Page:ISC-China.pdf/87

From Wikisource
Jump to navigation Jump to search
This page has been proofread, but needs to be validated.
Defending the UK

Tools

HMG uses a variety of tools to disrupt Hostile State Activity (HSA):

  • Interviews: *** there may be a discussion arranged with that individual ***.
  • Vetting action: Removing the security clearance of British nationals with access to sensitive information who pose a national security risk, including those who may have been in contact with foreign intelligence services ***
  • Expulsion of intelligence officers: Removal of intelligence officers operating in the UK under diplomatic cover (under the terms of the Vienna Convention). ***
  • Capacity-building with allies and partners: This may involve *** training, support or skill development ***. ***. This is covered further in the chapter on Working with Allies.
  • Visa action: As is standard, the Home Office can consider revoking a visa on the grounds that someone's presence in the UK is 'not conducive to the public good' ***[1] ***[2]
  • Legislative measures: There are a number of different pieces of legislation available for the Agencies to use such as the Official Secrets Act, the Computer Misuse Act and civil law remedies such as patent or copyright infringement. However, according to the Agencies, they are of limited use in countering HSA (legislation is considered in more detail later in the Report).
  • Démarches: This might include, amongst other things, requesting the removal of named intelligence officers from their positions ***.
  • Briefings to Industry: These are used where intelligence indicates there is intent to target certain companies or Industry sectors ***. This work is led by the Centre for the Protection of National Infrastructure and the National Cyber Security Centre, but—given the wide range of individuals, assets and organisations—disrupting every incident cannot be guaranteed.
  • Countering cyber threats: This includes exposing and disrupting the activities of state-sponsored hackers ***.[3]
Protective role: CPNI and NCSC
  1. The Centre for the Protection of National Infrastructure (CPNI—accountable to MI5) and the National Cyber Security Centre (NCSC—part of GCHQ) play a key role in engaging with those both within and outside Government to protect national security:
    • CPNI has a preventative and advisory role, dealing with the non-cyber threat to Industry. It follows a "threat-focused and intelligence-led" approach to engagement,

  1. Written evidence—GCHQ, 31 January 2020.
  2. Written evidence—MI5, 16 November 2020.
  3. Written evidence—HMG, 18 April 2019.

77