into the 1990s. Ritter says that SIS recruited him in 1997 to help with the propaganda effort. "The aim was to convince the public that Iraq was a far greater threat than it actually was." Towards the end of the invasion, SIS agents operating out of Baghdad international airport with Special Air Service (SAS) protection, began to re-establish a station in Baghdad and began gathering intelligence; in particular on WMDs, after it became clear that Iraq did not possess any WMDs, MI6 had to officially withdraw pre-invasion intelligence about them. In the months after the invasion, they also began gathering political intelligence; predicting what would happen in post-Baathist Iraq. MI6 personnel in the country never exceed 50; in early 2004, apart from supporting Task Force Black in hunting down former senior Ba'athist party members, MI6 also made an effort to target "transnational terrorism"/jihadist network that led to the SAS carrying out Operation Aston in February 2004: They conducted a raid on a house in Baghdad that was part of a 'jihadist pipeline' that ran from Iran to Iraq that US and UK intelligence agencies were tracking suspects on – the raid captured members of Pakistan based terrorist group.

Shortly before the Second Battle of Fallujah, MI6 personnel visited JSOCs TSF (Temporary Screening Facility) at Balad to question a suspected insurgent, afterwards they raised concern about the poor detention conditions there and as a result the British government informed JSOC in Iraq that prisoners captured by British special forces would only turn them over to JSOC if there was an undertaking not to send them to Balad. In Spring 2005, the SAS detachment operating in Basra and southern Iraq, known as Operation Hathor, escorted MI6 "case" officers into Basra so they could meet their sources and handlers and MI6 provided information that enabled the detachment to carryout surveillance operations. MI6 were also involved in resolving the Basra prison incident; the SIS played a central role in the British withdrawal from Basra in 2007.

In July 2011 it was reported that SIS has closed several of its stations in the past couple of years, particularly in Iraq, where it used to have several outposts in the south of the country in the region of Basra according to the annual report of the parliamentary Intelligence and Security Committee. The closures have allowed the service to focus its attention on Pakistan and Afghanistan, which are its principal stations. On 12 July 2011, MI6 intelligence officers, along with other intelligence agencies tracked 2 British-Afghans to a hotel in Herat, Afghanistan who were discovered to be trying to "establish contact" with the Taliban or al-Qaeda to learn bomb-making skills; operators from the SAS arrested captured them and they are believed to be the first Britons to be captured alive in Afghanistan since 2001.

In October 2013, SIS appealed for reinforcements and extra staff from other intelligence agencies amid growing concern about a terrorist threat from Afghanistan and that the country will become an "intelligence vacuum" after British troops withdraw at the end of 2014.

In March 2016, it was reported that MI6 had been involved in the Libyan Civil War since January of that year, escorted by the SAS, to meet with Libyan officials to discuss the supplying of weapons and training for the Syrian Army and the militias fighting against ISIS. In April 2016, it was revealed that MI6 teams with members of the Special Reconnaissance Regiment seconded to them had been deployed to Yemen to train Yemeni forces fighting AQAP, as well as identifying targets for drone strikes. In November 2016, the Independent reported that MI6, MI5 and GCHQ supplied the SAS and other British special forces- as part of a multinational special forces operation- a list (compiled from intelligence) of 200 British jihadist to kill or capture before they attempt to return to the UK. The 200 male and female jihadists are senior members of ISIS that pose a direct threat to the UK; Sources said SAS soldiers have been told that the mission could be the most important in the regiment’s 75-year history.

Technology

The concept is not particularly new, but as with all concepts, it takes time for the technology to catch up.  In the 1960's the battle was on for Space.  Now, the battles are fought daily and in boardrooms and labs from East to West.  With DARPA on the one hand facilitating research into Neurprosthetics in the US, on the other the "Military-Civil" fusion in China works on Research through the China Defence Universities, a concern for most Intelligenvce Agencies, and undoubtedly doing the same.  Somewhere inbetween, the 'cash-strapped' Russians play catch-up.  Of course the UK has had its own waterered down version of DARPA through Innovate UK (sorry...but it is).  This  is set to change and has been on the cards for many years, but on this occassion it looks like Boris Johnson will be the one to unveil the new entity.  Whatever form it takes, it really needs to ensure the seals are tight on this one, as there are no room for leaks in todays Innovation Wars.The real challenge as we see it is in succesfully coordinating the vast number of current projects.  The 'visionaries' will have to harvest the key successes in a variety of fields and squeeze the very best out of each, to suit their purposes. 

For Intelligence Orgnisations such as the CIA or MI6, this will focus on linking communications technology, data in secure cloud based environments maybe using advanced blockchain tech, financial technology (to securely and 'discreetly' fund the research) and of course the science itself.  These do not even scratch the surface on what is involved.  The marketing, not forgetting that sometimes looking as though we are ahead of the game, can be just as important as actually being ahead. The thorough Legal processes involved such as patent protection (also including diversion), the Political ramifications in terms of developing succesful cross-border partnerships etc.  The list is almost endless so the task would daunting to even the most accomplished Project Manager (no wonder MI6 is expanding the sc-called 'Change Management' department.  The prize however is a huge 'leg-up' in the next war(s) where, as Mr Younger puts it, Espionage 4.0 will play a pivotal role.  How our friends the Amercians, and their sisters MI6 will meet this challenge, will be interesting indeed.

The UK Defense Secretary only just admitted, in a rather dramatic fashion, that the retreat from overseas entanglement by the US, now keeps him awake at night.  That is probably doubtful and is probably merely another political soundbite to ring loudly at the next funding drive.  It did however highlight the more serious point that the UK has been beholden to the US for far too long and especially in the air, and also in matters of intelligence.  So, as always when a poorer, less celebrity laden team comes to the pitch, the owners have to spend wisely and ensure that every pound spent is carefully considered if they (we) stand a chance.  We are in the same game now.  So, although it might be nice PR and propaganda to talk of increasing troops and increased spending on tanks and hardware etc., the real victory will depend on which technologies the UK can harness control of faster and more effectively than its foes.  To continue the sports analogy, the UK is simply not in a position to buy all the top strikers around today.  It has to look way beyond and look at toddlers with technique and take a considered gamble on what technology will prove the most valuable in the future.  One area we are particularly focused on at the moment are applications available from visual neuroprosthesis technology.  This technology is not the next step, and maybe not even going to be of any real benefit the step beyond that.  However, looking three steps ahead and this is where we are heading.  If the age old innovation/imitation battle between the Western inventors and their Chinese counterparts is anything to go by, then nothing much will change. The idea itself is no particularly recent.  In 2014 for example, the UCLA Henry Samueli School of Engineering carried our work for DARPA (the Defense Advanced Research Projects Agency) on a project aimed at developing a wireless, implantable brain device that could help restore lost memory function in individuals who have suffered debilitating brain injuries.  So, aside from the more well known hearing aid implants, the work on other implants, to work on other functions, has been widespread in several private, government and academic science labs. What we are seeing now, is advancement in the practical application and success of neural implants which are having profoud effects on congitive functions.  Regular readers may recall our articles 18 months ago which focussed on another element i.e sub-cutaneous chip research, in which we also referenced the digitzed manipulation of the Amygdalla (the brains 'emotion' regulator) and the potential implications on patients with severe psychopathy.  It was and is representative of a pattern of growth which has developed for some time and brought us where we are now.

 

Bringing the focus back on the battle between competing countries however, for the UK, industrial espionage will continue to feature highly on its agenda both in terms of defender and aggressor.  The dilemma is, does the UK feed off the US (who seem to be distancing themselves in various ways) and leave the funding of this innovation in the hands of the US Government, or does it do it itself?  If it is the latter, then secrecy and IP protection (for what its worth) will be key factors in protecting their investment and also the security of the nation.  We certainly have the talent and know how and pedigree to compete against the likes of Huawei or, more pertinently, the companies already being groomed by the Chinese State to step in as Huawei 2.0, 3.0 and so on.  So the hope is that the current blip caused by a temporary 'off the hip' Trump administration, is very much just that, and plans will have been in place well before now to have planned for such events.  Although the politicians might have us believe there is trouble at the ranch, the financial ties and intelligence bonds go far beyond the 'hype'.  Trump and the US are unlikely to "fire" the UK just yet and for us, the canary in the mine is his hairdresser.  Whilst she has a job, we know we are safe.

So, what is a visual neuroprosthetic? The audio version is probably more well known as the Cochlear Implant i.e. a relay between the hearing aid and neural network in the Cochlear to aide hearing.  The same is the case with a visual neuroprosthetic. It is an artificial way (at the moment) of stimulating the visual pathways present in the eye and the visual sensations in the brain.  In doing so, it opens up the possibility of removing artificial devices such as lenses altogther. Rather than having a prosthetic implant to improve or restore vision, its purpose will be to enhance already perfect vision and add further information directly to the retina.  Scientists in The US and Netherlands have already experiemented with implanted chips to regulate the release of chemicals to the Amygdalla.  Sub-cutaneous chips have been available and tested now for many years in order to transmit information to externally and via cloud technology.  Combining visual neural systems with AI and IOT systems, will expedite intuitive and command driven action through prosthetics.

 

In terms of visual technology and where we stand with mainstream innovation at the moment, it is fairly well known what is on offer from Google and a growing fraternity of augmented reality/virtual reality firms and their glasses (called ‘smart glasses’).  They are cheaply priced and will probably feature well in the Christmas stockings of many teenage gamers.  The next step which firms such as Virtualenses   (the VL Project) and others are working on, are digital contact lenses.  The technological link from glasses to the third-generation wear of neurologically based enhancements.  The race is on for sure.  With digitized contact lenses, google enabled, recordable, cloud linked  and fully interactive already being tested, the race is on for the neurological link between man and machine in the form of a prosthetic.  The potential uses, even with just digital contact lenses or military grade glasses, is exceptional.  The advantage will be, as with all future moves in technological development for the intelligence community, in more accurate targeting.  Transforming 2D maps into 3D real world imagery containing millions of data points all converging and integrating in an intelligence/military ‘cloud’ to instantly disseminate visual information.  Those of you of a certain age will recall the war films where planners turned building plans into actual buildings in warehouses to train their soldiers and provide as much realism as possible.  The warehouse is gone now, and the maps are instantly relayed into screen fed information to the recipient.  When the neuroprosthetic technology comes online, it will remove the need altogether for both learning about the target as well as even having to physically be at the target.  The symbiosis between human, biological and physiological, and the cloud-based world will be seamless.  It may well represent the final steps before the AI journey reaches its singularity and when the games really begin.  But that’s another story.  For now, it is a race and a race the UK is going to have to compete in on its own.  The roots of the tree run deep and have many twists and turns.  Funding will continue to be an important element but will still only be one of the branches of the whole tree.  That has always been the case.  The fight against the money launderers will continue, or should we say, appear to continue to rage.  Overall however, the actual objective of ensuring the right funds hit the right accounts will be crucial in feeding the roots which will eventually allow the UK to blossom in full, with or without the US.

See a demonstration of how Visual Neuroprosthetics linked with IOT technology, will tranform even basic Intelligence Surveillance and Counter Surveillance operations for organisations like MI6. Click.

في Focus Feb 2019 MI6 والتنوع العصبي

المجتمع ، متجهين إلى أن يكونوا صائغي وموصلين للفكر الأسي؟ إن التصريحات الجريئة في الحقيقة ، ولكن بالنسبة للمشاركين في المعرفة ، هي "صعوبة في التعلم" حقا مصطلح مناسب لوصف قسم كبير من المجتمع حيث التعلم بعيدًا عن الصعب ، ولكن في بعض الأحيان سهل أكثر من اللازم؟ أين تشير "الاحتياجات الخاصة" بشكل أكثر دقة إلى الحاجة إلى مزيد من المعلومات أو الألوان على لوحة فنية في مشهد أحادي اللون؟ قد لا يكونوا قادرين على الاندماج بشكل جيد في المجتمع ، لكنهم يستطيعون القيام بذلك ، ويساعدون في حمايته. جيمس بوند ليسوا كذلك ، ولكن إذا اضطررت للذهاب إلى كازينو حقيقي رويال ، فستأخذ Rain Man أكثر من 007 في أي يوم. قراءة المزيد.

NATO Allied Command Transformation (ACT)

 

Post-2003 restructuring of the North Atlantic Treaty Organisation resulted in ACT was intended to lead military transformation of alliance forces and capabilities, using new concepts such as the NATO Response Force and new doctrines in order to improve the alliance's military effectiveness. Originally, it was an important method established to maintain cimmunications between North America and Europe. In recent years this relathionship has been tested and is often challenging.  But can it last anohter 60 years in its current structure?  More.

"The Internet Society - 30 years strong." 

Let's have a look under the bonnet.

Ask the man (or woman) on the street what the Internet Society is and what it does.  It might go quiet. There are a handful of companies globally that influence the direction of internet and telecommunications, for example, the Project Coordination Group (PCG) is one, and of course, the Internet Society est. 1991 whose motto is "The internet is for everyone". Well ok that’s not strictly true though is it.  Ask the 100’s of people banished from Twitter for ever, for seemingly innocuous non-pc comments.  Nestled only 2Km from the Penatgon, the IOS states its aim (as with many non-profit organisations) is to develop leadership in internet-related standards, education, access, and policy.  But it only has 65,000 members and according to Wikipedia it has $1.1bn in cash holdings (unaudited) and a hefty $42m endowment from numerous sources.  So there is a very large amount of money, which presumably has some flow through it too, but with a membership base which is not exactlyvery representative.  Also, The Internet Society is a U.S. 501(c)3 tax-exempt charitable organization.  So, we have money in size.  We have flow¹, presumably in size too, a relaitvely non-accountable body, charged with shaping the future of the internet, next door to the US Goverment and CIA .  What could possibly go wrong?  In the interests of well thought out research and objective work, let’s remove the head gasket and work our way down to the pistons of this particular machine. Full Article

Innovation

Foreign Politics

New threats, old enemies

Politcal but more importantly, public, changes in Europe, notably Italy, Poland, Germany and others over recent years are causing increasing concern.  The rise of the far right 'neo-fascist' movements is gathering momentum and the usual diplomatic routes to entry are not having enough success.  When compared to the US, Europe in terms of size and number of (federal' like countries) is tiny.  However, the difference in political ideology goes much further than any Route 66.  Their brains tick differently and their histories are such, that even the closest of their neighbrours, struggles to learn what drives them, although clearly in the case of Poland, religion is a huge driver.  One well known far right rperesentative recently told his members that the reason Poland did not have much in the way of terrorism was because of their belief in God and more importantly, their family values.  Seemingly in a time warp, these are commonly held views and ones that will drive the current movements.  On the flip side, the country is riddled with alchoholism, drug related crime and (as with nearly all mainly Catholic countries) has a burgeoning and influential organised crime network.  Which is quite possibly more responsible for low terrorism levels than God himself?  Either way, there is a vast difference between Poland and even its more tech savvy neighbour Estonia and friends across the river in Helsinki.  Many of their neighbours are moving forward and constantly looking to reform and develop, as opposed to the Poles who remain very much a defensive nation.  One, which quite understandably, still bears the scars of both wars.  So, in these sorts of countries, especially ones with such strategic geo-political importance, intelligence gathering on the ground will prove more successful than current conventional cyber strategies.  Let's not forget also, it was not that long ago that the UK had its own issues with the trade unions and, in our case, far left movements which also required physical infiltration, a long time before cyber-surveillance.  So there are comparisons.  If the time bombs are ticking in countries like Italy, Germay and Poland, then the Intelligence Agencies will have planned and prepared for these events well before now. Read More

Technology

في Focus Feb 2019 MI6 والتنوع العصبي

Replace “Human Being” with “Data Packet”.  You may well have heard the oft used phrase that ‘data is now as valuable as Gold’.  The question is how and if so, where is this heading?  We will come on to that a little later, but for now it would be useful to familiarize ourselves with some other key issues in the world of human data first. 

 

We have already written about the problem, and what will likely be, the increasing problem of Bio Spoofing or Bio Leaks.  In short, this is the stealing of a person’s biological identity in order to gain illegal access to money, data, facilities etc.  The most well-known forms are recognition systems which use retinal imagery, facial or fingerprint identity, and perhaps fewer known sources such as your veins, heartbeat speeds and the DNA from your blood.  All these systems are currently either being used or are in the testing stage.  The “Spoofer” is simply a person who will try to pass themselves off as you in order to assume your identity for various reason. Bio spoofing is a term which refers to slightly more specific forms of identity theft.  In our opinion there are only a very few, select forms of identity recognitions systems which can provide high levels of security, and this will be covered another time.  Put simply however, fingerprint, retinal imagery, voice and even blood identity recognition systems are vulnerable to some degree because ultimately, they are easy to steal.  It sounds crude but chopping off a finger or forcing someone to use ‘it’ or even an eyeball is not particularly demanding.  Although maybe not as common as some sci-fi films would have us believe.  Possible, nonetheless.  Our article on “Blood Leaks” also highlights the vulnerability there. The point of mentioning this, at this stage, is to highlight how data (personal information) security is not only important, it may well define the quality of data sold on the open market at some point.  To continue the Gold analogy, or indeed any other precious metal or substance, the value can be determined by grading it, which in turn is dependent on quality.  So, as Data becomes a tradable commodity, so will the methods used for grading its quality, hence its price.  Almost everything that is tradeable, has to have a value attributed to it.  Even in the traditional sense where stocks and shares are traded on the various stock markets.  Their medium to longer term value is, in the main, determined by what they refer to as “fundamental analysis”. A process of analyzing a company by looking at its accounts, management, profit and trading forecasts and other factors.  In doing so, the company is given a fair price, often calculated on its earnings, and called a yield which in turn has a ‘multiple’, allowing a level comparison against its peers.  Pretty mundane stuff maybe, but it is how systems have worked for centuries and therefore, it is highly likely it will continue to do so in the future.  So, in the new cyber world, the tradeable commodity will be you.  Or more precisely your data.  Who knows, maybe after the trading of your data becomes regulated or legalized, we will find analysts in some form who specialize in valuing niche areas of that market.  For example, the NASDAQ is a US market trading stocks in Technology only companies.  What if we have a “UKYME” or a UK Youth Market Exchange?  Let the imagination run wild if you like, but the concept is there.  A tradeable market in data focused on ages 16-24 for example.  There might be a Car Market or even the development of another form of “off exchange” transaction like Bitcoin which will attract illegal trading of data through 100% anonymous Blockchain (they should have cracked it by then).

 

So, these are just ideas of what may or may not happen.  Some however are really almost there already.  We only have to look at what has been in the press on the last few years with controversies surrounding Cambridge Analytica, and general fears over privacy brought to our attention by Messrs. Snowden and Assange.  Looking at how things stand now however, one can already map out good quality or bad quality data based on the various commonly used sources such from the FANG consortium (Facebook Amazon Netflix Google).  OK throw in Instagram, Twitter and YouTube for a better acronym (answers on a postcard please).  By constructing a detailed map of personal data flow, it is fairly easy to attribute value to the quality of the data, or in these cases, the quality of the algorithms.  So, as well as seeing the stocks of Google and Facebook trading on the exchanges, we could easily see their data traded (spun off) separately.   When it comes to the illegal market for trading the commodity of privacy then, in the same way to how heroin might be graded, the ‘cut’ of the data will be valued too (as well as demand and supply of course).  Will we have Data Quality Certificates in the near future?  It might seem unlikely because it would depend on acceptance by the public that this is ok.  In reality that is the easy part.  One only needs to look at the re-legalization of alcohol after prohibition or marijuana in Europe and some US states.  Liberalization is such that it will sit well alongside the factual arguments for legalization and regulation.  Once people accept that having their data traded underground is bad for them and society, it will be an easy sell to have them accept regulated data selling.  It is after all already happening anyway.  It is just that the conglomerates and governments have to be discreet and more covert in doing so.  That will not continue for much longer. There is one simply reason why exchanging private data will never stay private and remain a process carried out behind closed doors…. that reason is Money!  It is generally how nearly all markets of some description, over time, have started out.  By commoditizing data, giving it a grade, and therefore a price, market forces will determine fair values.  It will create a new source of liquidity that will be of use to all…especiallythe intelligence agencies.  We all know the best lies are the ones that are nearly all based on truth….so credibility is the intelligence agencies (and therefore the criminals) best friend. 

 

We have produced a comprehensive report on the methods for valuing data for the purposes of sale titled "The Human Stock Market - everyone has their price"..  For a free copy of the report please click here.

¹ The term 'flow' refers to the flow of money or assets, generally in size.  Flow is sought out by larger instituional investors on the global markets for legitimate pruposes eg. to enter or exit a market or investment without having problems with placement or prices quoted.  It is often a sign of a healthy market and economy.  That said, criminal organisations also require flow in order to 'hide' their transactions so they appear inconsequencial, or 'remora like' i.e people use flow to hide in the shadows.

isoc-page.jpg
libra-home-page.jpg

Two non-profit .orgs. They try to fill the financial void in some societies and cultures to limit the pain of poverty.  They have even cut back and had to use the same web designer.  Facebook Libra and the Internet Society, two unconnected organisations, both with a strong desire to spread the wealth...not related...not in this for money or power at all or using tax exempt status to circumvent anti-competition legislation. Of course not.  The Internet Society refers to the Internet Ecosystem.  Coincidentally, Facebook refers to its Libra ecosystem too. What is it and what does it mean for you?

Publications

Institute for Economics & Peace. Global Terrorism Index 2019: Measuring the Impact of Terrorism, Sydney, November 2019. Available from: http://visionofhumanity.org/reports

The latest Global Terrorism Index data shows Incidents of far-right terrorism have been increasing in the West, particularly in Western Europe, North America, and Oceania and the three largest politically motivated terrorist attacks in the West in the last 50 years have been perpetuated by far-right extremists.Full Report

It is not, will there be another Cambridge Analytica…rather, where are they and how many are there now?

 

There have been many many articles written on this subject, and documentaries made.  It will sell until the cows come home for one reason.  It is about you.  Attempts have been made, some more for appearance, in assessing the dangers of another US election being affected.  Many meetings have been held at senior levels and suggestions made as to how we can avoid it happening again.

 

Here’s one hypothesis.  It will never stop happening.  It is far too late for that.  Cruz was the loss leader, the one the pushers used to get the US hooked on the data drug, and the Trump administration piled in.  The relationship between money, greed and power (and therefore information) has probably been around since the beginning of time.  Why on earth would we be surprised if this continued, and not only continued, but got more sophisticated?  Julian Wheatmand, the former CEO of Cambridge Analytica was recently quoted as saying “I’m pretty sure nobody’s thinking of trying to start it up again under a different guise”.  The word that stands out there is “pretty”.  Come on Julian, who are you trying to kid?

It is possible of course, and highly likely, that these models were conceived well before CA and in the rooms of some departments in the Government machine somewhere.  Before these revelations came out, of course it was Snowden who revealed the existence of mass surveillance on its citizens.  So what is the difference?  Were they not doing essentially the same thing as the Government?  All that happened is it moved horizontally to CA in the private sector.  Which has been the process seen in the US for several years…take PIA’s as an example. The US Government is tendering out its business which provides it with some plausible deniability. That has to have been the biggest lesson learnt from the Snowden/Assange revelations surely?  It has been a steady move over the last few years, and indeed, it is nothing new.  Also, one would be naïve to assume this is simply as US (Western) phenomenon. Here’s the question.  Is there actually anything fundamentally wrong with it?  So what if Facebook or CA have 5000 data points and know your personality profile and carry out AI based Psychological Evaluations..  Every man and his dog nowadays sees a shrink or does an online psychology quiz, anxious to find out which box they fit in to.  It’s part of our society now.  Everything we are seeing now is egocentric and very much with “me” in mind. How many followers I have, what my views are , here’s how I do things or I walked 5200 steps today.  Couple that with the huge technological moves which are creating the individuals as their own transactional powerhouses capable of remarkable things such as international money payments on their smartphones, access to blockchain technology, IOT and 5G.  At the same time, and rather ironically, these same individuals are becoming myopic and less able to spot what is going on around them.  The self is now much more important that the society.  These are the more concerning questions.  As far as the likes of Facebook or CA is concerned, what is the difference between what CA did, to what a political campaigner or marker researcher does by standing on the high street with a clipboard asking questions or when post comes through the door with a survey attached.  The internet is now the high street.  Twitter is the board at the local post office.  The political campaigner that was once on the street now uses the full spectrum of social media.  So, is there actually any difference?  These people are not breaking into your homes and stealing your belongings.  Some would say that netaphorically, they are.  Those people may have life a little too comfortable and sit slighty to the left of reality.  There does have to be a line however.  The criminal line ie. Actual theft.  But that is not the question being addressed here.  Will this end simply because of the CA scandal, the Trump Impeachment and concerns of his involvement?  Of course not.  So, what is the likely outcome?  Well, the problem as we have already learnt, with criminalizing something like this rather than regulating it, is that it can end up far more dangerous and cost people a lot more than money.  Then it gets serious.  Quite possibly,the answer is to create data as an actual commodity rather than simply information that is changing hands in relatively disorganized informal ways.  So, maybe opening up the debate on regulation through valuing private data is an option. It is certainly something we have carried out a great deal of our own work on, and it has legs.  The exact structure and how the data is valued (priced) is key, and having exchanges of some sort to ensure basic market forces are in operation is also a big task.  Even with those mechanisms in place we are still likely to see firms operating independently, but only in the same way as companies and businesses still operate now that are not privatized.  Markets also have corruption and price manipulation to deal with which is what the regulatory bodies and specialist legal and law enforcement teams in each nation is designed to address.  Insider dealing for example will always be a problem and of course money laundering.  In essence what we are acknowledging is that no system is perfect in this scenario, but one will certainly cause less damage to society than the other.   Full Report

Recruitment

في Focus Feb 2019 MI6 والتنوع العصبي

المجتمع ، متجهين إلى أن يكونوا صائغي وموصلين للفكر الأسي؟ إن التصريحات الجريئة في الحقيقة ، ولكن بالنسبة للمشاركين في المعرفة ، هي "صعوبة في التعلم" حقا مصطلح مناسب لوصف قسم كبير من المجتمع حيث التعلم بعيدًا عن الصعب ، ولكن في بعض الأحيان سهل أكثر من اللازم؟ أين تشير "الاحتياجات الخاصة" بشكل أكثر دقة إلى الحاجة إلى مزيد من المعلومات أو الألوان على لوحة فنية في مشهد أحادي اللون؟ قد لا يكونوا قادرين على الاندماج بشكل جيد في المجتمع ، لكنهم يستطيعون القيام بذلك ، ويساعدون في حمايته. جيمس بوند ليسوا كذلك ، ولكن إذا اضطررت للذهاب إلى كازينو حقيقي رويال ، فستأخذ Rain Man أكثر من 007 في أي يوم. قراءة المزيد.

Recruitment

There are many ways to recruit a spy.  Certainly too many to cover in an article such as this. It really depends on who the particular intelligence agency is looking for, which organization, and what its objective is.  It will come as no surprise that some methods are more or less well publicized than others.  For SIS in particular, given that the organization did not officially exist until 1994, many of the methods used for recruitment are, for obvious reasons, still closely guarded secrets.  Graduate recruitment is one thing, but developing a potential (currently operational) agent is another, especially if they are already in full time professional employment or indeed, working for another intelligence agency. 

 

The PR stance at the moment may well be to promote a progressive, modern image, and in many ways it most definitely is.  However, the traditional ‘tap on the shoulder’ approach was really symptomatic of a desire to retain control of the recruitment process.  To that end, things have not really changed.  SIS has, and always will be, more cautious about the ‘walk in’ candidate and will have entirely different, and more complex, processes in place to evaluate such a person.  Furthermore, the complex recruitment cycle is now refined to the point where SIS can recruit individuals without them even knowing.  Now that’s surely the recruiters’ holy grail.  As with all things ‘intelligence’ orientated, there is a constant focus on resources and purchasing power.  SIS needs to maximise the value of each pound spent and therefore, long and complex targeting of individuals used to gain information, has to be considered against the costs of recruiting those intelligence officers charged with interpreting that information.  So, in essence, a balancing act in the same way as any other modern-day commercial organisation.  Let’s not forget however, that despite the budget allocated by the Intelligence Committee and oversight of section 5, 6 and GCHQ, there are still relatively few intelligence officers out there. Especially in the ever-changing competitive world of private intelligence agencies and their corporate counterparts which compounds the problems caused by the brain drain and external temptations.

 

SIS Chief Alex Younger said in his speech at St Andrews that “If you think you can spot an MI6 officer, you are mistaken. It doesn’t matter where you are from. If you want to make a difference and you think you might have what it takes, then the chances are that you do have what it takes, and we hope you will step forward.”  Clearly this is a nod to the future and the recognition that with Espionage 4.0 around the corner, intelligence agencies need to invest now and allow time for the training and development of new individuals.  Individuals that could take two or more years to develop before assuming roles of increased responsibility and clout.  This is the likely reason and not, as some cynics have suggested, merely PR propaganda developed for the benefit of our adversaries to suggest that UK intelligence is growing.  The argument here being that even if the funds are not available, and even if the organisation is cutting costs, creating the illusion that the funds are there is just as effective.

 

So far the common denominator is money.  Whether it is the level of funding, or the maximisation of value for each pound spent.  Mr Younger’s comments clearly pushes ideology as a motivator and driver for potential candidates, and one can hardly blame him.  Let’s face it, it would be hard for SIS to push the financial incentive when faced with free market competition.  So, it is a given that the organisation has to, regardless of whether it is true or not, sell the notion of ‘making a difference’ as the key driver.  So, enter the ‘buddhist spy’ i.e. someone who has forsaken all desires of financial or materialistic rewards in favour of….that little bit more.  Here, the idea that freedom is power is never more true, but by god it’s a tough one to find, especially in the younger recruits.  Money can never be the sole motivator in this profession, but the complexities of life, youth, character and practical issues, means it simply is important.  One cannot really attribute this simply to youth either.  Yes, the younger recruits may well be ambitious and dazzled at the prospect of financial reward, but then again so is the 42 year old married man with three children.  So its not that.  Indeed, the tap on the shoulder system which focussed on the Oxbridge folk probably worked largely because they were the elite and on the whole from upper middle class affluent backgrounds where they always has the family vault to nudge open in times of desperation.  Ironically, this student and the buddhist spy are similar in that they are both free from financial pressures thereby making them more effective. 

 

So, they key thread to pull from the above is that there is power to be had from the freedom of external influences.  Without wanting to drift down the spiritual or philosophical road too much, a successful spy in todays world could be the one who can happily remove any influence, both positive or negative.  In the case of the honey trap, it would be rendered useless if the person did not attribute so much influence to sex.  In the case of financial reward, bribery or extortion, if one truly has zero desire for money then it is powerless.  In the case of power itself, if one is sufficiently self confident to the point where the affirmation from power is not needed, then that too is rendered useless.  So the buddhist spy almost becomes machine like.  Perhaps this is another case for the advancement of the neurodiverse, or those people less emotionally driven to some extent, in favour of the ‘safety’ of the binary world.  In essence, the buddhist spy is simply a person who cannot be bought, and therefore cannot be compromised.  Could you be that person?

 

Research

في Focus Feb 2019 MI6 والتنوع العصبي

It's funny how things work out.  If there are planners at the main foreign intelligence agencies and they do look much further ahead to where things could be heading, there has to be some acknolwedgement that the individual, as a tech powerhouse, could be a game changer.  Sir Alex Younger refers to an Industrial Revolution 4.0 and he may well be right if technological changes and exponential growth produce the seismic shift in ALL aspects of our lives that we can expect.  Banking in the traditional form is gone.  It's on an App. Fintech security is now on our apps...look at 'almost anonymous' blockchain tech.  We have an AI Robot which is officially now a citizen in Saudi Arabia and legal systems in Europe that are years behind the curve on that one.  So a democratically elected AI MP maybe on the cards?  Why not? Instead of manifestos we get sleaze, corruption, mistrust, even death...so of course it's possible.  Information gathering.  Previously the preserve of the Intelligence Agencies and Law Enforcement.  We have more processing power in our pockets now, on our phones, than Clinton had as President. 

 

What is it historically that makes a government intelligence agency?  Financial Resources, Technology, Experience/Training and Information. How many of those are now quickly replaceable?  In turn. Financial resources.  Well it depends on the job in hand, but in essence, mutual societies have existed for years so its relative and replaceable.  Technology.  Most tech is privately owned with the Govenment being the main customer.  Technology is already more wideley and easily  available.  Experience?  Well, that can be a weakness.  There is a reason why many Foreign Intelligence organisations do NOT hire ex-military.  They are too regimented and set in their ways and generally less creative or flexible.  The same can be said for an experienced IO with twenty years under their belt.  The battlefield changes.  So, there are less and less barriers to entry and if the move to individual power is more than just a blip and is a seismic shift on a par with an Industrial Revolution, then changes of some description are certainly afoot.

 

The startling rise in the size and number of Private Intelligence Agencies is surely a by-product of this shift away from centralized government control of a nation's intelligence operations. Sophisticated vigilante groups already seek out and construct complex cases against criminals on behalf of the Police...why?  Because they can.  Just three examples where the power is shifting more and more to the individual.  To the extent that ironically, the free markets that have enabled the development of such innovative radical systems and now causing shifts that socialists dreamt of for years.  Less Government power and more power to the indviduals in society.  One cannot deny it is happening and based on the current trajectory of change and assuming Sir Alex's words are accurate, I hope MI6 has plan B ready to roll out when it happens, because if they have not, then there may well be a few out there already planning for such a scenario. Maybe small groups or individual power houses on an equal footing in almost all areas to pick up the security torch when it is dropped. Not founded on any particular ideology or beleif system....just better!.We should make it clear we have no political agenda (as per our Statements of Principle), we are not religious in any way and do not support or condone any form of radicalist action, but what we are, are realists.  There are lots of IF's and we assume that an organisation such as MI6 considers all these IF's, but we also know damn well that it does not have the time or resources to cover all bases.  Maybe this tech, AI, IOT, 5G, Blockchain thingy is just a blip and it will come to nothing! Maybe it won't all have a signficant long term effect on society or affect, and possibly fuel, the increasing renewed moves back to extremist views we are witnessing in countries like Poland, Italy and Germany.  Hey, it's probably not even worth thinking about...gulp. Full article.

 

What is it historically that makes a government intelligence agency?  Financial Resources, Technology, Experience/Training and Information. How many of those are now quickly replaceable?  In turn. Financial resources.  Well it depends on the job in hand, but in essence, mutual societies have existed for years so its relative and replaceable.  Technology.  Most tech is privately owned with the Govenment being the main customer.  Technology is already more wideleyand easily  available.  Experience?  Well, that can be a weakness.  There is a reaosn why many Foreign Intelligence organisations do NOT hire ex-military.  They are too regimented and set in their ways and generally less creative or flexible.  The same can be said for an experienced IO with twenty years under their belt.  The battlefield changes.  So, there are less and less barriers to entry and if the move to indivudal power is more than just a blip and is a seismic shift on a par with an Inductrial Revoltion, then changes of some description are certainly afoot.

 

The startling rise in the size and number of Private Intelligence Agencies is surely a by-product of this shift away from centralized government control of a nation's intelligence operations. Sophisticated vigilante groups already seek out and construct complex case against criminals on behalf of the Police...why?  Because they can.  These are just three of maybe thirty examples where the power is shifting more and more to the individual.  To the extent that ironically, the free markets that have enabled the development of such innovative radical systems and now causing shifts that socialists dreamt of for years.  Less Government power and more power to the indviduals in society.  One cannot deny, it is happening and based on the current trajectory of change and assuming Sir Alex's words are accurate, I hope MI6 has plan B ready to roll out when it happens, because if they have not, then there may well be a few out there already planning for such a scenario i.e small groups or individual power houses on an equal footing in almost all areas to pick up the security torch when it is dropped. We should make it clearm we have no political agenda (as per our Statement of Principle), we are not religious in any way and do not support or condone any form of radicalist action, but what we are, are realists.  There are lots of IF's and we assume that an organisation such as MI6 conisders all these IF's, but we also know damn well that it does not have the time or resources to cover all bases.  Maybe this tech, AI, IOT, 5G, Blockchain thingy is just a blip and it will come to nothing! Maybe it won't all have a signficant long term effect on society or affect, and possibly fuel, the increasing renewed moves back to extremist views we are witnessing in countries like Poland, Italy and Germany.  Hey, it's probably not even worth thinking about...gulp. Read More.

في Focus Feb 2019 MI6 والتنوع العصبي

المجتمع ، متجهين إلى أن يكونوا صائغي وموصلين للفكر الأسي؟ إن التصريحات الجريئة في الحقيقة ، ولكن بالنسبة للمشاركين في المعرفة ، هي "صعوبة في التعلم" حقا مصطلح مناسب لوصف قسم كبير من المجتمع حيث التعلم بعيدًا عن الصعب ، ولكن في بعض الأحيان سهل أكثر من اللازم؟ أين تشير "الاحتياجات الخاصة" بشكل أكثر دقة إلى الحاجة إلى مزيد من المعلومات أو الألوان على لوحة فنية في مشهد أحادي اللون؟ قد لا يكونوا قادرين على الاندماج بشكل جيد في المجتمع ، لكنهم يستطيعون القيام بذلك ، ويساعدون في حمايته. جيمس بوند ليسوا كذلك ، ولكن إذا اضطررت للذهاب إلى كازينو حقيقي رويال ، فستأخذ Rain Man أكثر من 007 في أي يوم. قراءة المزيد.

The Snowden Assange Legacy.

27th February 2020

If they managed to get the US Govt. to do one thing following the mass surveillance watershed, it was to expedite the rise of PIA's and specilaist firms such as Cambridge Analytica, to do what they could no longer get away with.  But,  apart from the 'consent' technicality, was data gathering on indivduals really that bad?  Wasn't it just scaled up market research?

25th February 2020. More.

The recent White Paper release from FB on their new move into Financial Services is now available.  Stealth domination or fellow philanthropists?  Examine the evidence and you decide (click below).The creation of the Facebook Reserve is designed to instill confidence for consumers as Facebook as, like our very own Bank of England once was, becomes the lender of last resorts (but to itself) and underwrites the value of its coins.  Gulp!  For us, this is the first time we have ever even contemplated the demise of Facebook as a super powew.  Being a bank will attracr its own set of new risks to the FB business model. Read full article.

إن جهاز المخابرات السرية (SIS) ، المعروف باسم MI6 ، هو جهاز الاستخبارات الأجنبية التابع لحكومة المملكة المتحدة ، والمكلف بشكل أساسي بالجمع والتحليل السري للعناصر البشرية في الخارج (HUMINT) دعماً للأمن القومي البريطاني. SIS هي عضو في مجتمع الاستخبارات في البلاد ورئيسها مسؤول أمام وزير خارجية البلاد.

Courtesy of Prof. Juan Carmena (Virutalenses Inc,).  Contact for further details.

Disclaimer

جهاز المخابرات السرية co.موقع المملكة المتحدة متاح لاستخدامك الشخصي ومشاهدتك. استخدامك لهذا الموقع يشكل قبولا لهذه الشروط والأحكام التي تأخذ اعتبارا من تاريخ أول استخدام. وتتفقون على استخدام هذا الموقع لأغراض مشروعة فقط ، وبطريقة لا تنتهك حقوق أي طرف ثالث آخر في استخدام هذا الموقع والتمتع به أو تحد منه أو تمنعه من ذلك.

يرجى قراءة الأحكام والشروط وسياسة gdpr & privacy بعناية قبل استخدام الموقع حيث أنها تؤثر على حقوقكم ومسؤولياتكم بموجب القانون. إذا كنت لا توافق على هذه الأحكام والشروط ، يرجى عدم التسجيل للموقع أو استخدامه. في هذه الشروط والأحكام سياسة الخصوصية "نحن" و "لنا" و "لنا" تعني من قبل المخابرات.co.المملكة المتحدة و "أنت" يعني الفرد من استخدام الموقع.

Quick Links

About Us

Careers

News Archive

Sitemap

External Links

MI5

GCHQ

DIS

NCA

NCSC

Social

  • White LinkedIn Icon
  • White Twitter Icon

See us on Linkedin

@secretlytheyrejustlikeyou