Together Together /// Life at Gchq 3

Total Page:16

File Type:pdf, Size:1020Kb

Together Together /// Life at Gchq 3 /// LIFE AT GCHQ Careers WITH PURPOSE TOGETHER // / LIFE AT GCHQ LIFE AT We protect the UK from cyber-attacks, terrorism and espionage. It means we use unique tech in creative ways, coming up with unusual solutions. And we constantly develop new techniques. WHO WE ARE WHAT WE DO We’re made up of different backgrounds, skills and personalities. But we’re all proud to collaborate, and even prouder to work with purpose. It’s how we stay ahead of ever-evolving threats and keep the UK safe. We’re the Government Tasked by Our work helps Communications UK government, to keep the Headquarters – we’re the UK safe – at otherwise known cyber security home, overseas as GCHQ. experts. and online. 2 3 WHERE WE ARE WHO WE WORK WITH // / LIFE AT GCHQ LIFE AT Keeping the UK safe is a joint effort. We work really closely with the National Cyber Security Centre (NCSC), MI5 and SIS (otherwise known Bude Cheltenham Harrogate as MI6). Together, we tackle cyber-attacks, terrorism and espionage. Known for its beautiful scenery, Cheltenham boasts plenty of This north Yorkshire spa town is sweeping coastlines and plenty historic architecture and world- often listed as the happiest place With different skills and different perspectives, we’re able to share of good food, Bude has got loads class horse racing. But it’s also to live in the UK. Plus, there’s knowledge and learn from each other. But we all work towards to offer. This site even has home to the GCHQ ‘doughnut’, even a free bus to take you the same goal – keeping the UK safe. 21 satellite antennae! which has everything from to town after work. cash points to a Greggs. TALENT THAT COVERS BETTER THE COUNTRY TOGETHER Our HQ is in Cheltenham, but we actually have offices dotted up and down the country. So no matter where you are in the UK, we won’t be too far away. MI5 is the UK’s national MI6 is the UK’s National Cyber security intelligence agency. secret intelligence service. Security Centre (NCSC) Lincolnshire London Manchester Scarborough MI5 protects the UK from MI6 protects the UK from The NCSC is part of GCHQ. Lincolnshire is all about With the capital on We’re fairly new At the top end of the within the UK. Made up of overseas threats. They develop Based in London, it provides cobbled streets, grand your doorstep, the to Manchester, country, Scarborough around 4,000 individuals, MI5 foreign contacts, gather research and advice on buildings and plenty London site is one but there’s a definite offers rolling hills and work against threats such as intelligence, and navigate cyber security, and responds of history. In fact, it of the most exciting buzz to this site! calming sounds of the terrorism, espionage, sabotage, any risks to the UK’s national quickly to cyber incidents. was the birthplace of places to be. It’s also Collaborative, creative sea. It even offers it’s cyber threats, and the security, economy and military. It aims to make the UK George Boole who laid where our National and innovative, the 5.5 million tourists proliferation of weapons of They also resolve international the safest place to live the foundations of the Cyber Security Manchester tech scene free Wi-Fi when mass destruction. conflicts and prevent the and work online. digital revolution. Centre is based. is the place to be. they visit. spread of illegal weapons. 4 5 OUR BENEFITS // / LIFE AT GCHQ LIFE AT To protect the UK, we need to constantly challenge ourselves. That’s why we need people with different talents and interests to join us. It all helps to create a collaborative atmosphere, where everyone’s opinion is heard. And it means we can solve unusual problems in creative ways. In fact, your ideas will push boundaries and keep us a step ahead of ever-evolving threats. We offer a rather lovely 25 days’ If you’re eligible, you could receive annual holiday (pro rata). This rises to up to 6 months’ full maternity pay, and 30 days once you’ve been here for 5 years. 2 weeks’ paternity pay. We also encourage Plus, you’ll have 10.5 extra days for shared parental leave and will support you public and privilege holidays. along your journey – no matter if this is pregnancy or adoption. PROTECTING THE THE PART UK HAS ITS PERKS We know you’ll work really hard, so that’s why we’ll give you YOU CAN PLAY lots of perks. Here are just some of the benefits you can expect. Depending on your role, you might even have a few more. Whether you’ve just finished school or you have some experience, you’ll be valued for being you. With the freedom and support to come up with your own ideas, you won’t just play a vital role in your You’ll also get a really Plus, you’ll be able to Depending which site competitive pension plan – take advantage of flexi-time. you join, you can take team. You’ll play a vital role in protecting the UK. Because while we’re so you won’t just develop So you’ll usually have a say advantage of things like all celebrated as individuals, we work together for one purpose. your career, you’ll secure in when you work. And if you a gym, restaurant and And without you, there’s no us. your future. end up doing extra, you’ll even several shops. easily be able to take that time back. 6 7 T OUR CULTURE // / LIFE AT GCHQ LIFE AT We’re not all suited THE FREEDOM and booted. As long as SUPPORTIVE you can do your job, you can wear what We want you, for you. you’re comfortable in. TO BE YOU So we’ll celebrate your That’s how you’ll do individuality. Every site your best work. Our work is serious. But our We all work has a huge range incredibly hard. of societies for you culture isn’t. In fact, it’s probably Everyone here That’s because to get involved in. genuinely wants to help. not what you’d expect at all. what we do has We all understand how an incredibly daunting it is to start a new important job, so we just want to purpose. make it as easy as possible. No matter the team or role, we’re RELAXED all here for the same reason – But we know INDIVIDUAL that you still need to to protect the UK. When you join, love what you do. You need you’ll be matched up to remain curious. That’s with a ‘buddy’. It means why we offer so much someone is there to personal, and professional, answer any questions ? development. and to show you around the site. Our sites also have lots of breakout areas where While there will be you can just go and Whether you’re certain things you’ll do have 5. Some even into sports or puzzles, independently, it’s largely have religious spaces films or books, there’ll a team effort. Plus, we often for you to use. be something for you. work across the business CURIOUS It’s a great way and go to other sites. of getting to This way, we all learn know people. from each other. Anyone will be In some roles, you’ll even have happy to give you And we also have a hand. There’s no time put aside There’s a real so you can focus our affinity groups. These hierarchy here. are groups that represent sense of being in it Plus, you’ll take on personal COLLABORATIVE everyone across GCHQ. together. It means advantage of projects. We get together to share the responsibility flexi-time and have ideas and make sure never falls to just some say in the everyone is heard. one person. hours you’ll work. 8 9 OUR TEAMS /// OUR CAREERS ANALYSIS APPLIED COMPUTER CORPORATE Being an analyst is all about solving problems. Curious and logical, our analysts get to grips with RESEARCH NETWORK SERVICES lots of data, make things easier to understand We spend a lot of time researching threats. So We couldn’t protect the country without and produce insightful reports. These reports we also take the time to understand the tech OPERATIONS some support. It takes all sorts of networks to often shape foreign policy and national security. behind them. Our researchers constantly take We protect the UK from cyber-attacks. Working keep us up and running. So, there are lots of And because the threats we face are constantly systems apart, test different theories and assess under strict legal guidelines, our specialists get opportunities to develop your skills – from changing, there’s always something new to pick new ideas. They make data easier for people creative. They disrupt terrorists’ computers and admin, finance and legal, to security and HR. up. So if you have great communication skills and to use and reduce any risks. There are lots of defend our cyber world. There are lots of roles But these aren’t your usual corporate services. are keen to learn, we can teach you the rest. applied research groups across GCHQ, but we within this area, and not all of them rely on tech. In these roles, you’ll tackle lots of different work together and share our learnings. It all It’s also about understanding what makes people challenges – things that you wouldn’t come comes down to combining great research with tick and analysing the way people communicate.
Recommended publications
  • Annual Report and Accounts 2018-19
    National Crime Agency Annual Report and Accounts 2018-19 HC 2397 National Crime Agency Annual Report and Accounts 2018-19 Annual Report presented to Parliament pursuant to paragraph 8(2) of Schedule 2 to the Crime and Courts Act 2013. Accounts presented to the House of Commons pursuant to Section 6(4) of the Government Resources and Accounts Act 2000. Accounts presented to the House of Lords by Command of Her Majesty. Ordered by the House of Commons to be printed on 22 July 2019. HC 2397 © Crown copyright 2019 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. This publication is available at www.gov.uk/official-documents. Any enquiries regarding this publication should be sent to National Crime Agency, Command Suite, Unit 1, Spring Gardens, Tinworth Street, London, SE11 5EN. ISBN 978-1-5286-1296-8 CCS0519221654 07/19 Printed on paper containing 75% recycled fibre content minimum. Printed in the UK by the APS Group on behalf of the Controller of Her Majesty’s Stationery Office. Contents Foreword by the Home Secretary 7 Part Two – Accountability Report Part One – Performance Report Corporate Governance Report 43 Directors’ Report 43 Statement by the Director General 9 Statement of Accounting Officer’s Who we are and what we do 10 responsibilities 44 How
    [Show full text]
  • Serious and Organised Crime Strategy
    Serious and Organised Crime Strategy Cm 8715 Serious and Organised Crime Strategy Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty October 2013 Cm 8715 £21.25 © Crown copyright 2013 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www. nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us [email protected] You can download this publication from our website at https://www.gov.uk/government/ publications ISBN: 9780101871525 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID 2593608 10/13 33233 19585 Printed on paper containing 75% recycled fibre content minimum. Contents Home Secretary Foreword 5 Executive Summary 7 Introduction 13 Our Strategic Response 25 PURSUE: Prosecuting and disrupting serious and 27 organised crime PREVENT: Preventing people from engaging 45 in serious and organised crime PROTECT: Increasing protection against 53 serious and organised crime PREPARE: Reducing the impact of serious and 65 organised crime Annex A: Accountability, governance and funding 71 Annex B: Departmental roles and responsibilities for 73 tackling serious and organised crime 4 Serious and Organised Crime Strategy Home Secretary Foreword 5 Home Secretary Foreword The Relentless Disruption of Organised Criminals Serious and organised crime is a threat to our national security and costs the UK more than £24 billion a year.
    [Show full text]
  • Can Parliamentary Oversight of Security and Intelligence Be Considered More Open Government Than Accountability?
    CAN PARLIAMENTARY OVERSIGHT OF SECURITY AND INTELLIGENCE BE CONSIDERED MORE OPEN GOVERNMENT THAN ACCOUNTABILITY? Stephen Barber ABSTRACT The nature of openness in government continues to be explored by academics and pub- lic managers alike while accountability is a fact of life for all public services. One of the last bastions of ‘closed government’ relates to the ‘secret’ security and intelligence ser- vices. But even here there have been significant steps towards openness over more than two decades. In Britain the Intelligence and Security Committee (ISC) of Parliament is the statutory body charged with scrutinising the agencies and since 2013 is more ac- countable itself to Westminster. This was highlighted by the first open evidence sessions involving the heads of the agencies which coincided with the unofficial disclosure of secret information by way of the so-called ‘WikiLeaks world’. This article examines scrutiny as a route to openness. It makes the distinction between accountability and open government and argues that the ‘trusted’ status of the ISC in comparison to the more independent Parliamentary Select Committees weakens its ability to hold govern- ment to account but, combined with the claim to privileged information and the acqui- escence of the agencies, makes its existence much more aligned to the idea of open gov- ernment Keywords - Westminster Select Committees, Intelligence and Security Committee, MI5 and MI6, scrutiny of public agencies. INTRODUCTION When the three heads of Britain’s security and intelligence services, Sir Iain Lobban (Director of GCHQ), Andrew Parker (Director General of MI5) and Sir John Sawers (Chief of MI6), appeared in Westminster on 7 November 2013, a new marker was set for open government.
    [Show full text]
  • Inside Russia's Intelligence Agencies
    EUROPEAN COUNCIL ON FOREIGN BRIEF POLICY RELATIONS ecfr.eu PUTIN’S HYDRA: INSIDE RUSSIA’S INTELLIGENCE SERVICES Mark Galeotti For his birthday in 2014, Russian President Vladimir Putin was treated to an exhibition of faux Greek friezes showing SUMMARY him in the guise of Hercules. In one, he was slaying the • Russia’s intelligence agencies are engaged in an “hydra of sanctions”.1 active and aggressive campaign in support of the Kremlin’s wider geopolitical agenda. The image of the hydra – a voracious and vicious multi- headed beast, guided by a single mind, and which grows • As well as espionage, Moscow’s “special services” new heads as soon as one is lopped off – crops up frequently conduct active measures aimed at subverting in discussions of Russia’s intelligence and security services. and destabilising European governments, Murdered dissident Alexander Litvinenko and his co-author operations in support of Russian economic Yuri Felshtinsky wrote of the way “the old KGB, like some interests, and attacks on political enemies. multi-headed hydra, split into four new structures” after 1991.2 More recently, a British counterintelligence officer • Moscow has developed an array of overlapping described Russia’s Foreign Intelligence Service (SVR) as and competitive security and spy services. The a hydra because of the way that, for every plot foiled or aim is to encourage risk-taking and multiple operative expelled, more quickly appear. sources, but it also leads to turf wars and a tendency to play to Kremlin prejudices. The West finds itself in a new “hot peace” in which many consider Russia not just as an irritant or challenge, but • While much useful intelligence is collected, as an outright threat.
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Mass Surveillance
    Thematic factsheet1 Update: July 2018 MASS SURVEILLANCE The highly complex forms of terrorism require States to take effective measures to defend themselves, including mass monitoring of communications. Unlike “targeted” surveillance (covert collection of conversations, telecommunications and metadata by technical means – “bugging”), “strategic” surveillance (or mass surveillance) does not necessarily start with a suspicion against a particular person or persons. It has a proactive element, aimed at identifying a danger rather than investigating a known threat. Herein lay both the value it can have for security operations, and the risks it can pose for individual rights. Nevertheless, Member States do not have unlimited powers in this area. Mass surveillance of citizens is tolerable under the Convention only if it is strictly necessary for safeguarding democratic institutions. Taking into account considerable potential to infringe fundamental rights to privacy and to freedom of expression enshrined by the Convention, Member States must ensure that the development of surveillance methods resulting in mass data collection is accompanied by the simultaneous development of legal safeguards securing respect for citizens’ human rights. According to the case-law of the European Court of Human Rights, it would be counter to governments’ efforts to keep terrorism at bay if the terrorist threat were substituted with a perceived threat of unfettered executive power intruding into citizens’ private lives. It is of the utmost importance that the domestic legislation authorizing far-reaching surveillance techniques and prerogatives provides for adequate and sufficient safeguards in order to minimize the risks for the freedom of expression and the right to privacy which the “indiscriminate capturing of vast amounts of communications” enables.
    [Show full text]
  • Offensive Capabilities
    GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • GCHQ Accommodation Procurement: a Case Study
    Intelligence and Security Committee of Parliament GCHQ accommodation procurement: a case study HC 991 Intelligence and Security Committee of Parliament GCHQ accommodation procurement: a case study Presented to Parliament pursuant to sections 2 and 3 of the Justice and Security Act 2013 Ordered by the House of Commons to be printed on 19 November 2020 HC 991 © Intelligence and Security Committee of Parliament copyright 2020 The material must be acknowledged as Intelligence and Security Committee of Parliament copyright and the document title specified. Where third party material has been identified, permission from the respective copyright holder must be sought. This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3 Any enquiries regarding this publication should be sent to us via our webform at isc.independent.gov.uk/contact This publication is also available on our website at: isc.independent.gov.uk ISBN 978-1-5286-2203-5 CCS0920245852 11/20 Printed on paper containing 75% recycled fibre content minimum Printed in the UK by the APS Group on behalf of the Controller of Her Majesty’s Stationery Office THE INTELLIGENCE AND SECURITY COMMITTEE OF PARLIAMENT The Rt Hon. Dr Julian Lewis MP The Rt Hon. Sir John Hayes CBE MP Mark Pritchard MP Stewart Hosie MP Colonel Bob Stewart DSO MP Dame Diana Johnson DBE MP The Rt Hon. Theresa Villiers MP The Rt Hon. Kevan Jones MP The Rt Hon. Admiral Lord West of Spithead GCB DSC This Report reflects the work of the previous Committee, which sat from November 2017 to November 2019: The Rt.
    [Show full text]
  • Surveillance by Intelligence Services: Services: Intelligence by Surveillance
    FREEDOMS FRA Surveillance by intelligence services – Volume II: field perspectives and legal update II: field perspectives – Volume services intelligence by Surveillance Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Volume II: field perspectives and legal update This report addresses matters related to the respect for private and family life (Article 7), the protection of personal data (Article 8) and the right to an effective remedy and a fair trial (Article 47) falling under Titles II ‘Freedoms’ and VI ‘Justice’ of the Charter of Fundamental Rights of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). Photo (cover & inside): © Shutterstock More information on the European Union is available on the internet (http://europa.eu). Luxembourg: Publications Office of the European Union, 2017 FRA – print: ISBN 978-92-9491-766-9 doi:10.2811/15232 TK-04-17-696-EN-C FRA – web: ISBN 978-92-9491-765-2 doi:10.2811/792946 TK-04-17-696-EN-N © European Union Agency for Fundamental Rights, 2017 Reproduction is authorised provided the source is acknowledged. For any use or reproduction of photos or other material that is not under the European Union Agency for Fundamental Rights copyright, permission must be sought directly from the copyright holders. Printed by Imprimerie Centrale in Luxembourg Neither the European Union Agency for Fundamental Rights nor any person acting on behalf of the European Union Agency for Fundamental Rights is responsible for the use that might be made of the following information.
    [Show full text]
  • Skripal Novichok Poisoning: Kremlin on Hunt for Russian 'Traitor' Who Helped Identify Hitmen
    Skripal Novichok poisoning: Kremlin on hunt for Russian 'traitor... https://www.mirror.co.uk/news/uk-news/skripal-novichok-poiso... ADVERTISEMENT IN ASSOCIATION WITH ANIMAL HERO AWARDS 2018 NEWS Skripal Novichok poisoning: Kremlin on hunt for Russian 'traitor' who helped identify hitmen EXCLUSIVE: Search is on for the source of GRU leak who aided MI5 and they may be among GRU military intelligence officers still serving By Chris Hughes Defence And Security SHARE Editor & Adam Aspinall 22:20, 14 SEP 2018 UPDATED 22:23, 14 SEP 2018 1 of 14 15/09/2018, 17:44 Skripal Novichok poisoning: Kremlin on hunt for Russian 'traitor... https://www.mirror.co.uk/news/uk-news/skripal-novichok-poiso... Russian nationals Ruslan Boshirov and Alexander Petrov on Fisherton Road, Salisbury on the day the Skripals were poisoned (Image: PA) Get Daily News updates directly to your inbox Enter your email Subscribe See our privacy notice More newsletters Kremlin spy chiefs have launched an international manhunt for Putin’s new number one target - the Russian “traitor” who helped ID the Novichok hitmen. Russia intelligence was shocked by MI5’s identifying of Alexander Petrov and Ruslan Boshirov as GRU military intelligence officers as they had assumed they were unknowns. And yesterday British sources told the Daily Mirror there are suspicions the pair are from a ruthless “Spetsnaz” special forces unit, which is part of the GRU and trained in assassinations. The Kremlin is desperate to “lock-down” the leak - thought to be either a GRU man who has already defected to the west or even more devastating an insider, still 2 of 14 15/09/2018, 17:44 Skripal Novichok poisoning: Kremlin on hunt for Russian 'traitor..
    [Show full text]
  • Cyber Crime Assessment 2016
    NCA Strategic Cyber Industry Group Cyber Crime Assessment 2016 Need for a stronger law enforcement and business partnership to fight cyber crime 7 July 2016 Version 1.2 Overview This assessment has been jointly produced by the National Crime Agency (NCA) and the Strategic Cyber Industry Group (SCIG).1 It outlines the real and immediate threat to UK businesses from cyber crime. It argues that the speed of criminal capability development is currently outpacing our response as a community and that only by working together across law enforcement and the private sector can we successfully reduce the threat to the UK from cyber crime. 1 The Strategic Cyber Industry Group provides an overarching forum within which the National Cyber Crime Unit (NCCU) of the NCA and private sector organisations work in partnership to: coordinate joint activity against cyber crime, identify intelligence gaps and improve intelligence sharing, understand the capabilities available in law enforcement and industry, and steer the activities of Virtual Task Forces and ad hoc working groups. We would like to thank Bill Trent of Stroz Friedberg who led the SCIG contributions to this assessment. 2 Executive Summary A cyber attack that poses an existential threat to one or more major UK businesses is a realistic possibility. The long-term impact of such a cyber attack could include substantial loss of revenue and margin, of valuable data, and of other company assets. The impact of litigation costs (and, with the arrival of new regulations, potential fines), the loss of confidence from reputational damage and possible executive-level dismissals could also result in immediate and material loss of shareholder value.
    [Show full text]