top of page

"Silent Courier": What We Know

  • Writer: Matthew Parish
    Matthew Parish
  • Sep 20
  • 5 min read
ree

“Silent Courier” is a dark-web portal announced by the British Government's Foreign, Commonwealth & Development Office together with MI6 (the British Secret Intelligence Service) in September 2025. Its purpose is to allow individuals anywhere in the world who have access to “sensitive information relating to global instability, international terrorism or hostile intelligence activity” to contact MI6 securely and (relatively) anonymously, or to offer their services.


Some key features and mechanics:


  • Dark Web / Onion Site: The portal is hosted on the Tor network (an onion site) to provide anonymity.


  • Instructions for Secure Access: MI6 has published guidance (in multiple languages) on how users should access the portal safely. This includes using the Tor browser, using a trustworthy VPN, and using devices that are clean or not linked to their identity.


  • Target Audience: While it is open “anywhere in the world,” there is specific mention of Russia and other hostile states. The agency seems particularly interested in sources holding information relevant to hostile intelligence or global instability, and in people who may want to become informants or agents.


The launch is part of a broader shift: MI6 explicitly says that while face-to-face meetings have long been central to its operations, it now intends to expand online methods for recruiting and handling informants given evolving threats.


Strategic Rationale


From the publicly disclosed material, several motivations underlie the creation of Silent Courier.


  1. Anonymity & Security


    Many potential informants are or will be in high-risk environments—hostile states, surveillance states, or places where contacting a foreign intelligence agency could carry severe penalties. Using dark-web tools with VPNs, unlinked devices etc. reduces risk for both source and agency.


  2. Broader Reach


    A dark web portal removes many geographic, logistical, and physical barriers. It allows MI6 to accept tips, intelligence, and recruitment offers from people in places where traditional espionage outreach is far more dangerous or nearly impossible.


  3. Modernising Intelligence Gathering


    Digital tools are increasingly central to intelligence work. Social media, cyber operations, remote signals, etc. The platform seems designed to adapt MI6’s tradecraft to the digital era. The government sees threats from hostile states, terrorism, global instability as increasing, and believes that leveraging technology allows them to stay “one step ahead”.


  4. Operational Flexibility


    By allowing remote, anonymous contact, MI6 can build potential informant contacts or channels without deploying agents or making physical contact (which is riskier and expensive). It may speed up intelligence flow.


Risks, Ethical and Legal Considerations


While Silent Courier has advantages, it also raises various concerns—technical, ethical, legal and operational.


  1. Source Security & Operational Risk


    Even with Tor, VPN and unlinked devices, there is no perfect anonymity. Adversarial states have increasingly sophisticated surveillance, malware, network intrusion, correlation attacks. A false sense of security could endanger sources.


  2. Legal Implications


    • For the users: In some jurisdictions, contacting a foreign intelligence agency is illegal or punishable. If one is caught doing so, even if they tried to anonymise, the legal consequences could be severe.


    • For MI6 / United Kingdom: Questions exist about jurisdiction, oversight, the legality of encouraging informants in hostile states and possible violations of other states’ laws. There are also potential diplomatic fallouts if informants are discovered.


  3. Trust, Verification and False Information


    Not everyone who contacts MI6 will be truthful or have accurate information. There is risk of deception, disinformation, or being fed false intelligence. Dealing with that requires good human and automated verification procedures and analysis, which may be costly or risky.


  4. Ethics and Human Rights


    Encouraging people in oppressive regimes to come forward is ethically complex. On the one hand, it offers a path for whistleblowers or people who wish to expose wrongdoing; on the other hand, those people or their families may be exposed, tortured, imprisoned or killed if their anonymity is compromised.


  5. Technical Security and Abuse of Platform


    Dark web and onion sites are sometimes used for illicit activity. MI6 must ensure the portal itself is secure, cannot be tampered with, monitored, or mirrored by hostile actors to collect credentials or lead to honeypots (compromising sexual encounters).


  6. Precedent and Escalation


    Other states may respond in kind. Intelligence agencies globally may feel pressure to open similar portals; hostile intelligence services may try to use such portals to draw in adversaries or entrap potential informants.


Technical and Cryptographic Aspects


Silent Courier is a “secure drop” platform, and several lessons can be drawn from comparable systems in journalism and intelligence.


  • End-to-End Encryption with asymmetric keys.


  • Forward Secrecy using ephemeral session keys.


  • Metadata Minimisation through Tor, VPNs and strict client instructions.


  • Secure Code and Auditing to avoid exploitation of the onion site.


  • Mirror Risks requiring signed onion addresses to counter fakes.


  • Storage & Access with compartmentalised, encrypted environments to prevent insider compromise.


Comparative Models


  • SecureDrop in journalism.


  • CIA’s Dark Web Portal launched in 2023.


  • European Whistleblowing Systems, less radical but conceptually linked.


  • Corporate Whistleblower Tools influenced by EU directives.


Success will depend on uptake, proof of intelligence value, counterintelligence resilience, oversight, and adaptability to hostile responses.


Counter-Intelligence Responses: Russia and China


Silent Courier cannot be understood in isolation; adversaries are likely already developing countermeasures.


Russia has one of the most sophisticated counter-intelligence apparatuses in the world, relying on FSB and GRU monitoring of Tor traffic, correlation attacks, and intimidation.


China uses deep packet inspection, the Great Firewall, and AI-driven surveillance to detect anomalies such as VPN use or new device registrations.


Both powers will likely launch fake mirrors, disinformation campaigns and technical attempts to deanonymise users. This highlights the acute risks to would-be informants.


Historical Parallels: From Dead Drops to Digital Drops


Silent Courier can also be viewed as the digital descendant of Cold War tradecraft.


  • Dead Drops: In Cold War Europe, agents left packages or film canisters in concealed locations (a hollow tree, a loose brick). The digital equivalent is the encrypted message left in Silent Courier’s onion site—anonymous, compartmentalised, and retrievable only by the intended recipient.


  • Brush Passes: Quick exchanges of documents on a street or in a crowd minimised exposure. Silent Courier performs a similar role: rapid, low-profile transfer of data without prolonged physical contact, though in cyberspace rather than on pavements.


  • One-Time Pads: The gold standard of unbreakable encryption in the Cold War relied on random keybooks. Today’s elliptic curve cryptography and ephemeral keys serve the same purpose: ensuring that even if communications are intercepted, they cannot be decrypted.


  • Radio “Numbers Stations”: The eerie broadcasts of coded numbers to field agents resemble, in principle, the push messages that Silent Courier might one day deliver back to sources. The medium has changed, but the principle—securing a covert channel across hostile borders—remains constant.


The crucial divergence is in scale and risk distribution. Whereas Cold War methods exposed only those physically present, Silent Courier potentially exposes anyone who attempts to connect from a monitored state. The anonymity promised by digital tools is fragile, because authoritarian governments can observe networks en masse in ways the KGB or Stasi never could. Thus Silent Courier is at once the heir of classic tradecraft and a radical departure into new, uncertain territory.


Conclusion


Silent Courier is a bold but risky innovation: a recognition that espionage must adapt to digital realities. It offers a secure channel for those with vital information, but it also exposes them to grave risks in surveillance states like Russia and China. Its success depends not only on cryptography and anonymity tools but also upon MI6’s ability to anticipate adversarial counter-intelligence responses, safeguard sources, and manage the ethical dilemmas of recruiting in hostile environments.


By recalling Cold War methods, one sees both continuity and transformation: the dead drop is now a digital drop; the brush pass has become a Tor session. What has not changed is the peril to the source, and the eternal contest between those who seek to reveal secrets and those determined to suppress them.

 
 

Note from Matthew Parish, Editor-in-Chief. The Lviv Herald is a unique and independent source of analytical journalism about the war in Ukraine and its aftermath, and all the geopolitical and diplomatic consequences of the war as well as the tremendous advances in military technology the war has yielded. To achieve this independence, we rely exclusively on donations. Please donate if you can, either with the buttons at the top of this page or become a subscriber via www.patreon.com/lvivherald.

Copyright (c) Lviv Herald 2024-25. All rights reserved.  Accredited by the Armed Forces of Ukraine after approval by the State Security Service of Ukraine. To view our policy on the anonymity of authors, please click the "About" page.

bottom of page