Feeds

Ex-UK spy boss says WikiLeaks sparked Egyptian revolution

Dearlove gets schooled on radical transparency

Top three mobile application threats

The former head of Britain's Secret Intelligence Service has credited WikiLeaks and other secret-spilling sites with sparking the revolutions sweeping the Middle East.

At what was supposed to be an off-the-record appearance last month at the Cambridge Union Society, Former MI6 Chief Richard Dearlove said that the technology WikiLeaks harnesses is fundamentally strengthening the hand of the individual as he goes up against powerful organizations.

“I would definitely draw parallels at the moment between the wave of political unrest which is sweeping through the Middle East in a very exciting and rather extraordinary fashion and also the WikiLeaks phenomenon,” Dearlove said. “Really, what ties these two events together, and of course a number of other events, is the diffusion of power, away from the states and the empowerment of individuals, and small groups of individuals, by technology.”

The former spy didn't know just how prophetic his words would be: much of the talk was captured on video, including an exchange with a critic. She cited a leaked document from 2002 that has come to be known as the Downing Street Memo, which appeared to show him as saying that “the intelligence and facts were being fixed around the policy” of then US President George W Bush of removing Saddam Hussein from power in Iraq.

“I find that a terrible betrayal of everything democracy is supposed to stand for and that the intelligence service is supposed to provide,” the unidentified woman told Dearlove. She went on to challenge his assertion that WikiLeaks founder Julian Assange is an “undignified flag-carrier” who has yet to justify his zeal for radical transparency.

“To find out information like that, and that's what public servants are actually doing, and that's how intelligence is being used, I think the most dignified way we can recover from that is to find out that information and move forward from there,” she continued.

Dearlove first said he wouldn't comment, but couldn't help adding: “The Downing Street Memo, which you just read, is a misquotation of what I said, and what I said is not in the public record.”

Elsewhere in the 20-minute video, Dearlove said: “I think it would be generally accepted that most organizations large and small also require moments in their existence for the benefit of their members of confidentiality. However, there's absolutely no question that technology is significantly shifting these domains and altering the relationship quite fundamentally between the citizen and government.”

Following the exchange with the critic, Dearlove quickly took a question from what what is assumed to be a more sympathetic audience member. But the leaked comments and conversation are now a permanent part of the internet record. Ah, the irony. ®

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.