In a more sanitised manner, UK Defence Intelligence continues its daily “intelligence briefings” on social media about Russian military progress and internal tensions. The US is using satellite imagery to expose Russian efforts to source Iranian drones and disclosing assessments to spotlight global Russian influence operations.
As Anna Horrigan, the US National Security Agency’s senior executive, explains: “We can’t just watch our adversaries, we have to do something about it, whether sharing timely information, or taking action against that actor.”
With both former intelligence officers and those responsible for these influence campaigns championing their benefits, the war in Ukraine has probably set a precedent for – and an expectation of – this more open approach to communicating secrets, at least for its main proponents the US, UK and Ukraine.
Rewards and risks
Recent public reflections about using intelligence this way by leading British stakeholders, such as the chief of Defence Intelligence, General Sir Jim Hockenhull, and GCHQ director, Jeremy Fleming, have not, however, addressed the associated risks.
The dissemination of intelligence is generally limited because access to secrets is vulnerable: hard to gain and easy to lose. Once a target suspects what a state knows, and how, it might adapt to secure information and deny future access. In this case, Russia can take steps to guard against further leakage, for example, by improving communication security – or it could manipulate the sources of leaks, using them as channels of deception.