Close Menu
Xarkas BlogXarkas Blog
    What's Hot

    How To Unlock All Essex Model 07 Camos & Attachments In Black Ops 6 & Warzone

    June 12, 2025

    China Rare earth magnet crisis set to peak by July: OEMS petition govt for relief

    June 12, 2025

    Meta rolls out AI-powered video editing across apps and web: How the feature works, eligibility and more

    June 12, 2025
    Facebook X (Twitter) Instagram
    Xarkas BlogXarkas Blog
    • Tech News

      Meta rolls out AI-powered video editing across apps and web: How the feature works, eligibility and more

      June 12, 2025

      Geekbench listing hints Poco F7 may be powered by Snapdragon 8s Gen 4 SoC: What to expect

      June 12, 2025

      OnePlus 13s now available in India: Check offers, pricing, specs, features and more

      June 12, 2025

      Monsoon Mega Sale on premium washing machines with up to 43% off on top brands, including top load and front load models

      June 12, 2025

      Best remote controlled fans for bedrooms, living rooms, and large spaces: Top 10 picks for every room

      June 12, 2025
    • Mobiles

      Nothing Phone 3 to Be Manufactured in India, Company Reveals Portion of Rear Panel With Model Number

      June 12, 2025

      Samsung Galaxy Z Fold 7 AI Camera Features Teased Ahead of Anticipated Launch

      June 12, 2025

      iPhone 17 Roundup: Price, Specifications and Everything Else We Know So Far

      June 12, 2025

      Top Smartphones Under Rs 30,000 in India (June 2025): Nothing Phone 3a Pro, Motorola Edge 60 Pro, Poco X7 Pro

      June 12, 2025

      Huawei Pura 80 Ultra With Switchable Telephoto System Launched Alongside Pura 80, Pura 80 Pro and Pura 80 Pro+

      June 11, 2025
    • Gaming

      How To Unlock All Essex Model 07 Camos & Attachments In Black Ops 6 & Warzone

      June 12, 2025

      The Worst Character Betrayals In The Walking Dead

      June 12, 2025

      Best JRPGs Where You Battle a God as the Final Boss

      June 12, 2025

      Blue Lock Rivals: Best Flows Tier List

      June 12, 2025

      Overture’s Boss Fights Don’t Rely on Multiple Health Bars

      June 12, 2025
    • SEO Tips
    • PC/ Laptops

      Microsoft Fixes 67 Security Flaws With June 2025 Security Update, Including Two Zero-Day Vulnerabilities

      June 11, 2025

      Latest Windows 11 Insider Preview Lets You Try a New Start Menu With Scrollable Interface, More Features

      June 11, 2025

      Asus TUF Gaming F16, TUF Gaming A16, ROG Strix G16 and ROG Zephyrus G14 2025 Variants Launched in India

      June 11, 2025

      What is Liquid Glass Interface, Apple’s New Universal Design Language for iPhone, iPad, Mac, and Other Devices

      June 10, 2025

      WWDC 2025: macOS Tahoe 26 to Be the Last Major Software Update for Intel-Powered Macs

      June 10, 2025
    • EV

      China Rare earth magnet crisis set to peak by July: OEMS petition govt for relief

      June 12, 2025

      Rare Earth Squeeze Spurs Godrej’s Pivot to non-rare-earth Motors

      June 12, 2025

      Genesis Bets On Hybrids And Range Extender EVs

      June 12, 2025

      Our Favorites In Every Category

      June 12, 2025

      Scandinavian-Style Lounges Launched in Chennai for Gig Workers, Especially Women

      June 12, 2025
    • Gadget
    • AI
    Facebook
    Xarkas BlogXarkas Blog
    Home - Featured - How spies should use technology
    Featured

    How spies should use technology

    KavishBy KavishSeptember 5, 2024No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    How spies should use technology
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email


    Philo of Byzantium, an inventor of the third century BC, described how crushed gallnuts, dissolved in water, could make invisible ink. Technology has shaped spycraft for millennia, but today it is having an unprecedented effect. The internet enables covert action on a grand scale. Biometric border controls impede spies operating abroad. Smartphones haemorrhage secrets.

    Some conclude that intelligence services in their current form are obsolete. Why steal secrets when open and commercial sources such as satellite imagery and phone-location data can expose mischief? Who needs human spooks when it is so hard to protect their identities and so easy to snoop digitally?

    In truth, intelligence needs both the old and new ways. Human intelligence is getting harder, costlier and riskier. Yet, for all that, it remains essential. That is not just because there are still some things that only an agent can do, such as read the mood in the corridors of the Kremlin. It is also because human and technical operations are intertwined. When an unknown operator, presumably a state, recently attempted to insert a surreptitious backdoor into a vital piece of software called XZ Utils, they did so by spending years pretending to be a well-meaning volunteer on the project.

    Public and commercial sources are increasingly valuable. Around 90% of NATO’s intelligence on cyber threats now comes from private firms, for instance. But the real value is derived by blending open and secret sources. That is harder than it sounds. For good reason, spy agencies have long maintained a gap between the classified and unclassified worlds. Now it has to be bridged.

    Intelligence services will need top-secret cloud servers. Currently these are built largely by American or Chinese firms, which spy agencies from most other countries do not trust. Within and between countries, those agencies will often want to share data that are now siloed. And they will need to experiment with artificial intelligence to exploit it all, balancing the hallucinatory habits of today’s large language models against the huge promise of future ones.

    Whereas the secret world once far outstripped the private sector, it is now often the reverse. Spy agencies will have to work with companies at the cutting-edge and recruit talent that may balk at the prospect of working in a windowless room without access to phones or the internet.

    More broadly, a world in which digital technology has seeped into everything—into everyone’s pockets, power plants and the cameras that watch over government buildings—is one in which access to data becomes central to the intelligence contest between America, China and other big powers. At the moment, that is a lopsided fight.

    Chinese hackers hoover up data from around the world, giving them potential leverage over their adversaries. American and European intelligence services also collect a lot. But they are far more constrained by law. It is easier for a private firm to collect bulk data, such as phone-location logs, than for a state agency to do so.

    Data brokers who buy and sell private data, often to law-enforcement and intelligence agencies, need tighter rules and a brighter light shone on their often murky business. States which bar their agencies from collecting and fusing data about rivals will blind themselves. But those that allow such activities without proper legal authority and robust oversight do not just stomp on individual rights, they also risk provoking a backlash, as after Edward Snowden’s revelations in 2013.

    It is tempting to dismiss the technologies of spycraft as just an entertaining diversion from real geopolitics. In fact, the two are intertwined. America’s interception of Russian war plans in 2021 allowed allies to prepare for the invasion of Ukraine that followed. Israel’s failure to foresee Hamas’s assault on October 7th was a national calamity. If China chooses to invade Taiwan, intelligence will be crucial to denying it the element of surprise. Forewarned is forearmed.

    © 2024, The Economist Newspaper Limited. All rights reserved. From The Economist, published under licence. The original content can be found on www.economist.com



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Kavish
    • Website

    Related Posts

    How To Unlock All Essex Model 07 Camos & Attachments In Black Ops 6 & Warzone

    June 12, 2025

    China Rare earth magnet crisis set to peak by July: OEMS petition govt for relief

    June 12, 2025

    Meta rolls out AI-powered video editing across apps and web: How the feature works, eligibility and more

    June 12, 2025

    Geekbench listing hints Poco F7 may be powered by Snapdragon 8s Gen 4 SoC: What to expect

    June 12, 2025

    The Worst Character Betrayals In The Walking Dead

    June 12, 2025

    Nothing Phone 3 to Be Manufactured in India, Company Reveals Portion of Rear Panel With Model Number

    June 12, 2025
    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    How To Unlock All Essex Model 07 Camos & Attachments In Black Ops 6 & Warzone

    June 12, 2025

    China Rare earth magnet crisis set to peak by July: OEMS petition govt for relief

    June 12, 2025

    Meta rolls out AI-powered video editing across apps and web: How the feature works, eligibility and more

    June 12, 2025

    Geekbench listing hints Poco F7 may be powered by Snapdragon 8s Gen 4 SoC: What to expect

    June 12, 2025
    About Us
    About Us

    Email Us: info@xarkas.com

    Facebook Pinterest
    © 2025 . Designed by Xarkas Technologies.
    • Home
    • Mobiles
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.